certs_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/ecdsa"
  8. "crypto/elliptic"
  9. "crypto/rand"
  10. "fmt"
  11. "io"
  12. "net"
  13. "reflect"
  14. "testing"
  15. "time"
  16. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/crypto/ssh/testdata"
  17. )
  18. func TestParseCert(t *testing.T) {
  19. authKeyBytes := bytes.TrimSuffix(testdata.SSHCertificates["rsa"], []byte(" host.example.com\n"))
  20. key, _, _, rest, err := ParseAuthorizedKey(authKeyBytes)
  21. if err != nil {
  22. t.Fatalf("ParseAuthorizedKey: %v", err)
  23. }
  24. if len(rest) > 0 {
  25. t.Errorf("rest: got %q, want empty", rest)
  26. }
  27. if _, ok := key.(*Certificate); !ok {
  28. t.Fatalf("got %v (%T), want *Certificate", key, key)
  29. }
  30. marshaled := MarshalAuthorizedKey(key)
  31. // Before comparison, remove the trailing newline that
  32. // MarshalAuthorizedKey adds.
  33. marshaled = marshaled[:len(marshaled)-1]
  34. if !bytes.Equal(authKeyBytes, marshaled) {
  35. t.Errorf("marshaled certificate does not match original: got %q, want %q", marshaled, authKeyBytes)
  36. }
  37. }
  38. // Cert generated by ssh-keygen OpenSSH_6.8p1 OS X 10.10.3
  39. // % ssh-keygen -s ca -I testcert -O source-address=192.168.1.0/24 -O force-command=/bin/sleep user.pub
  40. // user.pub key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDACh1rt2DXfV3hk6fszSQcQ/rueMId0kVD9U7nl8cfEnFxqOCrNT92g4laQIGl2mn8lsGZfTLg8ksHq3gkvgO3oo/0wHy4v32JeBOHTsN5AL4gfHNEhWeWb50ev47hnTsRIt9P4dxogeUo/hTu7j9+s9lLpEQXCvq6xocXQt0j8MV9qZBBXFLXVT3cWIkSqOdwt/5ZBg+1GSrc7WfCXVWgTk4a20uPMuJPxU4RQwZW6X3+O8Pqo8C3cW0OzZRFP6gUYUKUsTI5WntlS+LAxgw1mZNsozFGdbiOPRnEryE3SRldh9vjDR3tin1fGpA5P7+CEB/bqaXtG3V+F2OkqaMN
  41. // Critical Options:
  42. //
  43. // force-command /bin/sleep
  44. // source-address 192.168.1.0/24
  45. //
  46. // Extensions:
  47. //
  48. // permit-X11-forwarding
  49. // permit-agent-forwarding
  50. // permit-port-forwarding
  51. // permit-pty
  52. // permit-user-rc
  53. const exampleSSHCertWithOptions = `ssh-rsa-cert-v01@openssh.com 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`
  54. func TestParseCertWithOptions(t *testing.T) {
  55. opts := map[string]string{
  56. "source-address": "192.168.1.0/24",
  57. "force-command": "/bin/sleep",
  58. }
  59. exts := map[string]string{
  60. "permit-X11-forwarding": "",
  61. "permit-agent-forwarding": "",
  62. "permit-port-forwarding": "",
  63. "permit-pty": "",
  64. "permit-user-rc": "",
  65. }
  66. authKeyBytes := []byte(exampleSSHCertWithOptions)
  67. key, _, _, rest, err := ParseAuthorizedKey(authKeyBytes)
  68. if err != nil {
  69. t.Fatalf("ParseAuthorizedKey: %v", err)
  70. }
  71. if len(rest) > 0 {
  72. t.Errorf("rest: got %q, want empty", rest)
  73. }
  74. cert, ok := key.(*Certificate)
  75. if !ok {
  76. t.Fatalf("got %v (%T), want *Certificate", key, key)
  77. }
  78. if !reflect.DeepEqual(cert.CriticalOptions, opts) {
  79. t.Errorf("unexpected critical options - got %v, want %v", cert.CriticalOptions, opts)
  80. }
  81. if !reflect.DeepEqual(cert.Extensions, exts) {
  82. t.Errorf("unexpected Extensions - got %v, want %v", cert.Extensions, exts)
  83. }
  84. marshaled := MarshalAuthorizedKey(key)
  85. // Before comparison, remove the trailing newline that
  86. // MarshalAuthorizedKey adds.
  87. marshaled = marshaled[:len(marshaled)-1]
  88. if !bytes.Equal(authKeyBytes, marshaled) {
  89. t.Errorf("marshaled certificate does not match original: got %q, want %q", marshaled, authKeyBytes)
  90. }
  91. }
  92. func TestValidateCert(t *testing.T) {
  93. key, _, _, _, err := ParseAuthorizedKey(testdata.SSHCertificates["rsa-user-testcertificate"])
  94. if err != nil {
  95. t.Fatalf("ParseAuthorizedKey: %v", err)
  96. }
  97. validCert, ok := key.(*Certificate)
  98. if !ok {
  99. t.Fatalf("got %v (%T), want *Certificate", key, key)
  100. }
  101. checker := CertChecker{}
  102. checker.IsUserAuthority = func(k PublicKey) bool {
  103. return bytes.Equal(k.Marshal(), validCert.SignatureKey.Marshal())
  104. }
  105. if err := checker.CheckCert("testcertificate", validCert); err != nil {
  106. t.Errorf("Unable to validate certificate: %v", err)
  107. }
  108. invalidCert := &Certificate{
  109. Key: testPublicKeys["rsa"],
  110. SignatureKey: testPublicKeys["ecdsa"],
  111. ValidBefore: CertTimeInfinity,
  112. Signature: &Signature{},
  113. }
  114. if err := checker.CheckCert("testcertificate", invalidCert); err == nil {
  115. t.Error("Invalid cert signature passed validation")
  116. }
  117. }
  118. func TestValidateCertTime(t *testing.T) {
  119. cert := Certificate{
  120. ValidPrincipals: []string{"user"},
  121. Key: testPublicKeys["rsa"],
  122. ValidAfter: 50,
  123. ValidBefore: 100,
  124. }
  125. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  126. for ts, ok := range map[int64]bool{
  127. 25: false,
  128. 50: true,
  129. 99: true,
  130. 100: false,
  131. 125: false,
  132. } {
  133. checker := CertChecker{
  134. Clock: func() time.Time { return time.Unix(ts, 0) },
  135. }
  136. checker.IsUserAuthority = func(k PublicKey) bool {
  137. return bytes.Equal(k.Marshal(),
  138. testPublicKeys["ecdsa"].Marshal())
  139. }
  140. if v := checker.CheckCert("user", &cert); (v == nil) != ok {
  141. t.Errorf("Authenticate(%d): %v", ts, v)
  142. }
  143. }
  144. }
  145. // TODO(hanwen): tests for
  146. //
  147. // host keys:
  148. // * fallbacks
  149. func TestHostKeyCert(t *testing.T) {
  150. cert := &Certificate{
  151. ValidPrincipals: []string{"hostname", "hostname.domain", "otherhost"},
  152. Key: testPublicKeys["rsa"],
  153. ValidBefore: CertTimeInfinity,
  154. CertType: HostCert,
  155. }
  156. cert.SignCert(rand.Reader, testSigners["ecdsa"])
  157. checker := &CertChecker{
  158. IsHostAuthority: func(p PublicKey, addr string) bool {
  159. return addr == "hostname:22" && bytes.Equal(testPublicKeys["ecdsa"].Marshal(), p.Marshal())
  160. },
  161. }
  162. certSigner, err := NewCertSigner(cert, testSigners["rsa"])
  163. if err != nil {
  164. t.Errorf("NewCertSigner: %v", err)
  165. }
  166. for _, test := range []struct {
  167. addr string
  168. succeed bool
  169. certSignerAlgorithms []string // Empty means no algorithm restrictions.
  170. clientHostKeyAlgorithms []string
  171. }{
  172. {addr: "hostname:22", succeed: true},
  173. {
  174. addr: "hostname:22",
  175. succeed: true,
  176. certSignerAlgorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSASHA512},
  177. clientHostKeyAlgorithms: []string{CertAlgoRSASHA512v01},
  178. },
  179. {
  180. addr: "hostname:22",
  181. succeed: false,
  182. certSignerAlgorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSASHA512},
  183. clientHostKeyAlgorithms: []string{CertAlgoRSAv01},
  184. },
  185. {
  186. addr: "hostname:22",
  187. succeed: false,
  188. certSignerAlgorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSASHA512},
  189. clientHostKeyAlgorithms: []string{KeyAlgoRSASHA512}, // Not a certificate algorithm.
  190. },
  191. {addr: "otherhost:22", succeed: false}, // The certificate is valid for 'otherhost' as hostname, but we only recognize the authority of the signer for the address 'hostname:22'
  192. {addr: "lasthost:22", succeed: false},
  193. } {
  194. c1, c2, err := netPipe()
  195. if err != nil {
  196. t.Fatalf("netPipe: %v", err)
  197. }
  198. defer c1.Close()
  199. defer c2.Close()
  200. errc := make(chan error)
  201. go func() {
  202. conf := ServerConfig{
  203. NoClientAuth: true,
  204. }
  205. if len(test.certSignerAlgorithms) > 0 {
  206. mas, err := NewSignerWithAlgorithms(certSigner.(AlgorithmSigner), test.certSignerAlgorithms)
  207. if err != nil {
  208. errc <- err
  209. return
  210. }
  211. conf.AddHostKey(mas)
  212. } else {
  213. conf.AddHostKey(certSigner)
  214. }
  215. _, _, _, err := NewServerConn(c1, &conf)
  216. errc <- err
  217. }()
  218. config := &ClientConfig{
  219. User: "user",
  220. HostKeyCallback: checker.CheckHostKey,
  221. HostKeyAlgorithms: test.clientHostKeyAlgorithms,
  222. }
  223. _, _, _, err = NewClientConn(c2, test.addr, config)
  224. if (err == nil) != test.succeed {
  225. t.Errorf("NewClientConn(%q): %v", test.addr, err)
  226. }
  227. err = <-errc
  228. if (err == nil) != test.succeed {
  229. t.Errorf("NewServerConn(%q): %v", test.addr, err)
  230. }
  231. }
  232. }
  233. type legacyRSASigner struct {
  234. Signer
  235. }
  236. func (s *legacyRSASigner) Sign(rand io.Reader, data []byte) (*Signature, error) {
  237. v, ok := s.Signer.(AlgorithmSigner)
  238. if !ok {
  239. return nil, fmt.Errorf("invalid signer")
  240. }
  241. return v.SignWithAlgorithm(rand, data, KeyAlgoRSA)
  242. }
  243. func TestCertTypes(t *testing.T) {
  244. algorithmSigner, ok := testSigners["rsa"].(AlgorithmSigner)
  245. if !ok {
  246. t.Fatal("rsa test signer does not implement the AlgorithmSigner interface")
  247. }
  248. multiAlgoSignerSHA256, err := NewSignerWithAlgorithms(algorithmSigner, []string{KeyAlgoRSASHA256})
  249. if err != nil {
  250. t.Fatalf("unable to create multi algorithm signer SHA256: %v", err)
  251. }
  252. // Algorithms are in order of preference, we expect rsa-sha2-512 to be used.
  253. multiAlgoSignerSHA512, err := NewSignerWithAlgorithms(algorithmSigner, []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256})
  254. if err != nil {
  255. t.Fatalf("unable to create multi algorithm signer SHA512: %v", err)
  256. }
  257. var testVars = []struct {
  258. name string
  259. signer Signer
  260. algo string
  261. }{
  262. {CertAlgoECDSA256v01, testSigners["ecdsap256"], ""},
  263. {CertAlgoECDSA384v01, testSigners["ecdsap384"], ""},
  264. {CertAlgoECDSA521v01, testSigners["ecdsap521"], ""},
  265. {CertAlgoED25519v01, testSigners["ed25519"], ""},
  266. {CertAlgoRSAv01, testSigners["rsa"], KeyAlgoRSASHA256},
  267. {"legacyRSASigner", &legacyRSASigner{testSigners["rsa"]}, KeyAlgoRSA},
  268. {"multiAlgoRSASignerSHA256", multiAlgoSignerSHA256, KeyAlgoRSASHA256},
  269. {"multiAlgoRSASignerSHA512", multiAlgoSignerSHA512, KeyAlgoRSASHA512},
  270. {CertAlgoDSAv01, testSigners["dsa"], ""},
  271. }
  272. k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  273. if err != nil {
  274. t.Fatalf("error generating host key: %v", err)
  275. }
  276. signer, err := NewSignerFromKey(k)
  277. if err != nil {
  278. t.Fatalf("error generating signer for ssh listener: %v", err)
  279. }
  280. conf := &ServerConfig{
  281. PublicKeyCallback: func(c ConnMetadata, k PublicKey) (*Permissions, error) {
  282. return new(Permissions), nil
  283. },
  284. }
  285. conf.AddHostKey(signer)
  286. for _, m := range testVars {
  287. t.Run(m.name, func(t *testing.T) {
  288. c1, c2, err := netPipe()
  289. if err != nil {
  290. t.Fatalf("netPipe: %v", err)
  291. }
  292. defer c1.Close()
  293. defer c2.Close()
  294. go NewServerConn(c1, conf)
  295. priv := m.signer
  296. if err != nil {
  297. t.Fatalf("error generating ssh pubkey: %v", err)
  298. }
  299. cert := &Certificate{
  300. CertType: UserCert,
  301. Key: priv.PublicKey(),
  302. }
  303. cert.SignCert(rand.Reader, priv)
  304. certSigner, err := NewCertSigner(cert, priv)
  305. if err != nil {
  306. t.Fatalf("error generating cert signer: %v", err)
  307. }
  308. if m.algo != "" && cert.Signature.Format != m.algo {
  309. t.Errorf("expected %q signature format, got %q", m.algo, cert.Signature.Format)
  310. }
  311. config := &ClientConfig{
  312. User: "user",
  313. HostKeyCallback: func(h string, r net.Addr, k PublicKey) error { return nil },
  314. Auth: []AuthMethod{PublicKeys(certSigner)},
  315. }
  316. _, _, _, err = NewClientConn(c2, "", config)
  317. if err != nil {
  318. t.Fatalf("error connecting: %v", err)
  319. }
  320. })
  321. }
  322. }
  323. func TestCertSignWithMultiAlgorithmSigner(t *testing.T) {
  324. type testcase struct {
  325. sigAlgo string
  326. algorithms []string
  327. }
  328. cases := []testcase{
  329. {
  330. sigAlgo: KeyAlgoRSA,
  331. algorithms: []string{KeyAlgoRSA, KeyAlgoRSASHA512},
  332. },
  333. {
  334. sigAlgo: KeyAlgoRSASHA256,
  335. algorithms: []string{KeyAlgoRSASHA256, KeyAlgoRSA, KeyAlgoRSASHA512},
  336. },
  337. {
  338. sigAlgo: KeyAlgoRSASHA512,
  339. algorithms: []string{KeyAlgoRSASHA512, KeyAlgoRSASHA256},
  340. },
  341. }
  342. cert := &Certificate{
  343. Key: testPublicKeys["rsa"],
  344. ValidBefore: CertTimeInfinity,
  345. CertType: UserCert,
  346. }
  347. for _, c := range cases {
  348. t.Run(c.sigAlgo, func(t *testing.T) {
  349. signer, err := NewSignerWithAlgorithms(testSigners["rsa"].(AlgorithmSigner), c.algorithms)
  350. if err != nil {
  351. t.Fatalf("NewSignerWithAlgorithms error: %v", err)
  352. }
  353. if err := cert.SignCert(rand.Reader, signer); err != nil {
  354. t.Fatalf("SignCert error: %v", err)
  355. }
  356. if cert.Signature.Format != c.sigAlgo {
  357. t.Fatalf("got signature format %q, want %q", cert.Signature.Format, c.sigAlgo)
  358. }
  359. })
  360. }
  361. }