dialParameters_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513
  1. /*
  2. * Copyright (c) 2018, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "encoding/json"
  23. "fmt"
  24. "io/ioutil"
  25. "os"
  26. "testing"
  27. "time"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/parameters"
  30. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  31. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/protocol"
  32. )
  33. func TestDialParametersAndReplay(t *testing.T) {
  34. for _, tunnelProtocol := range protocol.SupportedTunnelProtocols {
  35. if !common.Contains(protocol.DefaultDisabledTunnelProtocols, tunnelProtocol) {
  36. runDialParametersAndReplay(t, tunnelProtocol)
  37. }
  38. }
  39. }
  40. var testNetworkID = prng.HexString(8)
  41. type testNetworkGetter struct {
  42. }
  43. func (t *testNetworkGetter) GetNetworkID() string {
  44. return testNetworkID
  45. }
  46. func runDialParametersAndReplay(t *testing.T, tunnelProtocol string) {
  47. t.Logf("Test %s...", tunnelProtocol)
  48. testDataDirName, err := ioutil.TempDir("", "psiphon-dial-parameters-test")
  49. if err != nil {
  50. t.Fatalf("TempDir failed: %s", err)
  51. }
  52. defer os.RemoveAll(testDataDirName)
  53. SetNoticeWriter(ioutil.Discard)
  54. clientConfig := &Config{
  55. PropagationChannelId: "0",
  56. SponsorId: "0",
  57. DataStoreDirectory: testDataDirName,
  58. NetworkIDGetter: new(testNetworkGetter),
  59. }
  60. err = clientConfig.Commit()
  61. if err != nil {
  62. t.Fatalf("error committing configuration file: %s", err)
  63. }
  64. applyParameters := make(map[string]interface{})
  65. applyParameters[parameters.TransformHostNameProbability] = 1.0
  66. applyParameters[parameters.PickUserAgentProbability] = 1.0
  67. err = clientConfig.SetClientParameters("tag1", true, applyParameters)
  68. if err != nil {
  69. t.Fatalf("SetClientParameters failed: %s", err)
  70. }
  71. err = OpenDataStore(clientConfig)
  72. if err != nil {
  73. t.Fatalf("error initializing client datastore: %s", err)
  74. }
  75. defer CloseDataStore()
  76. serverEntries := makeMockServerEntries(tunnelProtocol, 100)
  77. canReplay := func(serverEntry *protocol.ServerEntry, replayProtocol string) bool {
  78. return replayProtocol == tunnelProtocol
  79. }
  80. selectProtocol := func(serverEntry *protocol.ServerEntry) (string, bool) {
  81. return tunnelProtocol, true
  82. }
  83. RegisterSSHClientVersionPicker(func() string {
  84. versions := []string{"SSH-2.0-A", "SSH-2.0-B", "SSH-2.0-C"}
  85. return versions[prng.Intn(len(versions))]
  86. })
  87. RegisterUserAgentPicker(func() string {
  88. versions := []string{"ua1", "ua2", "ua3"}
  89. return versions[prng.Intn(len(versions))]
  90. })
  91. // Test: expected dial parameter fields set
  92. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  93. if err != nil {
  94. t.Fatalf("MakeDialParameters failed: %s", err)
  95. }
  96. if dialParams.ServerEntry != serverEntries[0] {
  97. t.Fatalf("unexpected server entry")
  98. }
  99. if dialParams.NetworkID != testNetworkID {
  100. t.Fatalf("unexpected network ID")
  101. }
  102. if dialParams.IsReplay {
  103. t.Fatalf("unexpected replay")
  104. }
  105. if dialParams.TunnelProtocol != tunnelProtocol {
  106. t.Fatalf("unexpected tunnel protocol")
  107. }
  108. if !protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  109. dialParams.DirectDialAddress == "" {
  110. t.Fatalf("missing direct dial fields")
  111. }
  112. if dialParams.DialPortNumber == "" {
  113. t.Fatalf("missing port number fields")
  114. }
  115. if dialParams.SSHClientVersion == "" || dialParams.SSHKEXSeed == nil {
  116. t.Fatalf("missing SSH fields")
  117. }
  118. if protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  119. dialParams.ObfuscatorPaddingSeed == nil {
  120. t.Fatalf("missing obfuscator fields")
  121. }
  122. if dialParams.FragmentorSeed == nil {
  123. t.Fatalf("missing fragmentor field")
  124. }
  125. if protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  126. (dialParams.MeekDialAddress == "" ||
  127. dialParams.MeekHostHeader == "" ||
  128. dialParams.MeekObfuscatorPaddingSeed == nil) {
  129. t.Fatalf("missing meek fields")
  130. }
  131. if protocol.TunnelProtocolUsesFrontedMeek(tunnelProtocol) &&
  132. (dialParams.MeekFrontingDialAddress == "" ||
  133. dialParams.MeekFrontingHost == "") {
  134. t.Fatalf("missing meek fronting fields")
  135. }
  136. if protocol.TunnelProtocolUsesMeekHTTP(tunnelProtocol) &&
  137. dialParams.UserAgent == "" {
  138. t.Fatalf("missing meek HTTP fields")
  139. }
  140. if protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  141. (dialParams.MeekSNIServerName == "" ||
  142. dialParams.TLSProfile == "") {
  143. t.Fatalf("missing meek HTTPS fields")
  144. }
  145. if protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  146. (dialParams.QUICVersion == "" ||
  147. dialParams.QUICDialSNIAddress == "") {
  148. t.Fatalf("missing meek HTTPS fields")
  149. }
  150. if dialParams.LivenessTestSeed == nil {
  151. t.Fatalf("missing liveness test fields")
  152. }
  153. if dialParams.APIRequestPaddingSeed == nil {
  154. t.Fatalf("missing API request fields")
  155. }
  156. // Test: no replay after dial reported to fail
  157. dialParams.Failed()
  158. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  159. if err != nil {
  160. t.Fatalf("MakeDialParameters failed: %s", err)
  161. }
  162. if dialParams.IsReplay {
  163. t.Fatalf("unexpected replay")
  164. }
  165. // Test: no replay after network ID changes
  166. dialParams.Succeeded()
  167. testNetworkID = prng.HexString(8)
  168. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  169. if err != nil {
  170. t.Fatalf("MakeDialParameters failed: %s", err)
  171. }
  172. if dialParams.NetworkID != testNetworkID {
  173. t.Fatalf("unexpected network ID")
  174. }
  175. if dialParams.IsReplay {
  176. t.Fatalf("unexpected replay")
  177. }
  178. // Test: replay after dial reported to succeed, and replay fields match previous dial parameters
  179. dialParams.Succeeded()
  180. replayDialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  181. if err != nil {
  182. t.Fatalf("MakeDialParameters failed: %s", err)
  183. }
  184. if !replayDialParams.IsReplay {
  185. t.Fatalf("unexpected non-replay")
  186. }
  187. if !replayDialParams.LastUsedTimestamp.After(dialParams.LastUsedTimestamp) {
  188. t.Fatalf("unexpected non-updated timestamp")
  189. }
  190. if replayDialParams.TunnelProtocol != dialParams.TunnelProtocol {
  191. t.Fatalf("mismatching tunnel protocol")
  192. }
  193. if replayDialParams.DirectDialAddress != dialParams.DirectDialAddress ||
  194. replayDialParams.DialPortNumber != dialParams.DialPortNumber {
  195. t.Fatalf("mismatching dial fields")
  196. }
  197. identicalSeeds := func(seed1, seed2 *prng.Seed) bool {
  198. if seed1 == nil {
  199. return seed2 == nil
  200. }
  201. return bytes.Compare(seed1[:], seed2[:]) == 0
  202. }
  203. if replayDialParams.SelectedSSHClientVersion != dialParams.SelectedSSHClientVersion ||
  204. replayDialParams.SSHClientVersion != dialParams.SSHClientVersion ||
  205. !identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) {
  206. t.Fatalf("mismatching SSH fields")
  207. }
  208. if !identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed) {
  209. t.Fatalf("mismatching obfuscator fields")
  210. }
  211. if !identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) {
  212. t.Fatalf("mismatching fragmentor fields")
  213. }
  214. if replayDialParams.MeekFrontingDialAddress != dialParams.MeekFrontingDialAddress ||
  215. replayDialParams.MeekFrontingHost != dialParams.MeekFrontingHost ||
  216. replayDialParams.MeekDialAddress != dialParams.MeekDialAddress ||
  217. replayDialParams.MeekTransformedHostName != dialParams.MeekTransformedHostName ||
  218. replayDialParams.MeekSNIServerName != dialParams.MeekSNIServerName ||
  219. replayDialParams.MeekHostHeader != dialParams.MeekHostHeader ||
  220. !identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed) {
  221. t.Fatalf("mismatching meek fields")
  222. }
  223. if replayDialParams.SelectedUserAgent != dialParams.SelectedUserAgent ||
  224. replayDialParams.UserAgent != dialParams.UserAgent {
  225. t.Fatalf("mismatching user agent fields")
  226. }
  227. if replayDialParams.SelectedTLSProfile != dialParams.SelectedTLSProfile ||
  228. replayDialParams.TLSProfile != dialParams.TLSProfile ||
  229. !identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) {
  230. t.Fatalf("mismatching TLS fields")
  231. }
  232. if replayDialParams.QUICVersion != dialParams.QUICVersion ||
  233. replayDialParams.QUICDialSNIAddress != dialParams.QUICDialSNIAddress ||
  234. !identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) {
  235. t.Fatalf("mismatching QUIC fields")
  236. }
  237. if !identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) {
  238. t.Fatalf("mismatching liveness test fields")
  239. }
  240. if !identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  241. t.Fatalf("mismatching API request fields")
  242. }
  243. // Test: no replay after change tactics
  244. applyParameters[parameters.ReplayDialParametersTTL] = "1s"
  245. err = clientConfig.SetClientParameters("tag2", true, applyParameters)
  246. if err != nil {
  247. t.Fatalf("SetClientParameters failed: %s", err)
  248. }
  249. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  250. if err != nil {
  251. t.Fatalf("MakeDialParameters failed: %s", err)
  252. }
  253. if dialParams.IsReplay {
  254. t.Fatalf("unexpected replay")
  255. }
  256. // Test: no replay after dial parameters expired
  257. dialParams.Succeeded()
  258. time.Sleep(1 * time.Second)
  259. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  260. if err != nil {
  261. t.Fatalf("MakeDialParameters failed: %s", err)
  262. }
  263. if dialParams.IsReplay {
  264. t.Fatalf("unexpected replay")
  265. }
  266. // Test: no replay after server entry changes
  267. dialParams.Succeeded()
  268. serverEntries[0].ConfigurationVersion += 1
  269. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  270. if err != nil {
  271. t.Fatalf("MakeDialParameters failed: %s", err)
  272. }
  273. if dialParams.IsReplay {
  274. t.Fatalf("unexpected replay")
  275. }
  276. // Test: disable replay elements (partial coverage)
  277. applyParameters[parameters.ReplayDialParametersTTL] = "24h"
  278. applyParameters[parameters.ReplaySSH] = false
  279. applyParameters[parameters.ReplayObfuscatorPadding] = false
  280. applyParameters[parameters.ReplayFragmentor] = false
  281. applyParameters[parameters.ReplayRandomizedTLSProfile] = false
  282. applyParameters[parameters.ReplayObfuscatedQUIC] = false
  283. applyParameters[parameters.ReplayLivenessTest] = false
  284. applyParameters[parameters.ReplayAPIRequestPadding] = false
  285. err = clientConfig.SetClientParameters("tag3", true, applyParameters)
  286. if err != nil {
  287. t.Fatalf("SetClientParameters failed: %s", err)
  288. }
  289. dialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  290. if err != nil {
  291. t.Fatalf("MakeDialParameters failed: %s", err)
  292. }
  293. dialParams.Succeeded()
  294. replayDialParams, err = MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntries[0], false)
  295. if err != nil {
  296. t.Fatalf("MakeDialParameters failed: %s", err)
  297. }
  298. if !replayDialParams.IsReplay {
  299. t.Fatalf("unexpected non-replay")
  300. }
  301. if identicalSeeds(replayDialParams.SSHKEXSeed, dialParams.SSHKEXSeed) ||
  302. (protocol.TunnelProtocolUsesObfuscatedSSH(tunnelProtocol) &&
  303. identicalSeeds(replayDialParams.ObfuscatorPaddingSeed, dialParams.ObfuscatorPaddingSeed)) ||
  304. identicalSeeds(replayDialParams.FragmentorSeed, dialParams.FragmentorSeed) ||
  305. (protocol.TunnelProtocolUsesMeek(tunnelProtocol) &&
  306. identicalSeeds(replayDialParams.MeekObfuscatorPaddingSeed, dialParams.MeekObfuscatorPaddingSeed)) ||
  307. (protocol.TunnelProtocolUsesMeekHTTPS(tunnelProtocol) &&
  308. identicalSeeds(replayDialParams.RandomizedTLSProfileSeed, dialParams.RandomizedTLSProfileSeed) &&
  309. replayDialParams.RandomizedTLSProfileSeed != nil) ||
  310. (protocol.TunnelProtocolUsesQUIC(tunnelProtocol) &&
  311. identicalSeeds(replayDialParams.ObfuscatedQUICPaddingSeed, dialParams.ObfuscatedQUICPaddingSeed) &&
  312. replayDialParams.ObfuscatedQUICPaddingSeed != nil) ||
  313. identicalSeeds(replayDialParams.LivenessTestSeed, dialParams.LivenessTestSeed) ||
  314. identicalSeeds(replayDialParams.APIRequestPaddingSeed, dialParams.APIRequestPaddingSeed) {
  315. t.Fatalf("unexpected replayed fields")
  316. }
  317. // Test: iterator shuffles
  318. for i, serverEntry := range serverEntries {
  319. data, err := json.Marshal(serverEntry)
  320. if err != nil {
  321. t.Fatalf("json.Marshal failed: %s", err)
  322. }
  323. var serverEntryFields protocol.ServerEntryFields
  324. err = json.Unmarshal(data, &serverEntryFields)
  325. if err != nil {
  326. t.Fatalf("json.Unmarshal failed: %s", err)
  327. }
  328. err = StoreServerEntry(serverEntryFields, false)
  329. if err != nil {
  330. t.Fatalf("StoreServerEntry failed: %s", err)
  331. }
  332. if i%10 == 0 {
  333. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false)
  334. if err != nil {
  335. t.Fatalf("MakeDialParameters failed: %s", err)
  336. }
  337. dialParams.Succeeded()
  338. }
  339. }
  340. for i := 0; i < 5; i++ {
  341. hasAffinity, iterator, err := NewServerEntryIterator(clientConfig)
  342. if err != nil {
  343. t.Fatalf("NewServerEntryIterator failed: %s", err)
  344. }
  345. if hasAffinity {
  346. t.Fatalf("unexpected affinity server")
  347. }
  348. // Test: the first shuffle should move the replay candidates to the front
  349. for j := 0; j < 10; j++ {
  350. serverEntry, err := iterator.Next()
  351. if err != nil {
  352. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  353. }
  354. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false)
  355. if err != nil {
  356. t.Fatalf("MakeDialParameters failed: %s", err)
  357. }
  358. if !dialParams.IsReplay {
  359. t.Fatalf("unexpected non-replay")
  360. }
  361. }
  362. iterator.Reset()
  363. // Test: subsequent shuffles should not move the replay candidates
  364. allReplay := true
  365. for j := 0; j < 10; j++ {
  366. serverEntry, err := iterator.Next()
  367. if err != nil {
  368. t.Fatalf("ServerEntryIterator.Next failed: %s", err)
  369. }
  370. dialParams, err := MakeDialParameters(clientConfig, canReplay, selectProtocol, serverEntry, false)
  371. if err != nil {
  372. t.Fatalf("MakeDialParameters failed: %s", err)
  373. }
  374. if !dialParams.IsReplay {
  375. allReplay = false
  376. }
  377. }
  378. if allReplay {
  379. t.Fatalf("unexpected all replay")
  380. }
  381. iterator.Close()
  382. }
  383. }
  384. func makeMockServerEntries(tunnelProtocol string, count int) []*protocol.ServerEntry {
  385. serverEntries := make([]*protocol.ServerEntry, count)
  386. for i := 0; i < count; i++ {
  387. serverEntries[i] = &protocol.ServerEntry{
  388. IpAddress: fmt.Sprintf("192.168.0.%d", i),
  389. SshPort: 1,
  390. SshObfuscatedPort: 2,
  391. SshObfuscatedQUICPort: 3,
  392. SshObfuscatedTapdancePort: 4,
  393. MeekServerPort: 5,
  394. MeekFrontingHosts: []string{"www1.example.org", "www2.example.org", "www3.example.org"},
  395. MeekFrontingAddressesRegex: "[a-z0-9]{1,64}.example.org",
  396. }
  397. }
  398. return serverEntries
  399. }