dialParameters_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "testing"
  27. "time"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  33. )
  34. func TestDialParametersAndReplay(t *testing.T) {
  35. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  36. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  37. runDialParametersAndReplay(t, tunnelProtocol)
  38. }
  39. }
  40. }
  41. var testNetworkID = prng.HexString(8)
  42. type testNetworkGetter struct {
  43. }
  44. func (t *testNetworkGetter) GetNetworkID() string {
  45. return testNetworkID
  46. }
  47. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  48. t.Logf("Test %s...", tunnelProtocol)
  49. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  50. if err != nil {
  51. t.Fatalf("TempDir failed: %s", err)
  52. }
  53. defer os.RemoveAll(testDataDirName)
  54. SetNoticeWriter(ioutil.Discard)
  55. clientConfig := &Config{
  56. PropagationChannelId: "0",
  57. SponsorId: "0",
  58. DataRootDirectory: testDataDirName,
  59. NetworkIDGetter: new(testNetworkGetter),
  60. }
  61. err = clientConfig.Commit(false)
  62. if err != nil {
  63. t.Fatalf("error committing configuration file: %s", err)
  64. }
  65. applyParameters := make(map[string]interface{})
  66. applyParameters[parameters.TransformHostNameProbability] = 1.0
  67. applyParameters[parameters.PickUserAgentProbability] = 1.0
  68. err = clientConfig.SetClientParameters("tag1", true, applyParameters)
  69. if err != nil {
  70. t.Fatalf("SetClientParameters failed: %s", err)
  71. }
  72. err = OpenDataStore(clientConfig)
  73. if err != nil {
  74. t.Fatalf("error initializing client datastore: %s", err)
  75. }
  76. defer CloseDataStore()
  77. serverEntries := makeMockServerEntries(tunnelProtocol, 100)
  78. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  79. return replayProtocol == tunnelProtocol
  80. }
  81. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  82. return tunnelProtocol, true
  83. }
  84. values.SetSSHClientVersionsSpec(
  85. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  86. values.SetUserAgentsSpec(
  87. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  88. // Test: expected dial parameter fields set
  89. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  90. if err != nil {
  91. t.Fatalf("MakeDialParameters failed: %s", err)
  92. }
  93. if dialParams.ServerEntry != serverEntries[0] {
  94. t.Fatalf("unexpected server entry")
  95. }
  96. if dialParams.NetworkID != testNetworkID {
  97. t.Fatalf("unexpected network ID")
  98. }
  99. if dialParams.IsReplay {
  100. t.Fatalf("unexpected replay")
  101. }
  102. if dialParams.TunnelProtocol != tunnelProtocol {
  103. t.Fatalf("unexpected tunnel protocol")
  104. }
  105. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  106. dialParams.DirectDialAddress == "" {
  107. t.Fatalf("missing direct dial fields")
  108. }
  109. if dialParams.DialPortNumber == "" {
  110. t.Fatalf("missing port number fields")
  111. }
  112. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  113. t.Fatalf("missing SSH fields")
  114. }
  115. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  116. dialParams.ObfuscatorPaddingSeed == nil {
  117. t.Fatalf("missing obfuscator fields")
  118. }
  119. if dialParams.FragmentorSeed == nil {
  120. t.Fatalf("missing fragmentor field")
  121. }
  122. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  123. (dialParams.MeekDialAddress == "" ||
  124. dialParams.MeekHostHeader == "" ||
  125. dialParams.MeekObfuscatorPaddingSeed == nil) {
  126. t.Fatalf("missing meek fields")
  127. }
  128. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  129. (dialParams.MeekFrontingDialAddress == "" ||
  130. dialParams.MeekFrontingHost == "") {
  131. t.Fatalf("missing meek fronting fields")
  132. }
  133. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  134. dialParams.UserAgent == "" {
  135. t.Fatalf("missing meek HTTP fields")
  136. }
  137. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  138. (dialParams.MeekSNIServerName == "" ||
  139. !dialParams.SelectedTLSProfile ||
  140. dialParams.TLSProfile == "") {
  141. t.Fatalf("missing meek HTTPS fields")
  142. }
  143. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  144. if dialParams.QUICVersion == "" {
  145. t.Fatalf("missing QUIC version field")
  146. }
  147. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  148. if dialParams.MeekFrontingDialAddress == "" ||
  149. dialParams.MeekFrontingHost == "" ||
  150. dialParams.MeekSNIServerName == "" {
  151. t.Fatalf("missing fronted QUIC fields")
  152. }
  153. } else {
  154. if dialParams.QUICDialSNIAddress == "" {
  155. t.Fatalf("missing QUIC SNI field")
  156. }
  157. }
  158. }
  159. if dialParams.LivenessTestSeed == nil {
  160. t.Fatalf("missing liveness test fields")
  161. }
  162. if dialParams.APIRequestPaddingSeed == nil {
  163. t.Fatalf("missing API request fields")
  164. }
  165. // Test: no replay after dial reported to fail
  166. dialParams.Failed(clientConfig)
  167. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  168. if err != nil {
  169. t.Fatalf("MakeDialParameters failed: %s", err)
  170. }
  171. if dialParams.IsReplay {
  172. t.Fatalf("unexpected replay")
  173. }
  174. // Test: no replay after network ID changes
  175. dialParams.Succeeded()
  176. testNetworkID = prng.HexString(8)
  177. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  178. if err != nil {
  179. t.Fatalf("MakeDialParameters failed: %s", err)
  180. }
  181. if dialParams.NetworkID != testNetworkID {
  182. t.Fatalf("unexpected network ID")
  183. }
  184. if dialParams.IsReplay {
  185. t.Fatalf("unexpected replay")
  186. }
  187. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  188. dialParams.Succeeded()
  189. replayDialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  190. if err != nil {
  191. t.Fatalf("MakeDialParameters failed: %s", err)
  192. }
  193. if !replayDialParams.IsReplay {
  194. t.Fatalf("unexpected non-replay")
  195. }
  196. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  197. t.Fatalf("unexpected non-updated timestamp")
  198. }
  199. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  200. t.Fatalf("mismatching tunnel protocol")
  201. }
  202. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  203. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  204. t.Fatalf("mismatching dial fields")
  205. }
  206. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  207. if seed1 == nil {
  208. return seed2 == nil
  209. }
  210. return bytes.Equal(seed1[:], seed2[:])
  211. }
  212. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  213. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  214. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  215. t.Fatalf("mismatching SSH fields")
  216. }
  217. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  218. t.Fatalf("mismatching obfuscator fields")
  219. }
  220. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  221. t.Fatalf("mismatching fragmentor fields")
  222. }
  223. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  224. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  225. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  226. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  227. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  228. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  229. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  230. t.Fatalf("mismatching meek fields")
  231. }
  232. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  233. replayDialParams.UserAgent != dialParams.UserAgent {
  234. t.Fatalf("mismatching user agent fields")
  235. }
  236. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  237. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  238. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  239. t.Fatalf("mismatching TLS fields")
  240. }
  241. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  242. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  243. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  244. t.Fatalf("mismatching QUIC fields")
  245. }
  246. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  247. t.Fatalf("mismatching liveness test fields")
  248. }
  249. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  250. t.Fatalf("mismatching API request fields")
  251. }
  252. // Test: no replay after change tactics
  253. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  254. err = clientConfig.SetClientParameters("tag2", true, applyParameters)
  255. if err != nil {
  256. t.Fatalf("SetClientParameters failed: %s", err)
  257. }
  258. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  259. if err != nil {
  260. t.Fatalf("MakeDialParameters failed: %s", err)
  261. }
  262. if dialParams.IsReplay {
  263. t.Fatalf("unexpected replay")
  264. }
  265. // Test: no replay after dial parameters expired
  266. dialParams.Succeeded()
  267. time.Sleep(1 * time.Second)
  268. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  269. if err != nil {
  270. t.Fatalf("MakeDialParameters failed: %s", err)
  271. }
  272. if dialParams.IsReplay {
  273. t.Fatalf("unexpected replay")
  274. }
  275. // Test: no replay after server entry changes
  276. dialParams.Succeeded()
  277. serverEntries[0].ConfigurationVersion += 1
  278. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  279. if err != nil {
  280. t.Fatalf("MakeDialParameters failed: %s", err)
  281. }
  282. if dialParams.IsReplay {
  283. t.Fatalf("unexpected replay")
  284. }
  285. // Test: disable replay elements (partial coverage)
  286. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  287. applyParameters[parameters.ReplaySSH] = false
  288. applyParameters[parameters.ReplayObfuscatorPadding] = false
  289. applyParameters[parameters.ReplayFragmentor] = false
  290. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  291. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  292. applyParameters[parameters.ReplayLivenessTest] = false
  293. applyParameters[parameters.ReplayAPIRequestPadding] = false
  294. err = clientConfig.SetClientParameters("tag3", true, applyParameters)
  295. if err != nil {
  296. t.Fatalf("SetClientParameters failed: %s", err)
  297. }
  298. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  299. if err != nil {
  300. t.Fatalf("MakeDialParameters failed: %s", err)
  301. }
  302. dialParams.Succeeded()
  303. replayDialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false, 0, 0)
  304. if err != nil {
  305. t.Fatalf("MakeDialParameters failed: %s", err)
  306. }
  307. if !replayDialParams.IsReplay {
  308. t.Fatalf("unexpected non-replay")
  309. }
  310. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  311. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  312. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  313. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  314. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  315. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  316. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  317. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  318. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  319. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  320. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  321. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  322. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  323. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  324. t.Fatalf("unexpected replayed fields")
  325. }
  326. // Test: iterator shuffles
  327. for i, serverEntry := range serverEntries {
  328. data, err := json.Marshal(serverEntry)
  329. if err != nil {
  330. t.Fatalf("json.Marshal failed: %s", err)
  331. }
  332. var serverEntryFields protocol.ServerEntryFields
  333. err = json.Unmarshal(data, &serverEntryFields)
  334. if err != nil {
  335. t.Fatalf("json.Unmarshal failed: %s", err)
  336. }
  337. err = StoreServerEntry(serverEntryFields, false)
  338. if err != nil {
  339. t.Fatalf("StoreServerEntry failed: %s", err)
  340. }
  341. if i%10 == 0 {
  342. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0, 0)
  343. if err != nil {
  344. t.Fatalf("MakeDialParameters failed: %s", err)
  345. }
  346. dialParams.Succeeded()
  347. }
  348. }
  349. for i := 0; i < 5; i++ {
  350. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  351. if err != nil {
  352. t.Fatalf("NewServerEntryIterator failed: %s", err)
  353. }
  354. if hasAffinity {
  355. t.Fatalf("unexpected affinity server")
  356. }
  357. // Test: the first shuffle should move the replay candidates to the front
  358. for j := 0; j < 10; j++ {
  359. serverEntry, err := iterator.Next()
  360. if err != nil {
  361. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  362. }
  363. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0, 0)
  364. if err != nil {
  365. t.Fatalf("MakeDialParameters failed: %s", err)
  366. }
  367. if !dialParams.IsReplay {
  368. t.Fatalf("unexpected non-replay")
  369. }
  370. }
  371. iterator.Reset()
  372. // Test: subsequent shuffles should not move the replay candidates
  373. allReplay := true
  374. for j := 0; j < 10; j++ {
  375. serverEntry, err := iterator.Next()
  376. if err != nil {
  377. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  378. }
  379. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false, 0, 0)
  380. if err != nil {
  381. t.Fatalf("MakeDialParameters failed: %s", err)
  382. }
  383. if !dialParams.IsReplay {
  384. allReplay = false
  385. }
  386. }
  387. if allReplay {
  388. t.Fatalf("unexpected all replay")
  389. }
  390. iterator.Close()
  391. }
  392. }
  393. func makeMockServerEntries(tunnelProtocol string, count int) []*protocol.ServerEntry {
  394. serverEntries := make([]*protocol.ServerEntry, count)
  395. for i := 0; i < count; i++ {
  396. serverEntries[i] = &protocol.ServerEntry{
  397. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  398. SshPort: 1,
  399. SshObfuscatedPort: 2,
  400. SshObfuscatedQUICPort: 3,
  401. SshObfuscatedTapdancePort: 4,
  402. MeekServerPort: 5,
  403. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  404. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  405. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  406. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  407. }
  408. }
  409. return serverEntries
  410. }