dialParameters_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "testing"
  27. "time"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  32. )
  33. func TestDialParametersAndReplay(t *testing.T) {
  34. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  35. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  36. runDialParametersAndReplay(t, tunnelProtocol)
  37. }
  38. }
  39. }
  40. var testNetworkID = prng.HexString(8)
  41. type testNetworkGetter struct {
  42. }
  43. func (t *testNetworkGetter) GetNetworkID() string {
  44. return testNetworkID
  45. }
  46. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  47. t.Logf("Test %s...", tunnelProtocol)
  48. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  49. if err != nil {
  50. t.Fatalf("TempDir failed: %s", err)
  51. }
  52. defer os.RemoveAll(testDataDirName)
  53. SetNoticeWriter(ioutil.Discard)
  54. clientConfig := &Config{
  55. PropagationChannelId: "0",
  56. SponsorId: "0",
  57. DataStoreDirectory: testDataDirName,
  58. NetworkIDGetter: new(testNetworkGetter),
  59. }
  60. err = clientConfig.Commit()
  61. if err != nil {
  62. t.Fatalf("error committing configuration file: %s", err)
  63. }
  64. applyParameters := make(map[string]interface{})
  65. applyParameters[parameters.TransformHostNameProbability] = 1.0
  66. applyParameters[parameters.PickUserAgentProbability] = 1.0
  67. err = clientConfig.SetClientParameters("tag1", true, applyParameters)
  68. if err != nil {
  69. t.Fatalf("SetClientParameters failed: %s", err)
  70. }
  71. err = OpenDataStore(clientConfig)
  72. if err != nil {
  73. t.Fatalf("error initializing client datastore: %s", err)
  74. }
  75. defer CloseDataStore()
  76. serverEntries := makeMockServerEntries(tunnelProtocol, 100)
  77. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  78. return replayProtocol == tunnelProtocol
  79. }
  80. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  81. return tunnelProtocol, true
  82. }
  83. RegisterSSHClientVersionPicker(func() string {
  84. versions := []string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}
  85. return versions[prng.Intn(len(versions))]
  86. })
  87. RegisterUserAgentPicker(func() string {
  88. versions := []string{"ua1", "ua2", "ua3"}
  89. return versions[prng.Intn(len(versions))]
  90. })
  91. // Test: expected dial parameter fields set
  92. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  93. if err != nil {
  94. t.Fatalf("MakeDialParameters failed: %s", err)
  95. }
  96. if dialParams.ServerEntry != serverEntries[0] {
  97. t.Fatalf("unexpected server entry")
  98. }
  99. if dialParams.NetworkID != testNetworkID {
  100. t.Fatalf("unexpected network ID")
  101. }
  102. if dialParams.IsReplay {
  103. t.Fatalf("unexpected replay")
  104. }
  105. if dialParams.TunnelProtocol != tunnelProtocol {
  106. t.Fatalf("unexpected tunnel protocol")
  107. }
  108. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  109. dialParams.DirectDialAddress == "" {
  110. t.Fatalf("missing direct dial fields")
  111. }
  112. if dialParams.DialPortNumber == "" {
  113. t.Fatalf("missing port number fields")
  114. }
  115. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  116. t.Fatalf("missing SSH fields")
  117. }
  118. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  119. dialParams.ObfuscatorPaddingSeed == nil {
  120. t.Fatalf("missing obfuscator fields")
  121. }
  122. if dialParams.FragmentorSeed == nil {
  123. t.Fatalf("missing fragmentor field")
  124. }
  125. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  126. (dialParams.MeekDialAddress == "" ||
  127. dialParams.MeekHostHeader == "" ||
  128. dialParams.MeekObfuscatorPaddingSeed == nil) {
  129. t.Fatalf("missing meek fields")
  130. }
  131. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  132. (dialParams.MeekFrontingDialAddress == "" ||
  133. dialParams.MeekFrontingHost == "") {
  134. t.Fatalf("missing meek fronting fields")
  135. }
  136. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  137. dialParams.UserAgent == "" {
  138. t.Fatalf("missing meek HTTP fields")
  139. }
  140. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  141. (dialParams.MeekSNIServerName == "" ||
  142. !dialParams.SelectedTLSProfile ||
  143. dialParams.TLSProfile == "") {
  144. t.Fatalf("missing meek HTTPS fields")
  145. }
  146. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  147. if dialParams.QUICVersion == "" {
  148. t.Fatalf("missing QUIC version field")
  149. }
  150. if protocol.TunnelProtocolUsesFrontedQUIC(tunnelProtocol) {
  151. if dialParams.MeekFrontingDialAddress == "" ||
  152. dialParams.MeekFrontingHost == "" ||
  153. dialParams.MeekSNIServerName == "" {
  154. t.Fatalf("missing fronted QUIC fields")
  155. }
  156. } else {
  157. if dialParams.QUICDialSNIAddress == "" {
  158. t.Fatalf("missing QUIC SNI field")
  159. }
  160. }
  161. }
  162. if dialParams.LivenessTestSeed == nil {
  163. t.Fatalf("missing liveness test fields")
  164. }
  165. if dialParams.APIRequestPaddingSeed == nil {
  166. t.Fatalf("missing API request fields")
  167. }
  168. // Test: no replay after dial reported to fail
  169. dialParams.Failed(clientConfig)
  170. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  171. if err != nil {
  172. t.Fatalf("MakeDialParameters failed: %s", err)
  173. }
  174. if dialParams.IsReplay {
  175. t.Fatalf("unexpected replay")
  176. }
  177. // Test: no replay after network ID changes
  178. dialParams.Succeeded()
  179. testNetworkID = prng.HexString(8)
  180. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  181. if err != nil {
  182. t.Fatalf("MakeDialParameters failed: %s", err)
  183. }
  184. if dialParams.NetworkID != testNetworkID {
  185. t.Fatalf("unexpected network ID")
  186. }
  187. if dialParams.IsReplay {
  188. t.Fatalf("unexpected replay")
  189. }
  190. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  191. dialParams.Succeeded()
  192. replayDialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  193. if err != nil {
  194. t.Fatalf("MakeDialParameters failed: %s", err)
  195. }
  196. if !replayDialParams.IsReplay {
  197. t.Fatalf("unexpected non-replay")
  198. }
  199. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  200. t.Fatalf("unexpected non-updated timestamp")
  201. }
  202. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  203. t.Fatalf("mismatching tunnel protocol")
  204. }
  205. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  206. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  207. t.Fatalf("mismatching dial fields")
  208. }
  209. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  210. if seed1 == nil {
  211. return seed2 == nil
  212. }
  213. return bytes.Compare(seed1[:], seed2[:]) == 0
  214. }
  215. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  216. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  217. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  218. t.Fatalf("mismatching SSH fields")
  219. }
  220. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  221. t.Fatalf("mismatching obfuscator fields")
  222. }
  223. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  224. t.Fatalf("mismatching fragmentor fields")
  225. }
  226. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  227. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  228. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  229. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  230. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  231. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  232. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  233. t.Fatalf("mismatching meek fields")
  234. }
  235. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  236. replayDialParams.UserAgent != dialParams.UserAgent {
  237. t.Fatalf("mismatching user agent fields")
  238. }
  239. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  240. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  241. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  242. t.Fatalf("mismatching TLS fields")
  243. }
  244. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  245. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  246. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  247. t.Fatalf("mismatching QUIC fields")
  248. }
  249. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  250. t.Fatalf("mismatching liveness test fields")
  251. }
  252. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  253. t.Fatalf("mismatching API request fields")
  254. }
  255. // Test: no replay after change tactics
  256. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  257. err = clientConfig.SetClientParameters("tag2", true, applyParameters)
  258. if err != nil {
  259. t.Fatalf("SetClientParameters failed: %s", err)
  260. }
  261. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  262. if err != nil {
  263. t.Fatalf("MakeDialParameters failed: %s", err)
  264. }
  265. if dialParams.IsReplay {
  266. t.Fatalf("unexpected replay")
  267. }
  268. // Test: no replay after dial parameters expired
  269. dialParams.Succeeded()
  270. time.Sleep(1 * time.Second)
  271. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  272. if err != nil {
  273. t.Fatalf("MakeDialParameters failed: %s", err)
  274. }
  275. if dialParams.IsReplay {
  276. t.Fatalf("unexpected replay")
  277. }
  278. // Test: no replay after server entry changes
  279. dialParams.Succeeded()
  280. serverEntries[0].ConfigurationVersion += 1
  281. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  282. if err != nil {
  283. t.Fatalf("MakeDialParameters failed: %s", err)
  284. }
  285. if dialParams.IsReplay {
  286. t.Fatalf("unexpected replay")
  287. }
  288. // Test: disable replay elements (partial coverage)
  289. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  290. applyParameters[parameters.ReplaySSH] = false
  291. applyParameters[parameters.ReplayObfuscatorPadding] = false
  292. applyParameters[parameters.ReplayFragmentor] = false
  293. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  294. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  295. applyParameters[parameters.ReplayLivenessTest] = false
  296. applyParameters[parameters.ReplayAPIRequestPadding] = false
  297. err = clientConfig.SetClientParameters("tag3", true, applyParameters)
  298. if err != nil {
  299. t.Fatalf("SetClientParameters failed: %s", err)
  300. }
  301. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  302. if err != nil {
  303. t.Fatalf("MakeDialParameters failed: %s", err)
  304. }
  305. dialParams.Succeeded()
  306. replayDialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0)
  307. if err != nil {
  308. t.Fatalf("MakeDialParameters failed: %s", err)
  309. }
  310. if !replayDialParams.IsReplay {
  311. t.Fatalf("unexpected non-replay")
  312. }
  313. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  314. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  315. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  316. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  317. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  318. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  319. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  320. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  321. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  322. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  323. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  324. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  325. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  326. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  327. t.Fatalf("unexpected replayed fields")
  328. }
  329. // Test: iterator shuffles
  330. for i, serverEntry := range serverEntries {
  331. data, err := json.Marshal(serverEntry)
  332. if err != nil {
  333. t.Fatalf("json.Marshal failed: %s", err)
  334. }
  335. var serverEntryFields protocol.ServerEntryFields
  336. err = json.Unmarshal(data, &serverEntryFields)
  337. if err != nil {
  338. t.Fatalf("json.Unmarshal failed: %s", err)
  339. }
  340. err = StoreServerEntry(serverEntryFields, false)
  341. if err != nil {
  342. t.Fatalf("StoreServerEntry failed: %s", err)
  343. }
  344. if i%10 == 0 {
  345. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0)
  346. if err != nil {
  347. t.Fatalf("MakeDialParameters failed: %s", err)
  348. }
  349. dialParams.Succeeded()
  350. }
  351. }
  352. for i := 0; i < 5; i++ {
  353. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  354. if err != nil {
  355. t.Fatalf("NewServerEntryIterator failed: %s", err)
  356. }
  357. if hasAffinity {
  358. t.Fatalf("unexpected affinity server")
  359. }
  360. // Test: the first shuffle should move the replay candidates to the front
  361. for j := 0; j < 10; j++ {
  362. serverEntry, err := iterator.Next()
  363. if err != nil {
  364. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  365. }
  366. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0)
  367. if err != nil {
  368. t.Fatalf("MakeDialParameters failed: %s", err)
  369. }
  370. if !dialParams.IsReplay {
  371. t.Fatalf("unexpected non-replay")
  372. }
  373. }
  374. iterator.Reset()
  375. // Test: subsequent shuffles should not move the replay candidates
  376. allReplay := true
  377. for j := 0; j < 10; j++ {
  378. serverEntry, err := iterator.Next()
  379. if err != nil {
  380. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  381. }
  382. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0)
  383. if err != nil {
  384. t.Fatalf("MakeDialParameters failed: %s", err)
  385. }
  386. if !dialParams.IsReplay {
  387. allReplay = false
  388. }
  389. }
  390. if allReplay {
  391. t.Fatalf("unexpected all replay")
  392. }
  393. iterator.Close()
  394. }
  395. }
  396. func makeMockServerEntries(tunnelProtocol string, count int) []*protocol.ServerEntry {
  397. serverEntries := make([]*protocol.ServerEntry, count)
  398. for i := 0; i < count; i++ {
  399. serverEntries[i] = &protocol.ServerEntry{
  400. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  401. SshPort: 1,
  402. SshObfuscatedPort: 2,
  403. SshObfuscatedQUICPort: 3,
  404. SshObfuscatedTapdancePort: 4,
  405. MeekServerPort: 5,
  406. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  407. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  408. }
  409. }
  410. return serverEntries
  411. }