randomized_kex_test.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. /*
  2. * Copyright (c) 2019, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package ssh
  20. import (
  21. "bytes"
  22. "context"
  23. "crypto/rand"
  24. "crypto/rsa"
  25. "net"
  26. "testing"
  27. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  29. "golang.org/x/sync/errgroup"
  30. )
  31. func TestRandomizedSSHKEXes(t *testing.T) {
  32. rsaKey, err := rsa.GenerateKey(rand.Reader, 4096)
  33. if err != nil {
  34. t.Fatalf("rsa.GenerateKey failed: %s", err)
  35. }
  36. signer, err := NewSignerFromKey(rsaKey)
  37. if err != nil {
  38. t.Fatalf("NewSignerFromKey failed: %s", err)
  39. }
  40. publicKey := signer.PublicKey()
  41. username := "username"
  42. password := "password"
  43. for _, doPeerKEXPRNGSeed := range []bool{true, false} {
  44. failed := false
  45. for i := 0; i < 1000; i++ {
  46. clientSeed, err := prng.NewSeed()
  47. if err != nil {
  48. t.Fatalf("prng.NewSeed failed: %s", err)
  49. }
  50. serverSeed, err := prng.NewSeed()
  51. if err != nil {
  52. t.Fatalf("prng.NewSeed failed: %s", err)
  53. }
  54. clientConn, serverConn, err := netPipe()
  55. if err != nil {
  56. t.Fatalf("netPipe failed: %s", err)
  57. }
  58. testGroup, _ := errgroup.WithContext(context.Background())
  59. // Client
  60. testGroup.Go(func() error {
  61. certChecker := &CertChecker{
  62. HostKeyFallback: func(addr string, remote net.Addr, key PublicKey) error {
  63. if !bytes.Equal(publicKey.Marshal(), key.Marshal()) {
  64. return errors.TraceNew("unexpected host public key")
  65. }
  66. return nil
  67. },
  68. }
  69. clientConfig := &ClientConfig{
  70. User: username,
  71. Auth: []AuthMethod{Password(password)},
  72. HostKeyCallback: certChecker.CheckHostKey,
  73. }
  74. clientConfig.KEXPRNGSeed = clientSeed
  75. if doPeerKEXPRNGSeed {
  76. clientConfig.PeerKEXPRNGSeed = serverSeed
  77. }
  78. clientSSHConn, _, _, err := NewClientConn(clientConn, "", clientConfig)
  79. if err != nil {
  80. return errors.Trace(err)
  81. }
  82. clientSSHConn.Close()
  83. clientConn.Close()
  84. return nil
  85. })
  86. // Server
  87. testGroup.Go(func() error {
  88. insecurePasswordCallback := func(c ConnMetadata, pass []byte) (*Permissions, error) {
  89. if c.User() == username && string(pass) == password {
  90. return nil, nil
  91. }
  92. return nil, errors.TraceNew("authentication failed")
  93. }
  94. serverConfig := &ServerConfig{
  95. PasswordCallback: insecurePasswordCallback,
  96. }
  97. serverConfig.AddHostKey(signer)
  98. serverConfig.KEXPRNGSeed = serverSeed
  99. serverSSHConn, _, _, err := NewServerConn(serverConn, serverConfig)
  100. if err != nil {
  101. return errors.Trace(err)
  102. }
  103. serverSSHConn.Close()
  104. serverConn.Close()
  105. return nil
  106. })
  107. err = testGroup.Wait()
  108. if err != nil {
  109. // Expect no failure to negotiates when setting PeerKEXPRNGSeed.
  110. if doPeerKEXPRNGSeed {
  111. t.Fatalf("goroutine failed: %s", err)
  112. } else {
  113. failed = true
  114. break
  115. }
  116. }
  117. }
  118. // Expect at least one failure to negotiate when not setting PeerKEXPRNGSeed.
  119. if !doPeerKEXPRNGSeed && !failed {
  120. t.Fatalf("unexpected success")
  121. }
  122. }
  123. }