dialParameters_test.go 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "reflect"
  27. "testing"
  28. "time"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  35. )
  36. func TestDialParametersAndReplay(t *testing.T) {
  37. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  38. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  39. runDialParametersAndReplay(t, tunnelProtocol)
  40. }
  41. }
  42. }
  43. var testNetworkID = prng.HexString(8)
  44. type testNetworkGetter struct {
  45. }
  46. func (t *testNetworkGetter) GetNetworkID() string {
  47. return testNetworkID
  48. }
  49. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  50. t.Logf("Test %s...", tunnelProtocol)
  51. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  52. if err != nil {
  53. t.Fatalf("TempDir failed: %s", err)
  54. }
  55. defer os.RemoveAll(testDataDirName)
  56. SetNoticeWriter(ioutil.Discard)
  57. clientConfig := &Config{
  58. PropagationChannelId: "0",
  59. SponsorId: "0",
  60. DataRootDirectory: testDataDirName,
  61. NetworkIDGetter: new(testNetworkGetter),
  62. }
  63. err = clientConfig.Commit(false)
  64. if err != nil {
  65. t.Fatalf("error committing configuration file: %s", err)
  66. }
  67. holdOffTunnelProtocols := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  68. frontingProviderID := prng.HexString(8)
  69. applyParameters := make(map[string]interface{})
  70. applyParameters[parameters.TransformHostNameProbability] = 1.0
  71. applyParameters[parameters.PickUserAgentProbability] = 1.0
  72. applyParameters[parameters.HoldOffTunnelMinDuration] = "1ms"
  73. applyParameters[parameters.HoldOffTunnelMaxDuration] = "10ms"
  74. applyParameters[parameters.HoldOffTunnelProtocols] = holdOffTunnelProtocols
  75. applyParameters[parameters.HoldOffTunnelFrontingProviderIDs] = []string{frontingProviderID}
  76. applyParameters[parameters.HoldOffTunnelProbability] = 1.0
  77. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  78. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  79. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  80. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  81. err = clientConfig.SetParameters("tag1", false, applyParameters)
  82. if err != nil {
  83. t.Fatalf("SetParameters failed: %s", err)
  84. }
  85. resolver := NewResolver(clientConfig, true)
  86. defer resolver.Stop()
  87. clientConfig.SetResolver(resolver)
  88. err = OpenDataStore(clientConfig)
  89. if err != nil {
  90. t.Fatalf("error initializing client datastore: %s", err)
  91. }
  92. defer CloseDataStore()
  93. serverEntries := makeMockServerEntries(tunnelProtocol, frontingProviderID, 100)
  94. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  95. return replayProtocol == tunnelProtocol
  96. }
  97. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  98. return tunnelProtocol, true
  99. }
  100. values.SetSSHClientVersionsSpec(
  101. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  102. values.SetUserAgentsSpec(
  103. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  104. // Test: expected dial parameter fields set
  105. upstreamProxyErrorCallback := func(_ error) {}
  106. dialParams, err := MakeDialParameters(
  107. clientConfig, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  108. if err != nil {
  109. t.Fatalf("MakeDialParameters failed: %s", err)
  110. }
  111. if dialParams.ServerEntry != serverEntries[0] {
  112. t.Fatalf("unexpected server entry")
  113. }
  114. if dialParams.NetworkID != testNetworkID {
  115. t.Fatalf("unexpected network ID")
  116. }
  117. if dialParams.IsReplay {
  118. t.Fatalf("unexpected replay")
  119. }
  120. if dialParams.TunnelProtocol != tunnelProtocol {
  121. t.Fatalf("unexpected tunnel protocol")
  122. }
  123. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  124. dialParams.DirectDialAddress == "" {
  125. t.Fatalf("missing direct dial fields")
  126. }
  127. if dialParams.DialPortNumber == "" {
  128. t.Fatalf("missing port number fields")
  129. }
  130. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  131. t.Fatalf("missing SSH fields")
  132. }
  133. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  134. dialParams.ObfuscatorPaddingSeed == nil {
  135. t.Fatalf("missing obfuscator fields")
  136. }
  137. if dialParams.FragmentorSeed == nil {
  138. t.Fatalf("missing fragmentor field")
  139. }
  140. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  141. (dialParams.MeekDialAddress == "" ||
  142. dialParams.MeekHostHeader == "" ||
  143. dialParams.MeekObfuscatorPaddingSeed == nil) {
  144. t.Fatalf("missing meek fields")
  145. }
  146. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  147. (dialParams.MeekFrontingDialAddress == "" ||
  148. dialParams.MeekFrontingHost == "" ||
  149. dialParams.ResolveParameters == nil) {
  150. t.Fatalf("missing meek fronting fields")
  151. }
  152. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  153. dialParams.UserAgent == "" {
  154. t.Fatalf("missing meek HTTP fields")
  155. }
  156. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  157. (dialParams.MeekSNIServerName == "" ||
  158. !dialParams.SelectedTLSProfile ||
  159. dialParams.TLSProfile == "") {
  160. t.Fatalf("missing meek HTTPS fields")
  161. }
  162. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  163. if dialParams.QUICVersion == "" {
  164. t.Fatalf("missing QUIC version field")
  165. }
  166. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  167. if dialParams.MeekFrontingDialAddress == "" ||
  168. dialParams.MeekFrontingHost == "" ||
  169. dialParams.MeekSNIServerName == "" {
  170. t.Fatalf("missing fronted QUIC fields")
  171. }
  172. } else {
  173. if dialParams.QUICDialSNIAddress == "" {
  174. t.Fatalf("missing QUIC SNI field")
  175. }
  176. }
  177. }
  178. if dialParams.LivenessTestSeed == nil {
  179. t.Fatalf("missing liveness test fields")
  180. }
  181. if dialParams.APIRequestPaddingSeed == nil {
  182. t.Fatalf("missing API request fields")
  183. }
  184. if common.Contains(holdOffTunnelProtocols, tunnelProtocol) ||
  185. protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  186. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  187. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  188. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  189. }
  190. } else {
  191. if dialParams.HoldOffTunnelDuration != 0 {
  192. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  193. }
  194. }
  195. dialConfig := dialParams.GetDialConfig()
  196. if dialConfig.UpstreamProxyErrorCallback == nil {
  197. t.Fatalf("missing upstreamProxyErrorCallback")
  198. }
  199. // Test: no replay after dial reported to fail
  200. dialParams.Failed(clientConfig)
  201. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  202. if err != nil {
  203. t.Fatalf("MakeDialParameters failed: %s", err)
  204. }
  205. if dialParams.IsReplay {
  206. t.Fatalf("unexpected replay")
  207. }
  208. // Test: no replay after network ID changes
  209. dialParams.Succeeded()
  210. testNetworkID = prng.HexString(8)
  211. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  212. if err != nil {
  213. t.Fatalf("MakeDialParameters failed: %s", err)
  214. }
  215. if dialParams.NetworkID != testNetworkID {
  216. t.Fatalf("unexpected network ID")
  217. }
  218. if dialParams.IsReplay {
  219. t.Fatalf("unexpected replay")
  220. }
  221. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  222. dialParams.Succeeded()
  223. replayDialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  224. if err != nil {
  225. t.Fatalf("MakeDialParameters failed: %s", err)
  226. }
  227. if !replayDialParams.IsReplay {
  228. t.Fatalf("unexpected non-replay")
  229. }
  230. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  231. t.Fatalf("unexpected non-updated timestamp")
  232. }
  233. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  234. t.Fatalf("mismatching tunnel protocol")
  235. }
  236. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  237. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  238. t.Fatalf("mismatching dial fields")
  239. }
  240. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  241. if seed1 == nil {
  242. return seed2 == nil
  243. }
  244. return bytes.Equal(seed1[:], seed2[:])
  245. }
  246. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  247. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  248. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  249. t.Fatalf("mismatching SSH fields")
  250. }
  251. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  252. t.Fatalf("mismatching obfuscator fields")
  253. }
  254. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  255. t.Fatalf("mismatching fragmentor fields")
  256. }
  257. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  258. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  259. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  260. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  261. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  262. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  263. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  264. t.Fatalf("mismatching meek fields")
  265. }
  266. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  267. replayDialParams.UserAgent != dialParams.UserAgent {
  268. t.Fatalf("mismatching user agent fields")
  269. }
  270. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  271. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  272. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  273. t.Fatalf("mismatching TLS fields")
  274. }
  275. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  276. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  277. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  278. t.Fatalf("mismatching QUIC fields")
  279. }
  280. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  281. t.Fatalf("mismatching liveness test fields")
  282. }
  283. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  284. t.Fatalf("mismatching API request fields")
  285. }
  286. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  287. (replayDialParams.ResolveParameters != nil &&
  288. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  289. t.Fatalf("mismatching ResolveParameters fields")
  290. }
  291. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  292. (replayDialParams.HTTPTransformerParameters != nil &&
  293. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  294. t.Fatalf("mismatching HTTPTransformerParameters fields")
  295. }
  296. // Test: no replay after change tactics
  297. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  298. err = clientConfig.SetParameters("tag2", false, applyParameters)
  299. if err != nil {
  300. t.Fatalf("SetParameters failed: %s", err)
  301. }
  302. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  303. if err != nil {
  304. t.Fatalf("MakeDialParameters failed: %s", err)
  305. }
  306. if dialParams.IsReplay {
  307. t.Fatalf("unexpected replay")
  308. }
  309. // Test: no replay after dial parameters expired
  310. dialParams.Succeeded()
  311. time.Sleep(1 * time.Second)
  312. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  313. if err != nil {
  314. t.Fatalf("MakeDialParameters failed: %s", err)
  315. }
  316. if dialParams.IsReplay {
  317. t.Fatalf("unexpected replay")
  318. }
  319. // Test: no replay after server entry changes
  320. dialParams.Succeeded()
  321. serverEntries[0].ConfigurationVersion += 1
  322. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  323. if err != nil {
  324. t.Fatalf("MakeDialParameters failed: %s", err)
  325. }
  326. if dialParams.IsReplay {
  327. t.Fatalf("unexpected replay")
  328. }
  329. // Test: disable replay elements (partial coverage)
  330. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  331. applyParameters[parameters.ReplaySSH] = false
  332. applyParameters[parameters.ReplayObfuscatorPadding] = false
  333. applyParameters[parameters.ReplayFragmentor] = false
  334. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  335. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  336. applyParameters[parameters.ReplayLivenessTest] = false
  337. applyParameters[parameters.ReplayAPIRequestPadding] = false
  338. err = clientConfig.SetParameters("tag3", false, applyParameters)
  339. if err != nil {
  340. t.Fatalf("SetParameters failed: %s", err)
  341. }
  342. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  343. if err != nil {
  344. t.Fatalf("MakeDialParameters failed: %s", err)
  345. }
  346. dialParams.Succeeded()
  347. replayDialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  348. if err != nil {
  349. t.Fatalf("MakeDialParameters failed: %s", err)
  350. }
  351. if !replayDialParams.IsReplay {
  352. t.Fatalf("unexpected non-replay")
  353. }
  354. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  355. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  356. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  357. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  358. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  359. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  360. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  361. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  362. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  363. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  364. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  365. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  366. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  367. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  368. t.Fatalf("unexpected replayed fields")
  369. }
  370. // Test: client-side restrict fronting provider ID
  371. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  372. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  373. err = clientConfig.SetParameters("tag4", false, applyParameters)
  374. if err != nil {
  375. t.Fatalf("SetParameters failed: %s", err)
  376. }
  377. dialParams, err = MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  378. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  379. if err == nil {
  380. if dialParams != nil {
  381. t.Fatalf("unexpected MakeDialParameters success")
  382. }
  383. }
  384. } else {
  385. if err != nil {
  386. t.Fatalf("MakeDialParameters failed: %s", err)
  387. }
  388. }
  389. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  390. err = clientConfig.SetParameters("tag5", false, applyParameters)
  391. if err != nil {
  392. t.Fatalf("SetParameters failed: %s", err)
  393. }
  394. // Test: iterator shuffles
  395. for i, serverEntry := range serverEntries {
  396. data, err := json.Marshal(serverEntry)
  397. if err != nil {
  398. t.Fatalf("json.Marshal failed: %s", err)
  399. }
  400. var serverEntryFields protocol.ServerEntryFields
  401. err = json.Unmarshal(data, &serverEntryFields)
  402. if err != nil {
  403. t.Fatalf("json.Unmarshal failed: %s", err)
  404. }
  405. err = StoreServerEntry(serverEntryFields, false)
  406. if err != nil {
  407. t.Fatalf("StoreServerEntry failed: %s", err)
  408. }
  409. if i%10 == 0 {
  410. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  411. if err != nil {
  412. t.Fatalf("MakeDialParameters failed: %s", err)
  413. }
  414. dialParams.Succeeded()
  415. }
  416. }
  417. for i := 0; i < 5; i++ {
  418. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  419. if err != nil {
  420. t.Fatalf("NewServerEntryIterator failed: %s", err)
  421. }
  422. if hasAffinity {
  423. t.Fatalf("unexpected affinity server")
  424. }
  425. // Test: the first shuffle should move the replay candidates to the front
  426. for j := 0; j < 10; j++ {
  427. serverEntry, err := iterator.Next()
  428. if err != nil {
  429. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  430. }
  431. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  432. if err != nil {
  433. t.Fatalf("MakeDialParameters failed: %s", err)
  434. }
  435. if !dialParams.IsReplay {
  436. t.Fatalf("unexpected non-replay")
  437. }
  438. }
  439. iterator.Reset()
  440. // Test: subsequent shuffles should not move the replay candidates
  441. allReplay := true
  442. for j := 0; j < 10; j++ {
  443. serverEntry, err := iterator.Next()
  444. if err != nil {
  445. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  446. }
  447. dialParams, err := MakeDialParameters(clientConfig, nil, canReplay, selectProtocol, serverEntry, false, 0, 0)
  448. if err != nil {
  449. t.Fatalf("MakeDialParameters failed: %s", err)
  450. }
  451. if !dialParams.IsReplay {
  452. allReplay = false
  453. }
  454. }
  455. if allReplay {
  456. t.Fatalf("unexpected all replay")
  457. }
  458. iterator.Close()
  459. }
  460. }
  461. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  462. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  463. if err != nil {
  464. t.Fatalf("TempDir failed: %s", err)
  465. }
  466. defer os.RemoveAll(testDataDirName)
  467. SetNoticeWriter(ioutil.Discard)
  468. clientConfig := &Config{
  469. PropagationChannelId: "0",
  470. SponsorId: "0",
  471. DataRootDirectory: testDataDirName,
  472. NetworkIDGetter: new(testNetworkGetter),
  473. }
  474. err = clientConfig.Commit(false)
  475. if err != nil {
  476. t.Fatalf("error committing configuration file: %s", err)
  477. }
  478. jsonLimitDialPortNumbers := `
  479. {
  480. "SSH" : [[10,11]],
  481. "OSSH" : [[20,21]],
  482. "QUIC-OSSH" : [[30,31]],
  483. "TAPDANCE-OSSH" : [[40,41]],
  484. "CONJURE-OSSH" : [[50,51]],
  485. "All" : [[60,61],80,443]
  486. }
  487. `
  488. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  489. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  490. if err != nil {
  491. t.Fatalf("Unmarshal failed: %s", err)
  492. }
  493. applyParameters := make(map[string]interface{})
  494. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  495. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  496. err = clientConfig.SetParameters("tag1", false, applyParameters)
  497. if err != nil {
  498. t.Fatalf("SetParameters failed: %s", err)
  499. }
  500. constraints := &protocolSelectionConstraints{
  501. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  502. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  503. }
  504. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  505. return constraints.selectProtocol(0, false, serverEntry)
  506. }
  507. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  508. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  509. continue
  510. }
  511. serverEntries := makeMockServerEntries(tunnelProtocol, "", 100)
  512. selected := false
  513. skipped := false
  514. for _, serverEntry := range serverEntries {
  515. selectedProtocol, ok := selectProtocol(serverEntry)
  516. if ok {
  517. if selectedProtocol != tunnelProtocol {
  518. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  519. }
  520. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  521. if err != nil {
  522. t.Fatalf("GetDialPortNumber failed: %s", err)
  523. }
  524. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  525. t.Fatalf("unexpected dial port number: %d", port)
  526. }
  527. selected = true
  528. } else {
  529. skipped = true
  530. }
  531. }
  532. if !selected {
  533. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  534. }
  535. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  536. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  537. }
  538. }
  539. }
  540. func makeMockServerEntries(
  541. tunnelProtocol string,
  542. frontingProviderID string,
  543. count int) []*protocol.ServerEntry {
  544. serverEntries := make([]*protocol.ServerEntry, count)
  545. for i := 0; i < count; i++ {
  546. serverEntries[i] = &protocol.ServerEntry{
  547. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  548. SshPort: prng.Range(10, 19),
  549. SshObfuscatedPort: prng.Range(20, 29),
  550. SshObfuscatedQUICPort: prng.Range(30, 39),
  551. SshObfuscatedTapDancePort: prng.Range(40, 49),
  552. SshObfuscatedConjurePort: prng.Range(50, 59),
  553. MeekServerPort: prng.Range(60, 69),
  554. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  555. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  556. FrontingProviderID: frontingProviderID,
  557. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  558. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  559. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  560. }
  561. }
  562. return serverEntries
  563. }
  564. func TestMakeHTTPTransformerParameters(t *testing.T) {
  565. type test struct {
  566. name string
  567. frontingProviderID string
  568. isFronted bool
  569. paramValues map[string]interface{}
  570. expectedTransformName string
  571. expectedTransformSpec transforms.Spec
  572. }
  573. tests := []test{
  574. {
  575. name: "unfronted",
  576. frontingProviderID: "",
  577. isFronted: false,
  578. paramValues: map[string]interface{}{
  579. "DirectHTTPProtocolTransformProbability": 1,
  580. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  581. "spec1": {{"A", "B"}},
  582. },
  583. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  584. "": {"spec1"},
  585. },
  586. },
  587. expectedTransformName: "spec1",
  588. expectedTransformSpec: [][2]string{{"A", "B"}},
  589. },
  590. {
  591. name: "fronted",
  592. frontingProviderID: "frontingProvider",
  593. isFronted: true,
  594. paramValues: map[string]interface{}{
  595. "FrontedHTTPProtocolTransformProbability": 1,
  596. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  597. "spec1": {{"A", "B"}},
  598. },
  599. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  600. "frontingProvider": {"spec1"},
  601. },
  602. },
  603. expectedTransformName: "spec1",
  604. expectedTransformSpec: [][2]string{{"A", "B"}},
  605. },
  606. {
  607. name: "no transform, coinflip false",
  608. frontingProviderID: "frontingProvider",
  609. isFronted: false,
  610. paramValues: map[string]interface{}{
  611. "DirectHTTPProtocolTransformProbability": 0,
  612. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  613. "spec1": {{"A", "B"}},
  614. },
  615. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  616. "frontingProvider": {"spec1"},
  617. },
  618. },
  619. expectedTransformName: "",
  620. expectedTransformSpec: nil,
  621. },
  622. }
  623. for _, tt := range tests {
  624. t.Run(tt.name, func(t *testing.T) {
  625. params, err := parameters.NewParameters(nil)
  626. if err != nil {
  627. t.Fatalf("parameters.NewParameters failed %v", err)
  628. }
  629. _, err = params.Set("", false, tt.paramValues)
  630. if err != nil {
  631. t.Fatalf("params.Set failed %v", err)
  632. }
  633. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  634. if err != nil {
  635. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  636. }
  637. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  638. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  639. }
  640. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  641. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  642. }
  643. if httpTransformerParams.ProtocolTransformSpec != nil {
  644. if httpTransformerParams.ProtocolTransformSeed == nil {
  645. t.Fatalf("expected non-nil seed")
  646. }
  647. }
  648. })
  649. }
  650. }