shadowsocks_test.go 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. /*
  2. * Copyright (c) 2025, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package server
  20. import (
  21. "bytes"
  22. "crypto/rand"
  23. "io"
  24. "net"
  25. "testing"
  26. "github.com/Jigsaw-Code/outline-sdk/transport"
  27. "github.com/Jigsaw-Code/outline-sdk/transport/shadowsocks"
  28. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
  29. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
  30. )
  31. func TestShadowsocksServer(t *testing.T) {
  32. listener, err := net.Listen("tcp", "127.0.0.1:0")
  33. if err != nil {
  34. t.Fatalf("net.Listen failed %v", err)
  35. }
  36. defer listener.Close()
  37. numIrregularTunnels := 0
  38. irregularTunnelLogger := func(clientIP string, tunnelError error, logFields common.LogFields) {
  39. numIrregularTunnels++
  40. }
  41. secretText := "TEST"
  42. listener, err = ListenShadowsocks(nil, listener, secretText, irregularTunnelLogger)
  43. if err != nil {
  44. t.Fatalf("ListenShadowsocks failed %v", err)
  45. }
  46. type listenerState struct {
  47. err error
  48. recv []byte
  49. }
  50. wantRecv := []byte("hello world")
  51. runListener := func(listener net.Listener, recv chan *listenerState) {
  52. conn, err := listener.Accept()
  53. if err != nil {
  54. recv <- &listenerState{
  55. err: errors.TraceMsg(err, "listener.Accept failed"),
  56. }
  57. return
  58. }
  59. defer conn.Close()
  60. b := make([]byte, len(wantRecv))
  61. // A single Read should be sufficient because multiple requests
  62. // in a single connection are not supported by this test.
  63. n, err := conn.Read(b)
  64. if err != nil {
  65. recv <- &listenerState{
  66. err: errors.TraceMsg(err, "conn.Read failed"),
  67. }
  68. return
  69. }
  70. b = b[:n]
  71. _, err = conn.Write(b)
  72. if err != nil {
  73. recv <- &listenerState{
  74. err: errors.TraceMsg(err, "conn.Write failed"),
  75. }
  76. return
  77. }
  78. recv <- &listenerState{
  79. recv: b,
  80. err: nil,
  81. }
  82. }
  83. recv := make(chan *listenerState)
  84. go runListener(listener, recv)
  85. conn, err := net.Dial("tcp", listener.Addr().String())
  86. if err != nil {
  87. t.Fatalf("net.Dial failed %v", err)
  88. }
  89. defer conn.Close()
  90. key, err := shadowsocks.NewEncryptionKey(shadowsocks.CHACHA20IETFPOLY1305, secretText)
  91. if err != nil {
  92. t.Fatalf("shadowsocks.NewEncryptionKey failed %v", err)
  93. }
  94. // Based on shadowsocks.DialStream
  95. clientToServerRecorder := NewWriteRecorder(conn)
  96. ssw := shadowsocks.NewWriter(clientToServerRecorder, key)
  97. serverToClientRecorder := NewReadRecorder(conn)
  98. ssr := shadowsocks.NewReader(serverToClientRecorder, key)
  99. conn = transport.WrapConn(conn.(*net.TCPConn), ssr, ssw)
  100. n, err := conn.Write(wantRecv)
  101. if err != nil {
  102. t.Fatalf("conn.Write failed %v", err)
  103. }
  104. if n != len(wantRecv) {
  105. t.Fatalf("expected to write %d bytes but wrote %d", len(wantRecv), n)
  106. }
  107. // read response
  108. b := make([]byte, 512)
  109. n, err = conn.Read(b)
  110. if err != nil {
  111. t.Fatalf("conn.Read failed %v", err)
  112. }
  113. b = b[:n]
  114. r := <-recv
  115. if r.err != nil {
  116. t.Fatalf("listener failed %v", r.err)
  117. }
  118. if !bytes.Equal(r.recv, wantRecv) {
  119. t.Fatalf("expected \"%s\" of len %d but got \"%s\" of len %d", string(wantRecv), len(wantRecv), string(r.recv), len(r.recv))
  120. }
  121. // Server echos bytes back
  122. if !bytes.Equal(b, wantRecv) {
  123. t.Fatalf("expected \"%s\" of len %d but got \"%s\" of len %d", string(wantRecv), len(wantRecv), string(b), len(b))
  124. }
  125. if numIrregularTunnels > 0 {
  126. t.Fatal("expected no irregular tunnels")
  127. }
  128. // Mimic a replay attack
  129. go runListener(listener, recv)
  130. conn, err = net.Dial("tcp", listener.Addr().String())
  131. if err != nil {
  132. t.Fatalf("net.Dial failed %v", err)
  133. }
  134. defer conn.Close()
  135. _, err = conn.Write(clientToServerRecorder.Bytes())
  136. if err != nil {
  137. t.Fatalf("conn.Read failed %v", err)
  138. }
  139. r = <-recv
  140. if r.err == nil {
  141. t.Fatalf("expected error")
  142. }
  143. if numIrregularTunnels != 1 {
  144. t.Fatal("expected 1 irregular tunnel")
  145. }
  146. // Mimic a reflection attack
  147. go runListener(listener, recv)
  148. conn, err = net.Dial("tcp", listener.Addr().String())
  149. if err != nil {
  150. t.Fatalf("net.Dial failed %v", err)
  151. }
  152. defer conn.Close()
  153. _, err = conn.Write(serverToClientRecorder.Bytes())
  154. if err != nil {
  155. t.Fatalf("conn.Read failed %v", err)
  156. }
  157. r = <-recv
  158. if r.err == nil {
  159. t.Fatalf("expected error")
  160. }
  161. if numIrregularTunnels != 2 {
  162. t.Fatal("expected 2 irregular tunnels")
  163. }
  164. // Mimic random bytes
  165. go runListener(listener, recv)
  166. conn, err = net.Dial("tcp", listener.Addr().String())
  167. if err != nil {
  168. t.Fatalf("net.Dial failed %v", err)
  169. }
  170. defer conn.Close()
  171. randomBytes := make([]byte, clientToServerRecorder.Len())
  172. _, err = rand.Read(randomBytes)
  173. if err != nil {
  174. t.Fatalf("rand.Read failed %v", err)
  175. }
  176. _, err = conn.Write(randomBytes)
  177. if err != nil {
  178. t.Fatalf("conn.Read failed %v", err)
  179. }
  180. r = <-recv
  181. if r.err == nil {
  182. t.Fatalf("expected error")
  183. }
  184. // Note: currently an invalid message from the client is not logged as an
  185. // irregular tunnel due to the limitations described in
  186. // ShadowsocksConn.Read so do not expect another irregular tunnel.
  187. if numIrregularTunnels != 2 {
  188. t.Fatal("expected 2 irregular tunnels")
  189. }
  190. }
  191. type writeRecorder struct {
  192. io.Writer
  193. bytes.Buffer
  194. }
  195. func NewWriteRecorder(writer io.Writer) *writeRecorder {
  196. return &writeRecorder{
  197. Writer: writer,
  198. }
  199. }
  200. func (w *writeRecorder) Write(p []byte) (n int, err error) {
  201. _, err = w.Buffer.Write(p)
  202. if err != nil {
  203. panic(err)
  204. }
  205. return w.Writer.Write(p)
  206. }
  207. type readRecorder struct {
  208. io.Reader
  209. bytes.Buffer
  210. }
  211. func NewReadRecorder(reader io.Reader) *readRecorder {
  212. return &readRecorder{
  213. Reader: reader,
  214. }
  215. }
  216. func (r *readRecorder) Read(p []byte) (n int, err error) {
  217. n, err = r.Reader.Read(p)
  218. r.Buffer.Write(p[:n])
  219. return n, err
  220. }