544 lines
15 KiB
C
544 lines
15 KiB
C
/*
|
|
* Licensed to the Apache Software Foundation (ASF) under one
|
|
* or more contributor license agreements. See the NOTICE file
|
|
* distributed with this work for additional information
|
|
* regarding copyright ownership. The ASF licenses this file
|
|
* to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing,
|
|
* software distributed under the License is distributed on an
|
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
* KIND, either express or implied. See the License for the
|
|
* specific language governing permissions and limitations
|
|
* under the License.
|
|
*/
|
|
#define _POSIX_C_SOURCE 200112L /* https://stackoverflow.com/questions/37541985/storage-size-of-addrinfo-isnt-known */
|
|
|
|
|
|
#include <sys/wait.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netdb.h>
|
|
|
|
#include <thrift/c_glib/transport/thrift_transport.h>
|
|
#include <thrift/c_glib/transport/thrift_buffered_transport.h>
|
|
#include <thrift/c_glib/transport/thrift_server_transport.h>
|
|
#include <thrift/c_glib/transport/thrift_server_socket.h>
|
|
#include <thrift/c_glib/transport/thrift_ssl_socket.h>
|
|
|
|
/* #define TEST_DATA { 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j' } */
|
|
#define TEST_DATA { "GET / HTTP/1.1\n\n" }
|
|
|
|
|
|
/* substituted functions to test failures of system and library calls */
|
|
static int socket_error = 0;
|
|
int
|
|
my_socket(int domain, int type, int protocol)
|
|
{
|
|
if (socket_error == 0)
|
|
{
|
|
return socket (domain, type, protocol);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
static int recv_error = 0;
|
|
ssize_t
|
|
my_recv(int socket, void *buffer, size_t length, int flags)
|
|
{
|
|
if (recv_error == 0)
|
|
{
|
|
return recv (socket, buffer, length, flags);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
static int send_error = 0;
|
|
ssize_t
|
|
my_send(int socket, const void *buffer, size_t length, int flags)
|
|
{
|
|
if (send_error == 0)
|
|
{
|
|
return send (socket, buffer, length, flags);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
#define socket my_socket
|
|
#define recv my_recv
|
|
#define send my_send
|
|
#include "../src/thrift/c_glib/transport/thrift_ssl_socket.c"
|
|
#undef socket
|
|
#undef recv
|
|
#undef send
|
|
|
|
static void thrift_socket_server (const int port);
|
|
|
|
/* test object creation and destruction */
|
|
static void
|
|
test_ssl_create_and_destroy(void)
|
|
{
|
|
gchar *hostname = NULL;
|
|
guint port = 0;
|
|
|
|
GObject *object = NULL;
|
|
object = g_object_new (THRIFT_TYPE_SSL_SOCKET, NULL);
|
|
g_assert (object != NULL);
|
|
g_object_get (G_OBJECT(object), "hostname", &hostname, "port", &port, NULL);
|
|
g_free (hostname);
|
|
g_object_unref (object);
|
|
}
|
|
|
|
static void
|
|
test_ssl_create_and_set_properties(void)
|
|
{
|
|
gchar *hostname = NULL;
|
|
guint port = 0;
|
|
SSL_CTX* ssl_ctx= NULL;
|
|
GError *error=NULL;
|
|
|
|
GObject *object = NULL;
|
|
object = (GObject *)thrift_ssl_socket_new(SSLTLS, &error);
|
|
g_object_get (G_OBJECT(object), "hostname", &hostname, "port", &port, "ssl_context", &ssl_ctx, NULL);
|
|
g_assert (ssl_ctx!=NULL);
|
|
|
|
g_free (hostname);
|
|
g_object_unref (object);
|
|
}
|
|
|
|
static void
|
|
test_ssl_open_and_close_non_ssl_server(void)
|
|
{
|
|
ThriftSSLSocket *tSSLSocket = NULL;
|
|
ThriftTransport *transport = NULL;
|
|
GError *error=NULL;
|
|
pid_t pid;
|
|
int non_ssl_port = 51198;
|
|
char errormsg[255];
|
|
|
|
|
|
pid = fork ();
|
|
g_assert ( pid >= 0 );
|
|
|
|
if ( pid == 0 )
|
|
{
|
|
/* child listens */
|
|
/* This is a non SSL server */
|
|
thrift_socket_server (non_ssl_port);
|
|
exit (0);
|
|
} else {
|
|
/* parent connects, wait a bit for the socket to be created */
|
|
sleep (1);
|
|
|
|
/* open a connection and close it */
|
|
tSSLSocket = thrift_ssl_socket_new_with_host(SSLTLS, "localhost", non_ssl_port, &error);
|
|
|
|
transport = THRIFT_TRANSPORT (tSSLSocket);
|
|
g_assert (thrift_ssl_socket_open (transport, &error) == FALSE);
|
|
g_assert_cmpstr(error->message, == ,"Error while connect/bind: 68 -> Connection reset by peer");
|
|
g_clear_error (&error);
|
|
g_assert (thrift_ssl_socket_is_open (transport) == FALSE);
|
|
thrift_ssl_socket_close (transport, NULL);
|
|
g_assert (thrift_ssl_socket_is_open (transport) == FALSE);
|
|
|
|
/* test close failure */
|
|
THRIFT_SOCKET(tSSLSocket)->sd = -1;
|
|
thrift_ssl_socket_close (transport, NULL);
|
|
g_object_unref (tSSLSocket);
|
|
|
|
/* try a hostname lookup failure */
|
|
tSSLSocket = thrift_ssl_socket_new_with_host(SSLTLS, "localhost.broken", non_ssl_port, &error);
|
|
transport = THRIFT_TRANSPORT (tSSLSocket);
|
|
g_assert (thrift_ssl_socket_open (transport, &error) == FALSE);
|
|
snprintf(errormsg, 255, "host lookup failed for localhost.broken:%d - Unknown host", non_ssl_port);
|
|
g_assert_cmpstr(error->message, ==, errormsg);
|
|
g_clear_error (&error);
|
|
g_object_unref (tSSLSocket);
|
|
error = NULL;
|
|
|
|
/* try an error call to socket() */
|
|
/*
|
|
tSSLSocket = thrift_ssl_socket_new_with_host(SSLTLS, "localhost", port, &error);
|
|
transport = THRIFT_TRANSPORT (tSSLSocket);
|
|
socket_error = 1;
|
|
assert (thrift_ssl_socket_open (transport, &error) == FALSE);
|
|
socket_error = 0;
|
|
g_object_unref (tSSLSocket);
|
|
g_error_free (error);
|
|
*/
|
|
}
|
|
}
|
|
|
|
static void
|
|
test_ssl_write_invalid_socket(void)
|
|
{
|
|
ThriftSSLSocket *tSSLSocket = NULL;
|
|
ThriftTransport *transport = NULL;
|
|
GError *error=NULL;
|
|
|
|
/* open a connection and close it */
|
|
tSSLSocket = thrift_ssl_socket_new_with_host(SSLTLS, "localhost", 51188+1, &error);
|
|
|
|
transport = THRIFT_TRANSPORT (tSSLSocket);
|
|
g_assert (thrift_ssl_socket_open (transport, NULL) == FALSE);
|
|
g_assert (thrift_ssl_socket_is_open (transport) == FALSE);
|
|
|
|
/* FIXME This must be tested but since the assertion inside thrift_ssl_socket_write breaks the test unit
|
|
it's disabled. They idea is to disable trap/coredump during this test
|
|
g_assert (thrift_ssl_socket_write(transport, buffer, sizeof(buffer), &error) == FALSE);
|
|
g_message ("write_failed_with_error: %s",
|
|
error != NULL ? error->message : "No");
|
|
g_clear_error (&error);
|
|
*/
|
|
thrift_ssl_socket_close (transport, NULL);
|
|
g_assert (thrift_ssl_socket_is_open (transport) == FALSE);
|
|
|
|
/* test close failure */
|
|
THRIFT_SOCKET(tSSLSocket)->sd = -1;
|
|
thrift_ssl_socket_close (transport, NULL);
|
|
g_object_unref (tSSLSocket);
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
* Print the common name of certificate
|
|
*/
|
|
unsigned char * get_cn_name(X509_NAME* const name)
|
|
{
|
|
int idx = -1;
|
|
unsigned char *utf8 = NULL;
|
|
|
|
do
|
|
{
|
|
if(!name) break; /* failed */
|
|
|
|
idx = X509_NAME_get_index_by_NID(name, NID_commonName, -1);
|
|
if(!(idx > -1)) break; /* failed */
|
|
|
|
X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, idx);
|
|
if(!entry) break; /* failed */
|
|
|
|
ASN1_STRING* data = X509_NAME_ENTRY_get_data(entry);
|
|
if(!data) break; /* failed */
|
|
|
|
int length = ASN1_STRING_to_UTF8(&utf8, data);
|
|
if(!utf8 || !(length > 0)) break; /* failed */
|
|
|
|
} while (0);
|
|
return utf8;
|
|
}
|
|
|
|
/*
|
|
* Handle IPV4 and IPV6 addr
|
|
*/
|
|
void *get_in_addr(struct sockaddr *sa)
|
|
{
|
|
if (sa->sa_family == AF_INET)
|
|
return &(((struct sockaddr_in*)sa)->sin_addr);
|
|
return &(((struct sockaddr_in6*)sa)->sin6_addr);
|
|
}
|
|
|
|
int verify_ip(char * hostname, struct sockaddr_storage *addr)
|
|
{
|
|
struct addrinfo *addr_info,*p;
|
|
struct addrinfo hints;
|
|
int res;
|
|
int retval = 0;
|
|
|
|
|
|
memset(&hints, 0, sizeof (struct addrinfo));
|
|
hints.ai_family = AF_UNSPEC; /* use AF_INET6 to force IPv6 */
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
|
|
if ( (res = getaddrinfo(hostname, NULL, &hints, &addr_info) ) != 0)
|
|
{
|
|
/* get the host info */
|
|
g_error("Cannot get the host address");
|
|
return retval;
|
|
}
|
|
/* loop through all the results and connect to the first we can */
|
|
char dnshost[INET6_ADDRSTRLEN]; /* bigger addr supported IPV6 */
|
|
char socket_ip[INET6_ADDRSTRLEN];
|
|
if(inet_ntop(addr->ss_family, get_in_addr((struct sockaddr*)addr), socket_ip, INET6_ADDRSTRLEN)==socket_ip){
|
|
g_debug("We are connected to host %s checking against certificate...", socket_ip);
|
|
int sizeip = socket_ip!=NULL ? strlen(socket_ip) : 0;
|
|
for(p = addr_info; p != NULL; p = p->ai_next) {
|
|
if(inet_ntop(p->ai_family, get_in_addr((struct sockaddr *)p->ai_addr), dnshost, INET6_ADDRSTRLEN)==dnshost){
|
|
if(dnshost!=NULL){
|
|
g_info("DNS address [%i -> %s]", ((guint32)(p->ai_addrlen)), dnshost);
|
|
if(!strncmp(dnshost, socket_ip, sizeip)){
|
|
retval=1;
|
|
break; /* if we get here, we must have connected successfully */
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if(addr_info)
|
|
freeaddrinfo(addr_info);
|
|
|
|
return retval;
|
|
}
|
|
|
|
static void
|
|
read_from_file(char *buffer, long size, const char *file_name)
|
|
{
|
|
char ch;
|
|
long index=0;
|
|
FILE *fp;
|
|
|
|
fp = fopen(file_name,"r"); /* read mode */
|
|
|
|
if( fp == NULL )
|
|
{
|
|
perror("Error while opening the file.\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
printf("The contents of %s file are :\n", file_name);
|
|
|
|
while(index<size && ( ch = fgetc(fp) ) != EOF ){
|
|
buffer[index++] = ch;
|
|
}
|
|
|
|
fclose(fp);
|
|
}
|
|
|
|
#define ISSUER_CN_PINNING "The Apache Software Foundation"
|
|
#define SUBJECT_CN_PINNING "localhost"
|
|
#define CERT_SERIAL_NUMBER "1"
|
|
|
|
gboolean verify_certificate_sn(X509 *cert, const unsigned char *serial_number)
|
|
{
|
|
gboolean retval = FALSE;
|
|
|
|
ASN1_INTEGER *serial = X509_get_serialNumber(cert);
|
|
|
|
BIGNUM *bn = ASN1_INTEGER_to_BN(serial, NULL);
|
|
if (!bn) {
|
|
fprintf(stderr, "unable to convert ASN1INTEGER to BN\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
char *tmp = BN_bn2dec(bn);
|
|
if (!tmp) {
|
|
g_warning((const char*)stderr, "unable to convert BN to decimal string.\n");
|
|
BN_free(bn);
|
|
return EXIT_FAILURE;
|
|
}
|
|
/*
|
|
if (strlen(tmp) >= len) {
|
|
g_warn(stderr, "buffer length shorter than serial number\n");
|
|
BN_free(bn);
|
|
OPENSSL_free(tmp);
|
|
return EXIT_FAILURE;
|
|
}
|
|
*/
|
|
if(!strncmp((const char*)serial_number, tmp, strlen((const char*)serial_number))){
|
|
retval=TRUE;
|
|
}else{
|
|
g_warning("Serial number is not valid");
|
|
}
|
|
|
|
BN_free(bn);
|
|
OPENSSL_free(tmp);
|
|
return retval;
|
|
}
|
|
|
|
gboolean my_access_manager(ThriftTransport * transport, X509 *cert, struct sockaddr_storage *addr, GError **error)
|
|
{
|
|
ThriftSSLSocket *sslSocket = THRIFT_SSL_SOCKET (transport);
|
|
THRIFT_UNUSED_VAR (error);
|
|
THRIFT_UNUSED_VAR (sslSocket);
|
|
|
|
g_info("Processing access to the server");
|
|
X509_NAME* iname = cert ? X509_get_issuer_name(cert) : NULL;
|
|
X509_NAME* sname = cert ? X509_get_subject_name(cert) : NULL;
|
|
|
|
/* Issuer is the authority we trust that warrants nothing useful */
|
|
const unsigned char * issuer = get_cn_name(iname);
|
|
if(issuer){
|
|
gboolean valid = TRUE;
|
|
g_info("Issuer (cn) %s", issuer);
|
|
|
|
/* Issuer pinning */
|
|
if(strncmp(ISSUER_CN_PINNING, (const char*)issuer, strlen(ISSUER_CN_PINNING))){
|
|
g_warning("The Issuer of the certificate is not valid");
|
|
valid=FALSE;
|
|
}
|
|
OPENSSL_free((void*)issuer);
|
|
if(!valid)
|
|
return valid;
|
|
}
|
|
|
|
|
|
/* Subject is who the certificate is issued to by the authority */
|
|
const unsigned char * subject = get_cn_name(sname);
|
|
if(subject){
|
|
g_info("Subject (cn) %s", subject);
|
|
gboolean valid = TRUE;
|
|
|
|
/* Subject pinning */
|
|
if(strncmp(SUBJECT_CN_PINNING, (const char*)subject, strlen(SUBJECT_CN_PINNING))){
|
|
g_warning("The subject of the certificate is not valid");
|
|
valid=FALSE;
|
|
}
|
|
|
|
if(!valid)
|
|
return valid;
|
|
|
|
/* Host pinning */
|
|
if(verify_ip((char*)subject, addr)){
|
|
g_info("Verified subject");
|
|
}else{
|
|
g_info("Cannot verify subject");
|
|
valid=FALSE;
|
|
}
|
|
OPENSSL_free((void*)subject);
|
|
|
|
if(!valid)
|
|
return valid;
|
|
}
|
|
|
|
if(!verify_certificate_sn(cert, (const unsigned char*)CERT_SERIAL_NUMBER)){
|
|
return FALSE;
|
|
}else{
|
|
g_info("Verified serial number");
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#ifdef BUILD_SERVER
|
|
static void
|
|
test_ssl_authorization_manager(void)
|
|
{
|
|
int status=0;
|
|
pid_t pid;
|
|
ThriftSSLSocket *tSSLsocket = NULL;
|
|
ThriftTransport *transport = NULL;
|
|
/* int port = 51199; */
|
|
int port = 443;
|
|
GError *error=NULL;
|
|
|
|
guchar buf[17] = TEST_DATA; /* a buffer */
|
|
|
|
/*
|
|
pid = fork ();
|
|
g_assert ( pid >= 0 );
|
|
|
|
if ( pid == 0 )
|
|
{
|
|
thrift_ssl_socket_server (port);
|
|
exit (0);
|
|
} else {
|
|
*/
|
|
/* parent connects, wait a bit for the socket to be created */
|
|
sleep (1);
|
|
|
|
/* Test against level2 owncloud certificate */
|
|
tSSLsocket = thrift_ssl_socket_new_with_host(SSLTLS, "localhost", port, &error);
|
|
thrift_ssl_socket_set_manager(tSSLsocket, my_access_manager); /* Install pinning manager */
|
|
/* thrift_ssl_load_cert_from_file(tSSLsocket, "./owncloud.level2crm.pem"); */
|
|
unsigned char cert_buffer[65534];
|
|
read_from_file(cert_buffer, 65534, "../../keys/client.pem");
|
|
if(!thrift_ssl_load_cert_from_buffer(tSSLsocket, cert_buffer)){
|
|
g_warning("Certificates cannot be loaded!");
|
|
}
|
|
|
|
transport = THRIFT_TRANSPORT (tSSLsocket);
|
|
g_assert (thrift_ssl_socket_open (transport, NULL) == TRUE);
|
|
g_assert (thrift_ssl_socket_is_open (transport));
|
|
|
|
thrift_ssl_socket_write (transport, buf, 17, NULL);
|
|
|
|
/* write fail */
|
|
send_error = 1;
|
|
/*
|
|
thrift_ssl_socket_write (transport, buf, 1, NULL);
|
|
send_error = 0;
|
|
thrift_ssl_socket_write_end (transport, NULL);
|
|
thrift_ssl_socket_flush (transport, NULL);
|
|
*/
|
|
thrift_ssl_socket_close (transport, NULL);
|
|
g_object_unref (tSSLsocket);
|
|
|
|
/* g_assert ( wait (&status) == pid ); */
|
|
g_assert ( status == 0 );
|
|
/* } */
|
|
}
|
|
#endif
|
|
|
|
|
|
static void
|
|
thrift_socket_server (const int port)
|
|
{
|
|
int bytes = 0;
|
|
ThriftServerTransport *transport = NULL;
|
|
ThriftTransport *client = NULL;
|
|
guchar buf[10]; /* a buffer */
|
|
guchar match[] = TEST_DATA;
|
|
|
|
ThriftServerSocket *tsocket = g_object_new (THRIFT_TYPE_SERVER_SOCKET,
|
|
"port", port, NULL);
|
|
|
|
transport = THRIFT_SERVER_TRANSPORT (tsocket);
|
|
thrift_server_transport_listen (transport, NULL);
|
|
client = thrift_server_transport_accept (transport, NULL);
|
|
g_assert (client != NULL);
|
|
|
|
/* read 10 bytes */
|
|
bytes = thrift_ssl_socket_read (client, buf, 10, NULL);
|
|
g_assert (bytes == 10); /* make sure we've read 10 bytes */
|
|
g_assert ( memcmp(buf, match, 10) == 0 ); /* make sure what we got matches */
|
|
|
|
/* failed read */
|
|
recv_error = 1;
|
|
thrift_ssl_socket_read (client, buf, 1, NULL);
|
|
recv_error = 0;
|
|
|
|
thrift_ssl_socket_read_end (client, NULL);
|
|
thrift_ssl_socket_close (client, NULL);
|
|
g_object_unref (tsocket);
|
|
g_object_unref (client);
|
|
}
|
|
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
int retval;
|
|
#if (!GLIB_CHECK_VERSION (2, 36, 0))
|
|
g_type_init();
|
|
#endif
|
|
|
|
g_test_init (&argc, &argv, NULL);
|
|
|
|
thrift_ssl_socket_initialize_openssl();
|
|
|
|
g_test_add_func ("/testtransportsslsocket/CreateAndDestroy", test_ssl_create_and_destroy);
|
|
g_test_add_func ("/testtransportsslsocket/CreateAndSetProperties", test_ssl_create_and_set_properties);
|
|
g_test_add_func ("/testtransportsslsocket/OpenAndCloseNonSSLServer", test_ssl_open_and_close_non_ssl_server);
|
|
g_test_add_func ("/testtransportsslsocket/OpenAndWriteInvalidSocket", test_ssl_write_invalid_socket);
|
|
|
|
|
|
|
|
|
|
retval = g_test_run ();
|
|
|
|
thrift_ssl_socket_finalize_openssl();
|
|
|
|
return retval;
|
|
}
|
|
|