dialParameters_test.go 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "context"
  23. "encoding/json"
  24. "fmt"
  25. "io/ioutil"
  26. "os"
  27. "reflect"
  28. "testing"
  29. "time"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  32. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  33. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  34. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/transforms"
  35. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/values"
  36. lrucache "github.com/cognusion/go-cache-lru"
  37. )
  38. func TestDialParametersAndReplay(t *testing.T) {
  39. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  40. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  41. runDialParametersAndReplay(t, tunnelProtocol)
  42. }
  43. }
  44. }
  45. var testNetworkID = prng.HexString(8)
  46. type testNetworkGetter struct {
  47. }
  48. func (t *testNetworkGetter) GetNetworkID() string {
  49. return testNetworkID
  50. }
  51. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  52. t.Logf("Test %s...", tunnelProtocol)
  53. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  54. if err != nil {
  55. t.Fatalf("TempDir failed: %s", err)
  56. }
  57. defer os.RemoveAll(testDataDirName)
  58. SetNoticeWriter(ioutil.Discard)
  59. clientConfig := &Config{
  60. PropagationChannelId: "0",
  61. SponsorId: "0",
  62. DataRootDirectory: testDataDirName,
  63. NetworkIDGetter: new(testNetworkGetter),
  64. }
  65. err = clientConfig.Commit(false)
  66. if err != nil {
  67. t.Fatalf("error committing configuration file: %s", err)
  68. }
  69. holdOffTunnelProtocols := protocol.TunnelProtocols{protocol.TUNNEL_PROTOCOL_OBFUSCATED_SSH}
  70. providerID := prng.HexString(8)
  71. frontingProviderID := prng.HexString(8)
  72. var holdOffDirectTunnelProviderRegions parameters.KeyStrings
  73. if tunnelProtocol == protocol.TUNNEL_PROTOCOL_UNFRONTED_MEEK {
  74. holdOffDirectTunnelProviderRegions = map[string][]string{providerID: {""}}
  75. }
  76. applyParameters := make(map[string]interface{})
  77. applyParameters[parameters.TransformHostNameProbability] = 1.0
  78. applyParameters[parameters.PickUserAgentProbability] = 1.0
  79. applyParameters[parameters.HoldOffTunnelMinDuration] = "1ms"
  80. applyParameters[parameters.HoldOffTunnelMaxDuration] = "10ms"
  81. applyParameters[parameters.HoldOffTunnelProtocols] = holdOffTunnelProtocols
  82. applyParameters[parameters.HoldOffTunnelFrontingProviderIDs] = []string{frontingProviderID}
  83. applyParameters[parameters.HoldOffTunnelProbability] = 1.0
  84. applyParameters[parameters.HoldOffDirectTunnelMinDuration] = "1ms"
  85. applyParameters[parameters.HoldOffDirectTunnelMaxDuration] = "10ms"
  86. applyParameters[parameters.HoldOffDirectTunnelProviderRegions] = holdOffDirectTunnelProviderRegions
  87. applyParameters[parameters.HoldOffDirectTunnelProbability] = 1.0
  88. applyParameters[parameters.DNSResolverAlternateServers] = []string{"127.0.0.1", "127.0.0.2", "127.0.0.3"}
  89. applyParameters[parameters.DirectHTTPProtocolTransformProbability] = 1.0
  90. applyParameters[parameters.DirectHTTPProtocolTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  91. applyParameters[parameters.DirectHTTPProtocolTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  92. applyParameters[parameters.OSSHObfuscatorSeedTransformProbability] = 1.0
  93. applyParameters[parameters.OSSHObfuscatorSeedTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  94. applyParameters[parameters.OSSHObfuscatorSeedTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  95. applyParameters[parameters.ObfuscatedQUICNonceTransformProbability] = 1.0
  96. applyParameters[parameters.ObfuscatedQUICNonceTransformSpecs] = transforms.Specs{"spec": transforms.Spec{{"", ""}}}
  97. applyParameters[parameters.ObfuscatedQUICNonceTransformScopedSpecNames] = transforms.ScopedSpecNames{"": {"spec"}}
  98. err = clientConfig.SetParameters("tag1", false, applyParameters)
  99. if err != nil {
  100. t.Fatalf("SetParameters failed: %s", err)
  101. }
  102. resolver := NewResolver(clientConfig, true)
  103. defer resolver.Stop()
  104. clientConfig.SetResolver(resolver)
  105. err = OpenDataStore(clientConfig)
  106. if err != nil {
  107. t.Fatalf("error initializing client datastore: %s", err)
  108. }
  109. defer CloseDataStore()
  110. serverEntries := makeMockServerEntries(tunnelProtocol, "CA", providerID, frontingProviderID, 100)
  111. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  112. return replayProtocol == tunnelProtocol
  113. }
  114. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  115. return tunnelProtocol, true
  116. }
  117. values.SetSSHClientVersionsSpec(
  118. values.NewPickOneSpec([]string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}))
  119. values.SetUserAgentsSpec(
  120. values.NewPickOneSpec([]string{"ua1", "ua2", "ua3"}))
  121. // Test: expected dial parameter fields set
  122. steeringIPCache := lrucache.NewWithLRU(1*time.Hour, 1*time.Hour, 0)
  123. upstreamProxyErrorCallback := func(_ error) {}
  124. dialParams, err := MakeDialParameters(
  125. clientConfig, steeringIPCache, nil, nil, upstreamProxyErrorCallback, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  126. if err != nil {
  127. t.Fatalf("MakeDialParameters failed: %s", err)
  128. }
  129. if dialParams.ServerEntry != serverEntries[0] {
  130. t.Fatalf("unexpected server entry")
  131. }
  132. if dialParams.NetworkID != testNetworkID {
  133. t.Fatalf("unexpected network ID")
  134. }
  135. if dialParams.IsReplay {
  136. t.Fatalf("unexpected replay")
  137. }
  138. if dialParams.TunnelProtocol != tunnelProtocol {
  139. t.Fatalf("unexpected tunnel protocol")
  140. }
  141. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  142. dialParams.DirectDialAddress == "" {
  143. t.Fatalf("missing direct dial fields")
  144. }
  145. if dialParams.DialPortNumber == "" {
  146. t.Fatalf("missing port number fields")
  147. }
  148. if !dialParams.SelectedSSHClientVersion || dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  149. t.Fatalf("missing SSH fields")
  150. }
  151. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  152. dialParams.ObfuscatorPaddingSeed == nil {
  153. t.Fatalf("missing obfuscator fields")
  154. }
  155. if dialParams.FragmentorSeed == nil {
  156. t.Fatalf("missing fragmentor field")
  157. }
  158. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  159. (dialParams.MeekDialAddress == "" ||
  160. dialParams.MeekHostHeader == "" ||
  161. dialParams.MeekObfuscatorPaddingSeed == nil) {
  162. t.Fatalf("missing meek fields")
  163. }
  164. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  165. (dialParams.MeekFrontingDialAddress == "" ||
  166. dialParams.MeekFrontingHost == "" ||
  167. dialParams.ResolveParameters == nil) {
  168. t.Fatalf("missing meek fronting fields")
  169. }
  170. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  171. dialParams.UserAgent == "" {
  172. t.Fatalf("missing meek HTTP fields")
  173. }
  174. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  175. (dialParams.MeekSNIServerName == "" ||
  176. !dialParams.SelectedTLSProfile ||
  177. dialParams.TLSProfile == "") {
  178. t.Fatalf("missing meek HTTPS fields")
  179. }
  180. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) {
  181. if dialParams.QUICVersion == "" {
  182. t.Fatalf("missing QUIC version field")
  183. }
  184. if protocol.TunnelProtocolUsesFrontedMeekQUIC(tunnelProtocol) {
  185. if dialParams.MeekFrontingDialAddress == "" ||
  186. dialParams.MeekFrontingHost == "" ||
  187. dialParams.MeekSNIServerName == "" {
  188. t.Fatalf("missing fronted QUIC fields")
  189. }
  190. } else {
  191. if dialParams.QUICDialSNIAddress == "" {
  192. t.Fatalf("missing QUIC SNI field")
  193. }
  194. }
  195. }
  196. if dialParams.LivenessTestSeed == nil {
  197. t.Fatalf("missing liveness test fields")
  198. }
  199. if dialParams.APIRequestPaddingSeed == nil {
  200. t.Fatalf("missing API request fields")
  201. }
  202. expectHoldOffTunnelProtocols := common.Contains(holdOffTunnelProtocols, tunnelProtocol)
  203. expectHoldOffTunnelFrontingProviderIDs := protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol)
  204. expectHoldOffDirectTunnelProviderRegion := protocol.TunnelProtocolIsDirect(tunnelProtocol) &&
  205. common.ContainsAny(
  206. holdOffDirectTunnelProviderRegions[dialParams.ServerEntry.ProviderID],
  207. []string{"", dialParams.ServerEntry.Region})
  208. if expectHoldOffTunnelProtocols ||
  209. expectHoldOffTunnelFrontingProviderIDs ||
  210. expectHoldOffDirectTunnelProviderRegion {
  211. if dialParams.HoldOffTunnelDuration < 1*time.Millisecond ||
  212. dialParams.HoldOffTunnelDuration > 10*time.Millisecond {
  213. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  214. }
  215. } else {
  216. if dialParams.HoldOffTunnelDuration != 0 {
  217. t.Fatalf("unexpected hold-off duration: %v", dialParams.HoldOffTunnelDuration)
  218. }
  219. }
  220. dialConfig := dialParams.GetDialConfig()
  221. if dialConfig.UpstreamProxyErrorCallback == nil {
  222. t.Fatalf("missing upstreamProxyErrorCallback")
  223. }
  224. // Test: no replay after dial reported to fail
  225. dialParams.Failed(clientConfig)
  226. dialParams, err = MakeDialParameters(
  227. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  228. if err != nil {
  229. t.Fatalf("MakeDialParameters failed: %s", err)
  230. }
  231. if dialParams.IsReplay {
  232. t.Fatalf("unexpected replay")
  233. }
  234. // Test: no replay after network ID changes
  235. dialParams.Succeeded()
  236. testNetworkID = prng.HexString(8)
  237. dialParams, err = MakeDialParameters(
  238. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  239. if err != nil {
  240. t.Fatalf("MakeDialParameters failed: %s", err)
  241. }
  242. if dialParams.NetworkID != testNetworkID {
  243. t.Fatalf("unexpected network ID")
  244. }
  245. if dialParams.IsReplay {
  246. t.Fatalf("unexpected replay")
  247. }
  248. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  249. dialParams.Succeeded()
  250. replayDialParams, err := MakeDialParameters(
  251. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  252. if err != nil {
  253. t.Fatalf("MakeDialParameters failed: %s", err)
  254. }
  255. if !replayDialParams.IsReplay {
  256. t.Fatalf("unexpected non-replay")
  257. }
  258. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  259. t.Fatalf("unexpected non-updated timestamp")
  260. }
  261. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  262. t.Fatalf("mismatching tunnel protocol")
  263. }
  264. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  265. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  266. t.Fatalf("mismatching dial fields")
  267. }
  268. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  269. if seed1 == nil {
  270. return seed2 == nil
  271. }
  272. return bytes.Equal(seed1[:], seed2[:])
  273. }
  274. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  275. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  276. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  277. t.Fatalf("mismatching SSH fields")
  278. }
  279. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  280. t.Fatalf("mismatching obfuscator fields")
  281. }
  282. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  283. t.Fatalf("mismatching fragmentor fields")
  284. }
  285. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  286. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  287. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  288. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  289. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  290. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  291. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  292. t.Fatalf("mismatching meek fields")
  293. }
  294. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  295. replayDialParams.UserAgent != dialParams.UserAgent {
  296. t.Fatalf("mismatching user agent fields")
  297. }
  298. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  299. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  300. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  301. t.Fatalf("mismatching TLS fields")
  302. }
  303. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  304. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  305. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  306. t.Fatalf("mismatching QUIC fields")
  307. }
  308. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  309. t.Fatalf("mismatching liveness test fields")
  310. }
  311. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  312. t.Fatalf("mismatching API request fields")
  313. }
  314. if (replayDialParams.ResolveParameters == nil) != (dialParams.ResolveParameters == nil) ||
  315. (replayDialParams.ResolveParameters != nil &&
  316. !reflect.DeepEqual(replayDialParams.ResolveParameters, dialParams.ResolveParameters)) {
  317. t.Fatalf("mismatching ResolveParameters fields")
  318. }
  319. if (replayDialParams.HTTPTransformerParameters == nil) != (dialParams.HTTPTransformerParameters == nil) ||
  320. (replayDialParams.HTTPTransformerParameters != nil &&
  321. !reflect.DeepEqual(replayDialParams.HTTPTransformerParameters, dialParams.HTTPTransformerParameters)) {
  322. t.Fatalf("mismatching HTTPTransformerParameters fields")
  323. }
  324. if (replayDialParams.OSSHObfuscatorSeedTransformerParameters == nil) != (dialParams.OSSHObfuscatorSeedTransformerParameters == nil) ||
  325. (replayDialParams.OSSHObfuscatorSeedTransformerParameters != nil &&
  326. !reflect.DeepEqual(replayDialParams.OSSHObfuscatorSeedTransformerParameters, dialParams.OSSHObfuscatorSeedTransformerParameters)) {
  327. t.Fatalf("mismatching ObfuscatorSeedTransformerParameters fields")
  328. }
  329. if (replayDialParams.ObfuscatedQUICNonceTransformerParameters == nil) != (dialParams.ObfuscatedQUICNonceTransformerParameters == nil) ||
  330. (replayDialParams.ObfuscatedQUICNonceTransformerParameters != nil &&
  331. !reflect.DeepEqual(replayDialParams.ObfuscatedQUICNonceTransformerParameters, dialParams.ObfuscatedQUICNonceTransformerParameters)) {
  332. t.Fatalf("mismatching ObfuscatedQUICNonceTransformerParameters fields")
  333. }
  334. // Test: replay after change tactics, with ReplayIgnoreChangedClientState = true
  335. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  336. applyParameters[parameters.ReplayIgnoreChangedConfigState] = true
  337. err = clientConfig.SetParameters("tag2a", false, applyParameters)
  338. if err != nil {
  339. t.Fatalf("SetParameters failed: %s", err)
  340. }
  341. dialParams, err = MakeDialParameters(
  342. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  343. if err != nil {
  344. t.Fatalf("MakeDialParameters failed: %s", err)
  345. }
  346. if !replayDialParams.IsReplay {
  347. t.Fatalf("unexpected non-replay")
  348. }
  349. // Test: no replay after change tactics
  350. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  351. applyParameters[parameters.ReplayIgnoreChangedConfigState] = false
  352. err = clientConfig.SetParameters("tag2", false, applyParameters)
  353. if err != nil {
  354. t.Fatalf("SetParameters failed: %s", err)
  355. }
  356. dialParams, err = MakeDialParameters(
  357. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  358. if err != nil {
  359. t.Fatalf("MakeDialParameters failed: %s", err)
  360. }
  361. if dialParams.IsReplay {
  362. t.Fatalf("unexpected replay")
  363. }
  364. // Test: no replay after dial parameters expired
  365. dialParams.Succeeded()
  366. time.Sleep(1 * time.Second)
  367. dialParams, err = MakeDialParameters(
  368. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  369. if err != nil {
  370. t.Fatalf("MakeDialParameters failed: %s", err)
  371. }
  372. if dialParams.IsReplay {
  373. t.Fatalf("unexpected replay")
  374. }
  375. // Test: no replay after server entry changes
  376. dialParams.Succeeded()
  377. serverEntries[0].ConfigurationVersion += 1
  378. dialParams, err = MakeDialParameters(
  379. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  380. if err != nil {
  381. t.Fatalf("MakeDialParameters failed: %s", err)
  382. }
  383. if dialParams.IsReplay {
  384. t.Fatalf("unexpected replay")
  385. }
  386. // Test: disable replay elements (partial coverage)
  387. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  388. applyParameters[parameters.ReplaySSH] = false
  389. applyParameters[parameters.ReplayObfuscatorPadding] = false
  390. applyParameters[parameters.ReplayFragmentor] = false
  391. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  392. applyParameters[parameters.ReplayLivenessTest] = false
  393. applyParameters[parameters.ReplayAPIRequestPadding] = false
  394. err = clientConfig.SetParameters("tag3", false, applyParameters)
  395. if err != nil {
  396. t.Fatalf("SetParameters failed: %s", err)
  397. }
  398. dialParams, err = MakeDialParameters(
  399. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  400. if err != nil {
  401. t.Fatalf("MakeDialParameters failed: %s", err)
  402. }
  403. dialParams.Succeeded()
  404. replayDialParams, err = MakeDialParameters(
  405. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  406. if err != nil {
  407. t.Fatalf("MakeDialParameters failed: %s", err)
  408. }
  409. if !replayDialParams.IsReplay {
  410. t.Fatalf("unexpected non-replay")
  411. }
  412. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  413. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  414. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  415. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  416. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  417. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  418. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  419. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  420. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  421. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  422. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  423. t.Fatalf("unexpected replayed fields")
  424. }
  425. // Test: client-side restrict fronting provider ID
  426. applyParameters[parameters.RestrictFrontingProviderIDs] = []string{frontingProviderID}
  427. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 1.0
  428. err = clientConfig.SetParameters("tag4", false, applyParameters)
  429. if err != nil {
  430. t.Fatalf("SetParameters failed: %s", err)
  431. }
  432. dialParams, err = MakeDialParameters(
  433. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  434. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  435. if err == nil {
  436. if dialParams != nil {
  437. t.Fatalf("unexpected MakeDialParameters success")
  438. }
  439. }
  440. } else {
  441. if err != nil {
  442. t.Fatalf("MakeDialParameters failed: %s", err)
  443. }
  444. }
  445. applyParameters[parameters.RestrictFrontingProviderIDsClientProbability] = 0.0
  446. err = clientConfig.SetParameters("tag5", false, applyParameters)
  447. if err != nil {
  448. t.Fatalf("SetParameters failed: %s", err)
  449. }
  450. // Test: client-side restrict provider ID by region
  451. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{providerID: {"CA"}}
  452. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 1.0
  453. err = clientConfig.SetParameters("tag6", false, applyParameters)
  454. if err != nil {
  455. t.Fatalf("SetParameters failed: %s", err)
  456. }
  457. dialParams, err = MakeDialParameters(
  458. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  459. if protocol.TunnelProtocolIsDirect(tunnelProtocol) {
  460. if err == nil {
  461. if dialParams != nil {
  462. t.Fatalf("unexpected MakeDialParameters success")
  463. }
  464. }
  465. } else {
  466. if err != nil {
  467. t.Fatalf("MakeDialParameters failed: %s", err)
  468. }
  469. }
  470. applyParameters[parameters.RestrictDirectProviderRegions] = map[string][]string{}
  471. applyParameters[parameters.RestrictDirectProviderIDsClientProbability] = 0.0
  472. err = clientConfig.SetParameters("tag7", false, applyParameters)
  473. if err != nil {
  474. t.Fatalf("SetParameters failed: %s", err)
  475. }
  476. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  477. steeringIPCache.Flush()
  478. // Test: steering IP used in non-replay case
  479. dialParams, err = MakeDialParameters(
  480. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  481. if err != nil {
  482. t.Fatalf("MakeDialParameters failed: %s", err)
  483. }
  484. dialParams.Failed(clientConfig)
  485. getCacheKey := func() string {
  486. return fmt.Sprintf("%s %s %s", testNetworkID, frontingProviderID, tunnelProtocol)
  487. }
  488. setCacheEntry := func(steeringIP string) {
  489. steeringIPCache.Set(getCacheKey(), steeringIP, lrucache.DefaultExpiration)
  490. }
  491. setCacheEntry("127.0.0.1")
  492. dialParams, err = MakeDialParameters(
  493. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  494. if err != nil {
  495. t.Fatalf("MakeDialParameters failed: %s", err)
  496. }
  497. if dialParams.IsReplay {
  498. t.Fatalf("unexpected replay")
  499. }
  500. checkSteeringIP := func(expectedSteeringIP string) {
  501. ctx, cancelFunc := context.WithTimeout(context.Background(), 1*time.Microsecond)
  502. defer cancelFunc()
  503. IPs, err := dialParams.dialConfig.ResolveIP(ctx, "example.com")
  504. if err != nil {
  505. t.Fatalf("ResolveIP failed: %s", err)
  506. }
  507. if IPs[0].String() != expectedSteeringIP {
  508. t.Fatalf("missing expected steering IP")
  509. }
  510. }
  511. checkSteeringIP("127.0.0.1")
  512. // Test: steering IP used in replay case
  513. dialParams.Succeeded()
  514. dialParams, err = MakeDialParameters(
  515. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  516. if err != nil {
  517. t.Fatalf("MakeDialParameters failed: %s", err)
  518. }
  519. if !dialParams.IsReplay {
  520. t.Fatalf("unexpected non-replay")
  521. }
  522. checkSteeringIP("127.0.0.1")
  523. // Test: different steering IP clears replay flag
  524. dialParams.Succeeded()
  525. setCacheEntry("127.0.0.2")
  526. dialParams, err = MakeDialParameters(
  527. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  528. if err != nil {
  529. t.Fatalf("MakeDialParameters failed: %s", err)
  530. }
  531. if dialParams.IsReplay {
  532. t.Fatalf("unexpected replay")
  533. }
  534. checkSteeringIP("127.0.0.2")
  535. // Test: newly present steering IP clears replay flag
  536. steeringIPCache.Flush()
  537. dialParams, err = MakeDialParameters(
  538. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  539. if err != nil {
  540. t.Fatalf("MakeDialParameters failed: %s", err)
  541. }
  542. dialParams.Succeeded()
  543. setCacheEntry("127.0.0.3")
  544. dialParams, err = MakeDialParameters(
  545. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntries[0], nil, nil, false, 0, 0)
  546. if err != nil {
  547. t.Fatalf("MakeDialParameters failed: %s", err)
  548. }
  549. if dialParams.IsReplay {
  550. t.Fatalf("unexpected replay")
  551. }
  552. // Test: steering IP cleared from cache after failure
  553. dialParams.Failed(clientConfig)
  554. _, ok := steeringIPCache.Get(getCacheKey())
  555. if ok {
  556. t.Fatalf("unexpected steering IP cache entry")
  557. }
  558. }
  559. // Test: iterator shuffles
  560. for i, serverEntry := range serverEntries {
  561. data, err := json.Marshal(serverEntry)
  562. if err != nil {
  563. t.Fatalf("json.Marshal failed: %s", err)
  564. }
  565. var serverEntryFields protocol.ServerEntryFields
  566. err = json.Unmarshal(data, &serverEntryFields)
  567. if err != nil {
  568. t.Fatalf("json.Unmarshal failed: %s", err)
  569. }
  570. err = StoreServerEntry(serverEntryFields, false)
  571. if err != nil {
  572. t.Fatalf("StoreServerEntry failed: %s", err)
  573. }
  574. if i%10 == 0 {
  575. dialParams, err := MakeDialParameters(
  576. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  577. if err != nil {
  578. t.Fatalf("MakeDialParameters failed: %s", err)
  579. }
  580. dialParams.Succeeded()
  581. }
  582. }
  583. for i := 0; i < 5; i++ {
  584. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  585. if err != nil {
  586. t.Fatalf("NewServerEntryIterator failed: %s", err)
  587. }
  588. if hasAffinity {
  589. t.Fatalf("unexpected affinity server")
  590. }
  591. // Test: the first shuffle should move the replay candidates to the front
  592. for j := 0; j < 10; j++ {
  593. serverEntry, err := iterator.Next()
  594. if err != nil {
  595. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  596. }
  597. dialParams, err := MakeDialParameters(
  598. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  599. if err != nil {
  600. t.Fatalf("MakeDialParameters failed: %s", err)
  601. }
  602. if !dialParams.IsReplay {
  603. t.Fatalf("unexpected non-replay")
  604. }
  605. }
  606. iterator.Reset()
  607. // Test: subsequent shuffles should not move the replay candidates
  608. allReplay := true
  609. for j := 0; j < 10; j++ {
  610. serverEntry, err := iterator.Next()
  611. if err != nil {
  612. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  613. }
  614. dialParams, err := MakeDialParameters(
  615. clientConfig, steeringIPCache, nil, nil, nil, canReplay, selectProtocol, serverEntry, nil, nil, false, 0, 0)
  616. if err != nil {
  617. t.Fatalf("MakeDialParameters failed: %s", err)
  618. }
  619. if !dialParams.IsReplay {
  620. allReplay = false
  621. }
  622. }
  623. if allReplay {
  624. t.Fatalf("unexpected all replay")
  625. }
  626. iterator.Close()
  627. }
  628. }
  629. func TestLimitTunnelDialPortNumbers(t *testing.T) {
  630. testDataDirName, err := ioutil.TempDir("", "psiphon-limit-tunnel-dial-port-numbers-test")
  631. if err != nil {
  632. t.Fatalf("TempDir failed: %s", err)
  633. }
  634. defer os.RemoveAll(testDataDirName)
  635. SetNoticeWriter(ioutil.Discard)
  636. clientConfig := &Config{
  637. PropagationChannelId: "0",
  638. SponsorId: "0",
  639. DataRootDirectory: testDataDirName,
  640. NetworkIDGetter: new(testNetworkGetter),
  641. }
  642. err = clientConfig.Commit(false)
  643. if err != nil {
  644. t.Fatalf("error committing configuration file: %s", err)
  645. }
  646. jsonLimitDialPortNumbers := `
  647. {
  648. "SSH" : [[10,11]],
  649. "OSSH" : [[20,21]],
  650. "QUIC-OSSH" : [[30,31]],
  651. "TAPDANCE-OSSH" : [[40,41]],
  652. "CONJURE-OSSH" : [[50,51]],
  653. "All" : [[60,61],80,443]
  654. }
  655. `
  656. var limitTunnelDialPortNumbers parameters.TunnelProtocolPortLists
  657. err = json.Unmarshal([]byte(jsonLimitDialPortNumbers), &limitTunnelDialPortNumbers)
  658. if err != nil {
  659. t.Fatalf("Unmarshal failed: %s", err)
  660. }
  661. applyParameters := make(map[string]interface{})
  662. applyParameters[parameters.LimitTunnelDialPortNumbers] = limitTunnelDialPortNumbers
  663. applyParameters[parameters.LimitTunnelDialPortNumbersProbability] = 1.0
  664. err = clientConfig.SetParameters("tag1", false, applyParameters)
  665. if err != nil {
  666. t.Fatalf("SetParameters failed: %s", err)
  667. }
  668. constraints := &protocolSelectionConstraints{
  669. config: clientConfig,
  670. limitTunnelDialPortNumbers: protocol.TunnelProtocolPortLists(
  671. clientConfig.GetParameters().Get().TunnelProtocolPortLists(parameters.LimitTunnelDialPortNumbers)),
  672. }
  673. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  674. protocol, _, ok := constraints.selectProtocol(0, false, false, serverEntry)
  675. return protocol, ok
  676. }
  677. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  678. if common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  679. continue
  680. }
  681. serverEntries := makeMockServerEntries(tunnelProtocol, "", "", "", 100)
  682. selected := false
  683. skipped := false
  684. for _, serverEntry := range serverEntries {
  685. selectedProtocol, ok := selectProtocol(serverEntry)
  686. if ok {
  687. if selectedProtocol != tunnelProtocol {
  688. t.Fatalf("unexpected selected protocol: %s", selectedProtocol)
  689. }
  690. port, err := serverEntry.GetDialPortNumber(selectedProtocol)
  691. if err != nil {
  692. t.Fatalf("GetDialPortNumber failed: %s", err)
  693. }
  694. if port%10 != 0 && port%10 != 1 && !protocol.TunnelProtocolUsesFrontedMeek(selectedProtocol) {
  695. t.Fatalf("unexpected dial port number: %d", port)
  696. }
  697. selected = true
  698. } else {
  699. skipped = true
  700. }
  701. }
  702. if !selected {
  703. t.Fatalf("expected at least one selected server entry: %s", tunnelProtocol)
  704. }
  705. if !skipped && !protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) {
  706. t.Fatalf("expected at least one skipped server entry: %s", tunnelProtocol)
  707. }
  708. }
  709. }
  710. func makeMockServerEntries(
  711. tunnelProtocol string,
  712. region string,
  713. providerID string,
  714. frontingProviderID string,
  715. count int) []*protocol.ServerEntry {
  716. serverEntries := make([]*protocol.ServerEntry, count)
  717. for i := 0; i < count; i++ {
  718. serverEntries[i] = &protocol.ServerEntry{
  719. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  720. SshPort: prng.Range(10, 19),
  721. SshObfuscatedPort: prng.Range(20, 29),
  722. SshObfuscatedQUICPort: prng.Range(30, 39),
  723. SshObfuscatedTapDancePort: prng.Range(40, 49),
  724. SshObfuscatedConjurePort: prng.Range(50, 59),
  725. MeekServerPort: prng.Range(60, 69),
  726. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  727. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  728. Region: region,
  729. ProviderID: providerID,
  730. FrontingProviderID: frontingProviderID,
  731. LocalSource: protocol.SERVER_ENTRY_SOURCE_EMBEDDED,
  732. LocalTimestamp: common.TruncateTimestampToHour(common.GetCurrentTimestamp()),
  733. Capabilities: []string{protocol.GetCapability(tunnelProtocol)},
  734. }
  735. }
  736. return serverEntries
  737. }
  738. func TestMakeHTTPTransformerParameters(t *testing.T) {
  739. type test struct {
  740. name string
  741. frontingProviderID string
  742. isFronted bool
  743. paramValues map[string]interface{}
  744. expectedTransformName string
  745. expectedTransformSpec transforms.Spec
  746. }
  747. tests := []test{
  748. {
  749. name: "unfronted",
  750. frontingProviderID: "",
  751. isFronted: false,
  752. paramValues: map[string]interface{}{
  753. "DirectHTTPProtocolTransformProbability": 1,
  754. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  755. "spec1": {{"A", "B"}},
  756. },
  757. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  758. "": {"spec1"},
  759. },
  760. },
  761. expectedTransformName: "spec1",
  762. expectedTransformSpec: [][2]string{{"A", "B"}},
  763. },
  764. {
  765. name: "fronted",
  766. frontingProviderID: "frontingProvider",
  767. isFronted: true,
  768. paramValues: map[string]interface{}{
  769. "FrontedHTTPProtocolTransformProbability": 1,
  770. "FrontedHTTPProtocolTransformSpecs": transforms.Specs{
  771. "spec1": {{"A", "B"}},
  772. },
  773. "FrontedHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  774. "frontingProvider": {"spec1"},
  775. },
  776. },
  777. expectedTransformName: "spec1",
  778. expectedTransformSpec: [][2]string{{"A", "B"}},
  779. },
  780. {
  781. name: "no transform, coinflip false",
  782. frontingProviderID: "frontingProvider",
  783. isFronted: false,
  784. paramValues: map[string]interface{}{
  785. "DirectHTTPProtocolTransformProbability": 0,
  786. "DirectHTTPProtocolTransformSpecs": transforms.Specs{
  787. "spec1": {{"A", "B"}},
  788. },
  789. "DirectHTTPProtocolTransformScopedSpecNames": transforms.ScopedSpecNames{
  790. "frontingProvider": {"spec1"},
  791. },
  792. },
  793. expectedTransformName: "",
  794. expectedTransformSpec: nil,
  795. },
  796. }
  797. for _, tt := range tests {
  798. t.Run(tt.name, func(t *testing.T) {
  799. params, err := parameters.NewParameters(nil)
  800. if err != nil {
  801. t.Fatalf("parameters.NewParameters failed %v", err)
  802. }
  803. _, err = params.Set("", 0, tt.paramValues)
  804. if err != nil {
  805. t.Fatalf("params.Set failed %v", err)
  806. }
  807. httpTransformerParams, err := makeHTTPTransformerParameters(params.Get(), tt.frontingProviderID, tt.isFronted)
  808. if err != nil {
  809. t.Fatalf("MakeHTTPTransformerParameters failed %v", err)
  810. }
  811. if httpTransformerParams.ProtocolTransformName != tt.expectedTransformName {
  812. t.Fatalf("expected ProtocolTransformName \"%s\" but got \"%s\"", tt.expectedTransformName, httpTransformerParams.ProtocolTransformName)
  813. }
  814. if !reflect.DeepEqual(httpTransformerParams.ProtocolTransformSpec, tt.expectedTransformSpec) {
  815. t.Fatalf("expected ProtocolTransformSpec %v but got %v", tt.expectedTransformSpec, httpTransformerParams.ProtocolTransformSpec)
  816. }
  817. if httpTransformerParams.ProtocolTransformSpec != nil {
  818. if httpTransformerParams.ProtocolTransformSeed == nil {
  819. t.Fatalf("expected non-nil seed")
  820. }
  821. }
  822. })
  823. }
  824. }
  825. func TestMakeOSSHObfuscatorSeedTranformerParameters(t *testing.T) {
  826. type test struct {
  827. name string
  828. paramValues map[string]interface{}
  829. expectedTransformName string
  830. expectedTransformSpec transforms.Spec
  831. }
  832. tests := []test{
  833. {
  834. name: "transform",
  835. paramValues: map[string]interface{}{
  836. "OSSHObfuscatorSeedTransformProbability": 1,
  837. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  838. "spec1": {{"A", "B"}},
  839. },
  840. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  841. "": {"spec1"},
  842. },
  843. },
  844. expectedTransformName: "spec1",
  845. expectedTransformSpec: [][2]string{{"A", "B"}},
  846. },
  847. {
  848. name: "no transform, coinflip false",
  849. paramValues: map[string]interface{}{
  850. "OSSHObfuscatorSeedTransformProbability": 0,
  851. "OSSHObfuscatorSeedTransformSpecs": transforms.Specs{
  852. "spec1": {{"A", "B"}},
  853. },
  854. "OSSHObfuscatorSeedTransformScopedSpecNames": transforms.ScopedSpecNames{
  855. "": {"spec1"},
  856. },
  857. },
  858. expectedTransformName: "",
  859. expectedTransformSpec: nil,
  860. },
  861. }
  862. for _, tt := range tests {
  863. t.Run(tt.name, func(t *testing.T) {
  864. params, err := parameters.NewParameters(nil)
  865. if err != nil {
  866. t.Fatalf("parameters.NewParameters failed: %v", err)
  867. }
  868. _, err = params.Set("", 0, tt.paramValues)
  869. if err != nil {
  870. t.Fatalf("params.Set failed: %v", err)
  871. }
  872. transformerParams, err := makeSeedTransformerParameters(
  873. params.Get(),
  874. parameters.OSSHObfuscatorSeedTransformProbability,
  875. parameters.OSSHObfuscatorSeedTransformSpecs,
  876. parameters.OSSHObfuscatorSeedTransformScopedSpecNames)
  877. if err != nil {
  878. t.Fatalf("makeSeedTransformerParameters failed: %v", err)
  879. }
  880. if transformerParams.TransformName != tt.expectedTransformName {
  881. t.Fatalf("expected TransformName \"%s\" but got \"%s\"", tt.expectedTransformName, transformerParams.TransformName)
  882. }
  883. if !reflect.DeepEqual(transformerParams.TransformSpec, tt.expectedTransformSpec) {
  884. t.Fatalf("expected TransformSpec %v but got %v", tt.expectedTransformSpec, transformerParams.TransformSpec)
  885. }
  886. if transformerParams.TransformSpec != nil {
  887. if transformerParams.TransformSeed == nil {
  888. t.Fatalf("expected non-nil seed")
  889. }
  890. }
  891. })
  892. }
  893. }