70-test_sslsignature.t
5.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
#! /usr/bin/env perl
# Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the OpenSSL license (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
use strict;
use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file bldtop_dir/;
use OpenSSL::Test::Utils;
use TLSProxy::Proxy;
my $test_name = "test_sslsignature";
setup($test_name);
plan skip_all => "TLSProxy isn't usable on $^O"
if $^O =~ /^(VMS)$/;
plan skip_all => "$test_name needs the dynamic engine feature enabled"
if disabled("engine") || disabled("dynamic-engine");
plan skip_all => "$test_name needs the sock feature enabled"
if disabled("sock");
plan skip_all => "$test_name needs TLS enabled"
if alldisabled(available_protocols("tls"));
$ENV{OPENSSL_ia32cap} = '~0x200000200000000';
my $proxy = TLSProxy::Proxy->new(
undef,
cmdstr(app(["openssl"]), display => 1),
srctop_file("apps", "server.pem"),
(!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
);
use constant {
NO_CORRUPTION => 0,
CORRUPT_SERVER_CERT_VERIFY => 1,
CORRUPT_CLIENT_CERT_VERIFY => 2,
CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE => 3,
};
$proxy->filter(\&signature_filter);
#Test 1: No corruption should succeed
my $testtype = NO_CORRUPTION;
$proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
plan tests => 4;
ok(TLSProxy::Message->success, "No corruption");
SKIP: {
skip "TLSv1.3 disabled", 1 if disabled("tls1_3");
#Test 2: Corrupting a server CertVerify signature in TLSv1.3 should fail
$proxy->clear();
$testtype = CORRUPT_SERVER_CERT_VERIFY;
$proxy->start();
ok(TLSProxy::Message->fail, "Corrupt server TLSv1.3 CertVerify");
#Test x: Corrupting a client CertVerify signature in TLSv1.3 should fail
#$proxy->clear();
#$testtype = CORRUPT_CLIENT_CERT_VERIFY;
#$proxy->serverflags("-Verify 5");
#$proxy->clientflags("-cert ".srctop_file("apps", "server.pem"));
#$proxy->start();
#ok(TLSProxy::Message->fail, "Corrupt client TLSv1.3 CertVerify");
#TODO(TLS1.3): This test fails due to a problem in s_server/TLSProxy.
#Currently a connection is counted as "successful" if the client ends it
#with a close_notify. In TLSProxy the client initiates the closure of the
#connection so really we should not count it as successful until s_server
#has also responded with a close_notify. However s_server never sends a
#close_notify - it just closes the connection. Fixing this would be a
#significant change to the long established behaviour of s_server.
#Unfortunately in this test, it is the server that notices the incorrect
#signature and responds with an appropriate alert. However s_client never
#sees that because it occurs after the server Finished has been sent.
#Therefore s_client just continues to send its application data and sends
#its close_notify regardless. TLSProxy sees this and thinks that the
#connection was successful when in fact it was not. There isn't an easy fix
#for this, so leaving this test commented out for now.
}
SKIP: {
skip "TLS <= 1.2 disabled", 2
if alldisabled(("ssl3", "tls1", "tls1_1", "tls1_2"));
#Test 3: Corrupting a CertVerify signature in <=TLSv1.2 should fail
$proxy->clear();
$testtype = CORRUPT_CLIENT_CERT_VERIFY;
$proxy->serverflags("-Verify 5");
$proxy->clientflags("-no_tls1_3 -cert ".srctop_file("apps", "server.pem"));
$proxy->start();
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 CertVerify");
SKIP: {
skip "DH disabled", 1 if disabled("dh");
#Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should
#fail
$proxy->clear();
$testtype = CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE;
$proxy->clientflags("-no_tls1_3");
$proxy->cipherc('DHE-RSA-AES128-SHA');
$proxy->ciphers('DHE-RSA-AES128-SHA');
$proxy->start();
ok(TLSProxy::Message->fail, "Corrupt <=TLSv1.2 ServerKeyExchange");
}
}
sub signature_filter
{
my $proxy = shift;
my $flight;
my $mt = TLSProxy::Message::MT_CERTIFICATE_VERIFY;
if ($testtype == CORRUPT_SERVER_CERT_VERIFY
|| $testtype == CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE
|| (!disabled("tls1_3") && $testtype == NO_CORRUPTION)) {
$flight = 1;
} else {
$flight = 2;
}
# We're only interested in the initial server flight
return if ($proxy->flight != $flight);
$mt = TLSProxy::Message::MT_SERVER_KEY_EXCHANGE
if ($testtype == CORRUPT_TLS1_2_SERVER_KEY_EXCHANGE);
foreach my $message (@{$proxy->message_list}) {
if ($message->mt == $mt) {
my $sig = $message->signature();
my $sigbase = substr($sig, 0, -1);
my $sigend = unpack("C", substr($sig, -1));
#Flip bits in final byte of signature to corrupt the sig
$sigend ^= 0xff unless $testtype == NO_CORRUPTION;
$message->signature($sigbase.pack("C", $sigend));
$message->repack();
}
}
}