github.com/psiphon-Labs/psiphon-tunnel-core@v2.0.28+incompatible/psiphon/common/crypto/ssh/agent/client_test.go (about) 1 // Copyright 2012 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package agent 6 7 import ( 8 "bytes" 9 "crypto/rand" 10 "errors" 11 "io" 12 "net" 13 "os" 14 "os/exec" 15 "path/filepath" 16 "runtime" 17 "strconv" 18 "strings" 19 "sync" 20 "testing" 21 "time" 22 23 "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/crypto/ssh" 24 ) 25 26 // startOpenSSHAgent executes ssh-agent, and returns an Agent interface to it. 27 func startOpenSSHAgent(t *testing.T) (client ExtendedAgent, socket string, cleanup func()) { 28 if testing.Short() { 29 // ssh-agent is not always available, and the key 30 // types supported vary by platform. 31 t.Skip("skipping test due to -short") 32 } 33 34 bin, err := exec.LookPath("ssh-agent") 35 if err != nil { 36 t.Skip("could not find ssh-agent") 37 } 38 39 cmd := exec.Command(bin, "-s") 40 cmd.Env = []string{} // Do not let the user's environment influence ssh-agent behavior. 41 cmd.Stderr = new(bytes.Buffer) 42 out, err := cmd.Output() 43 if err != nil { 44 t.Fatalf("%s failed: %v\n%s", strings.Join(cmd.Args, " "), err, cmd.Stderr) 45 } 46 47 // Output looks like: 48 // 49 // SSH_AUTH_SOCK=/tmp/ssh-P65gpcqArqvH/agent.15541; export SSH_AUTH_SOCK; 50 // SSH_AGENT_PID=15542; export SSH_AGENT_PID; 51 // echo Agent pid 15542; 52 53 fields := bytes.Split(out, []byte(";")) 54 line := bytes.SplitN(fields[0], []byte("="), 2) 55 line[0] = bytes.TrimLeft(line[0], "\n") 56 if string(line[0]) != "SSH_AUTH_SOCK" { 57 t.Fatalf("could not find key SSH_AUTH_SOCK in %q", fields[0]) 58 } 59 socket = string(line[1]) 60 61 line = bytes.SplitN(fields[2], []byte("="), 2) 62 line[0] = bytes.TrimLeft(line[0], "\n") 63 if string(line[0]) != "SSH_AGENT_PID" { 64 t.Fatalf("could not find key SSH_AGENT_PID in %q", fields[2]) 65 } 66 pidStr := line[1] 67 pid, err := strconv.Atoi(string(pidStr)) 68 if err != nil { 69 t.Fatalf("Atoi(%q): %v", pidStr, err) 70 } 71 72 conn, err := net.Dial("unix", string(socket)) 73 if err != nil { 74 t.Fatalf("net.Dial: %v", err) 75 } 76 77 ac := NewClient(conn) 78 return ac, socket, func() { 79 proc, _ := os.FindProcess(pid) 80 if proc != nil { 81 proc.Kill() 82 } 83 conn.Close() 84 os.RemoveAll(filepath.Dir(socket)) 85 } 86 } 87 88 func startAgent(t *testing.T, agent Agent) (client ExtendedAgent, cleanup func()) { 89 c1, c2, err := netPipe() 90 if err != nil { 91 t.Fatalf("netPipe: %v", err) 92 } 93 go ServeAgent(agent, c2) 94 95 return NewClient(c1), func() { 96 c1.Close() 97 c2.Close() 98 } 99 } 100 101 // startKeyringAgent uses Keyring to simulate a ssh-agent Server and returns a client. 102 func startKeyringAgent(t *testing.T) (client ExtendedAgent, cleanup func()) { 103 return startAgent(t, NewKeyring()) 104 } 105 106 func testOpenSSHAgent(t *testing.T, key interface{}, cert *ssh.Certificate, lifetimeSecs uint32) { 107 agent, _, cleanup := startOpenSSHAgent(t) 108 defer cleanup() 109 110 testAgentInterface(t, agent, key, cert, lifetimeSecs) 111 } 112 113 func testKeyringAgent(t *testing.T, key interface{}, cert *ssh.Certificate, lifetimeSecs uint32) { 114 agent, cleanup := startKeyringAgent(t) 115 defer cleanup() 116 117 testAgentInterface(t, agent, key, cert, lifetimeSecs) 118 } 119 120 func testAgentInterface(t *testing.T, agent ExtendedAgent, key interface{}, cert *ssh.Certificate, lifetimeSecs uint32) { 121 signer, err := ssh.NewSignerFromKey(key) 122 if err != nil { 123 t.Fatalf("NewSignerFromKey(%T): %v", key, err) 124 } 125 // The agent should start up empty. 126 if keys, err := agent.List(); err != nil { 127 t.Fatalf("RequestIdentities: %v", err) 128 } else if len(keys) > 0 { 129 t.Fatalf("got %d keys, want 0: %v", len(keys), keys) 130 } 131 132 // Attempt to insert the key, with certificate if specified. 133 var pubKey ssh.PublicKey 134 if cert != nil { 135 err = agent.Add(AddedKey{ 136 PrivateKey: key, 137 Certificate: cert, 138 Comment: "comment", 139 LifetimeSecs: lifetimeSecs, 140 }) 141 pubKey = cert 142 } else { 143 err = agent.Add(AddedKey{PrivateKey: key, Comment: "comment", LifetimeSecs: lifetimeSecs}) 144 pubKey = signer.PublicKey() 145 } 146 if err != nil { 147 t.Fatalf("insert(%T): %v", key, err) 148 } 149 150 // Did the key get inserted successfully? 151 if keys, err := agent.List(); err != nil { 152 t.Fatalf("List: %v", err) 153 } else if len(keys) != 1 { 154 t.Fatalf("got %v, want 1 key", keys) 155 } else if keys[0].Comment != "comment" { 156 t.Fatalf("key comment: got %v, want %v", keys[0].Comment, "comment") 157 } else if !bytes.Equal(keys[0].Blob, pubKey.Marshal()) { 158 t.Fatalf("key mismatch") 159 } 160 161 // Can the agent make a valid signature? 162 data := []byte("hello") 163 sig, err := agent.Sign(pubKey, data) 164 if err != nil { 165 t.Fatalf("Sign(%s): %v", pubKey.Type(), err) 166 } 167 168 if err := pubKey.Verify(data, sig); err != nil { 169 t.Fatalf("Verify(%s): %v", pubKey.Type(), err) 170 } 171 172 // For tests on RSA keys, try signing with SHA-256 and SHA-512 flags 173 if pubKey.Type() == "ssh-rsa" { 174 sshFlagTest := func(flag SignatureFlags, expectedSigFormat string) { 175 sig, err = agent.SignWithFlags(pubKey, data, flag) 176 if err != nil { 177 t.Fatalf("SignWithFlags(%s): %v", pubKey.Type(), err) 178 } 179 if sig.Format != expectedSigFormat { 180 t.Fatalf("Signature format didn't match expected value: %s != %s", sig.Format, expectedSigFormat) 181 } 182 if err := pubKey.Verify(data, sig); err != nil { 183 t.Fatalf("Verify(%s): %v", pubKey.Type(), err) 184 } 185 } 186 sshFlagTest(0, ssh.SigAlgoRSA) 187 sshFlagTest(SignatureFlagRsaSha256, ssh.SigAlgoRSASHA2256) 188 sshFlagTest(SignatureFlagRsaSha512, ssh.SigAlgoRSASHA2512) 189 } 190 191 // If the key has a lifetime, is it removed when it should be? 192 if lifetimeSecs > 0 { 193 time.Sleep(time.Second*time.Duration(lifetimeSecs) + 100*time.Millisecond) 194 keys, err := agent.List() 195 if err != nil { 196 t.Fatalf("List: %v", err) 197 } 198 if len(keys) > 0 { 199 t.Fatalf("key not expired") 200 } 201 } 202 203 } 204 205 func TestMalformedRequests(t *testing.T) { 206 keyringAgent := NewKeyring() 207 listener, err := netListener() 208 if err != nil { 209 t.Fatalf("netListener: %v", err) 210 } 211 defer listener.Close() 212 213 testCase := func(t *testing.T, requestBytes []byte, wantServerErr bool) { 214 var wg sync.WaitGroup 215 wg.Add(1) 216 go func() { 217 defer wg.Done() 218 c, err := listener.Accept() 219 if err != nil { 220 t.Errorf("listener.Accept: %v", err) 221 return 222 } 223 defer c.Close() 224 225 err = ServeAgent(keyringAgent, c) 226 if err == nil { 227 t.Error("ServeAgent should have returned an error to malformed input") 228 } else { 229 if (err != io.EOF) != wantServerErr { 230 t.Errorf("ServeAgent returned expected error: %v", err) 231 } 232 } 233 }() 234 235 c, err := net.Dial("tcp", listener.Addr().String()) 236 if err != nil { 237 t.Fatalf("net.Dial: %v", err) 238 } 239 _, err = c.Write(requestBytes) 240 if err != nil { 241 t.Errorf("Unexpected error writing raw bytes on connection: %v", err) 242 } 243 c.Close() 244 wg.Wait() 245 } 246 247 var testCases = []struct { 248 name string 249 requestBytes []byte 250 wantServerErr bool 251 }{ 252 {"Empty request", []byte{}, false}, 253 {"Short header", []byte{0x00}, true}, 254 {"Empty body", []byte{0x00, 0x00, 0x00, 0x00}, true}, 255 {"Short body", []byte{0x00, 0x00, 0x00, 0x01}, false}, 256 } 257 for _, tc := range testCases { 258 t.Run(tc.name, func(t *testing.T) { testCase(t, tc.requestBytes, tc.wantServerErr) }) 259 } 260 } 261 262 func TestAgent(t *testing.T) { 263 for _, keyType := range []string{"rsa", "dsa", "ecdsa", "ed25519"} { 264 testOpenSSHAgent(t, testPrivateKeys[keyType], nil, 0) 265 testKeyringAgent(t, testPrivateKeys[keyType], nil, 0) 266 } 267 } 268 269 func TestCert(t *testing.T) { 270 cert := &ssh.Certificate{ 271 Key: testPublicKeys["rsa"], 272 ValidBefore: ssh.CertTimeInfinity, 273 CertType: ssh.UserCert, 274 } 275 cert.SignCert(rand.Reader, testSigners["ecdsa"]) 276 277 testOpenSSHAgent(t, testPrivateKeys["rsa"], cert, 0) 278 testKeyringAgent(t, testPrivateKeys["rsa"], cert, 0) 279 } 280 281 // netListener creates a localhost network listener. 282 func netListener() (net.Listener, error) { 283 listener, err := net.Listen("tcp", "127.0.0.1:0") 284 if err != nil { 285 listener, err = net.Listen("tcp", "[::1]:0") 286 if err != nil { 287 return nil, err 288 } 289 } 290 return listener, nil 291 } 292 293 // netPipe is analogous to net.Pipe, but it uses a real net.Conn, and 294 // therefore is buffered (net.Pipe deadlocks if both sides start with 295 // a write.) 296 func netPipe() (net.Conn, net.Conn, error) { 297 listener, err := netListener() 298 if err != nil { 299 return nil, nil, err 300 } 301 defer listener.Close() 302 c1, err := net.Dial("tcp", listener.Addr().String()) 303 if err != nil { 304 return nil, nil, err 305 } 306 307 c2, err := listener.Accept() 308 if err != nil { 309 c1.Close() 310 return nil, nil, err 311 } 312 313 return c1, c2, nil 314 } 315 316 func TestServerResponseTooLarge(t *testing.T) { 317 a, b, err := netPipe() 318 if err != nil { 319 t.Fatalf("netPipe: %v", err) 320 } 321 done := make(chan struct{}) 322 defer func() { <-done }() 323 324 defer a.Close() 325 defer b.Close() 326 327 var response identitiesAnswerAgentMsg 328 response.NumKeys = 1 329 response.Keys = make([]byte, maxAgentResponseBytes+1) 330 331 agent := NewClient(a) 332 go func() { 333 defer close(done) 334 n, err := b.Write(ssh.Marshal(response)) 335 if n < 4 { 336 if runtime.GOOS == "plan9" { 337 if e1, ok := err.(*net.OpError); ok { 338 if e2, ok := e1.Err.(*os.PathError); ok { 339 switch e2.Err.Error() { 340 case "Hangup", "i/o on hungup channel": 341 // syscall.Pwrite returns -1 in this case even when some data did get written. 342 return 343 } 344 } 345 } 346 } 347 t.Errorf("At least 4 bytes (the response size) should have been successfully written: %d < 4: %v", n, err) 348 } 349 }() 350 _, err = agent.List() 351 if err == nil { 352 t.Fatal("Did not get error result") 353 } 354 if err.Error() != "agent: client error: response too large" { 355 t.Fatal("Did not get expected error result") 356 } 357 } 358 359 func TestAuth(t *testing.T) { 360 agent, _, cleanup := startOpenSSHAgent(t) 361 defer cleanup() 362 363 a, b, err := netPipe() 364 if err != nil { 365 t.Fatalf("netPipe: %v", err) 366 } 367 368 defer a.Close() 369 defer b.Close() 370 371 if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["rsa"], Comment: "comment"}); err != nil { 372 t.Errorf("Add: %v", err) 373 } 374 375 serverConf := ssh.ServerConfig{} 376 serverConf.AddHostKey(testSigners["rsa"]) 377 serverConf.PublicKeyCallback = func(c ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) { 378 if bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) { 379 return nil, nil 380 } 381 382 return nil, errors.New("pubkey rejected") 383 } 384 385 go func() { 386 conn, _, _, err := ssh.NewServerConn(a, &serverConf) 387 if err != nil { 388 t.Fatalf("Server: %v", err) 389 } 390 conn.Close() 391 }() 392 393 conf := ssh.ClientConfig{ 394 HostKeyCallback: ssh.InsecureIgnoreHostKey(), 395 } 396 conf.Auth = append(conf.Auth, ssh.PublicKeysCallback(agent.Signers)) 397 conn, _, _, err := ssh.NewClientConn(b, "", &conf) 398 if err != nil { 399 t.Fatalf("NewClientConn: %v", err) 400 } 401 conn.Close() 402 } 403 404 func TestLockOpenSSHAgent(t *testing.T) { 405 agent, _, cleanup := startOpenSSHAgent(t) 406 defer cleanup() 407 testLockAgent(agent, t) 408 } 409 410 func TestLockKeyringAgent(t *testing.T) { 411 agent, cleanup := startKeyringAgent(t) 412 defer cleanup() 413 testLockAgent(agent, t) 414 } 415 416 func testLockAgent(agent Agent, t *testing.T) { 417 if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["rsa"], Comment: "comment 1"}); err != nil { 418 t.Errorf("Add: %v", err) 419 } 420 if err := agent.Add(AddedKey{PrivateKey: testPrivateKeys["dsa"], Comment: "comment dsa"}); err != nil { 421 t.Errorf("Add: %v", err) 422 } 423 if keys, err := agent.List(); err != nil { 424 t.Errorf("List: %v", err) 425 } else if len(keys) != 2 { 426 t.Errorf("Want 2 keys, got %v", keys) 427 } 428 429 passphrase := []byte("secret") 430 if err := agent.Lock(passphrase); err != nil { 431 t.Errorf("Lock: %v", err) 432 } 433 434 if keys, err := agent.List(); err != nil { 435 t.Errorf("List: %v", err) 436 } else if len(keys) != 0 { 437 t.Errorf("Want 0 keys, got %v", keys) 438 } 439 440 signer, _ := ssh.NewSignerFromKey(testPrivateKeys["rsa"]) 441 if _, err := agent.Sign(signer.PublicKey(), []byte("hello")); err == nil { 442 t.Fatalf("Sign did not fail") 443 } 444 445 if err := agent.Remove(signer.PublicKey()); err == nil { 446 t.Fatalf("Remove did not fail") 447 } 448 449 if err := agent.RemoveAll(); err == nil { 450 t.Fatalf("RemoveAll did not fail") 451 } 452 453 if err := agent.Unlock(nil); err == nil { 454 t.Errorf("Unlock with wrong passphrase succeeded") 455 } 456 if err := agent.Unlock(passphrase); err != nil { 457 t.Errorf("Unlock: %v", err) 458 } 459 460 if err := agent.Remove(signer.PublicKey()); err != nil { 461 t.Fatalf("Remove: %v", err) 462 } 463 464 if keys, err := agent.List(); err != nil { 465 t.Errorf("List: %v", err) 466 } else if len(keys) != 1 { 467 t.Errorf("Want 1 keys, got %v", keys) 468 } 469 } 470 471 func testOpenSSHAgentLifetime(t *testing.T) { 472 agent, _, cleanup := startOpenSSHAgent(t) 473 defer cleanup() 474 testAgentLifetime(t, agent) 475 } 476 477 func testKeyringAgentLifetime(t *testing.T) { 478 agent, cleanup := startKeyringAgent(t) 479 defer cleanup() 480 testAgentLifetime(t, agent) 481 } 482 483 func testAgentLifetime(t *testing.T, agent Agent) { 484 for _, keyType := range []string{"rsa", "dsa", "ecdsa"} { 485 // Add private keys to the agent. 486 err := agent.Add(AddedKey{ 487 PrivateKey: testPrivateKeys[keyType], 488 Comment: "comment", 489 LifetimeSecs: 1, 490 }) 491 if err != nil { 492 t.Fatalf("add: %v", err) 493 } 494 // Add certs to the agent. 495 cert := &ssh.Certificate{ 496 Key: testPublicKeys[keyType], 497 ValidBefore: ssh.CertTimeInfinity, 498 CertType: ssh.UserCert, 499 } 500 cert.SignCert(rand.Reader, testSigners[keyType]) 501 err = agent.Add(AddedKey{ 502 PrivateKey: testPrivateKeys[keyType], 503 Certificate: cert, 504 Comment: "comment", 505 LifetimeSecs: 1, 506 }) 507 if err != nil { 508 t.Fatalf("add: %v", err) 509 } 510 } 511 time.Sleep(1100 * time.Millisecond) 512 if keys, err := agent.List(); err != nil { 513 t.Errorf("List: %v", err) 514 } else if len(keys) != 0 { 515 t.Errorf("Want 0 keys, got %v", len(keys)) 516 } 517 } 518 519 type keyringExtended struct { 520 *keyring 521 } 522 523 func (r *keyringExtended) Extension(extensionType string, contents []byte) ([]byte, error) { 524 if extensionType != "my-extension@example.com" { 525 return []byte{agentExtensionFailure}, nil 526 } 527 return append([]byte{agentSuccess}, contents...), nil 528 } 529 530 func TestAgentExtensions(t *testing.T) { 531 agent, _, cleanup := startOpenSSHAgent(t) 532 defer cleanup() 533 _, err := agent.Extension("my-extension@example.com", []byte{0x00, 0x01, 0x02}) 534 if err == nil { 535 t.Fatal("should have gotten agent extension failure") 536 } 537 538 agent, cleanup = startAgent(t, &keyringExtended{}) 539 defer cleanup() 540 result, err := agent.Extension("my-extension@example.com", []byte{0x00, 0x01, 0x02}) 541 if err != nil { 542 t.Fatalf("agent extension failure: %v", err) 543 } 544 if len(result) != 4 || !bytes.Equal(result, []byte{agentSuccess, 0x00, 0x01, 0x02}) { 545 t.Fatalf("agent extension result invalid: %v", result) 546 } 547 548 _, err = agent.Extension("bad-extension@example.com", []byte{0x00, 0x01, 0x02}) 549 if err == nil { 550 t.Fatal("should have gotten agent extension failure") 551 } 552 }