X-Git-Url: https://git.distorted.org.uk/~mdw/tripe/blobdiff_plain/96f1fb578dec42612157bbf55253c85ac4793073..c60b5015074146ea1fe5c438f5727e5f5cc08782:/server/tests.at?ds=inline
diff --git a/server/tests.at b/server/tests.at
index 188d6504..5f8377a0 100644
--- a/server/tests.at
+++ b/server/tests.at
@@ -9,19 +9,18 @@
###
### This file is part of Trivial IP Encryption (TrIPE).
###
-### TrIPE is free software; you can redistribute it and/or modify
-### it under the terms of the GNU General Public License as published by
-### the Free Software Foundation; either version 2 of the License, or
-### (at your option) any later version.
+### TrIPE is free software: you can redistribute it and/or modify it under
+### the terms of the GNU General Public License as published by the Free
+### Software Foundation; either version 3 of the License, or (at your
+### option) any later version.
###
-### TrIPE is distributed in the hope that it will be useful,
-### but WITHOUT ANY WARRANTY; without even the implied warranty of
-### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-### GNU General Public License for more details.
+### TrIPE is distributed in the hope that it will be useful, but WITHOUT
+### ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+### FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+### for more details.
###
### You should have received a copy of the GNU General Public License
-### along with TrIPE; if not, write to the Free Software Foundation,
-### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+### along with TrIPE. If not, see .
m4_define([nl], [
])
@@ -35,9 +34,38 @@ m4_define([SETUPDIR], [
## Running standard programs with useful options.
m4_define([TRIPE],
[env TRIPE_PRIVHELPER=$abs_top_builddir/priv/tripe-privhelper \
- $abs_top_builddir/server/tripe -F -d. -aadmin -p0 -b127.0.0.1 -talice])
+ $abs_top_builddir/server/tripe -F -d. -aadmin -p0 -b127.0.0.1 \
+ ${TRIPE_TEST_TRACEOPTS+-T$TRIPE_TEST_TRACEOPTS}])
m4_define([TRIPECTL], [$abs_top_builddir/client/tripectl -d. -aadmin])
m4_define([USLIP], [$abs_top_builddir/uslip/tripe-uslip])
+m4_define([MITM], [$abs_top_builddir/proxy/tripe-mitm])
+m4_define([BULKTEST],
+ [$abs_top_builddir/server/tripe-test \
+ ${TRIPE_TEST_TRACEOPTS+-T$TRIPE_TEST_TRACEOPTS}])
+
+## Pause for a bit.
+m4_define([SLEEP], [sleep 0.2])
+
+## WITH_STRACE(tag, cmd)
+##
+## There's an awful hack here. If a process running under strace exits with
+## a signal, then strace will kill itself with the same signal -- and
+## therefore clobber the original process's core file. So we arrange to run
+## strace in one directory and have the child process run in another.
+m4_define([WITH_STRACE],
+[case "${TRIPE_TEST_STRACE-nil}" in
+ nil)
+ $2
+ ;;
+ *)
+ mkdir -p strace-hack.$1/
+ (ulimit -c hard >/dev/null 2>&1
+ sh -c 'cd strace-hack.$1; exec "$[]@"' - \
+ strace -ff -tt -v -s1024 -o../$1.trace \
+ sh -c 'cd ..; exec "$[]@"' - \
+ $2)
+ ;;
+ esac])
## Sequences. (These are used for testing the replay protection machinery.)
m4_define([R32], [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 dnl
@@ -48,8 +76,15 @@ m4_define([P32], [21 26 14 12 25 18 2 27 10 31 24 29 0 20 17 11 dnl
###--------------------------------------------------------------------------
### Scaffolding for running a TrIPE server.
+## WITH_TRIPEX(dir, args, body)
m4_define([WITH_TRIPEX], [
+## If this directory doesn't exist then Bad Things will happen.
+if test ! -d $1; then
+ echo >&2 "server directory \`$1' doesn't exist"
+ exit 99
+fi
+
## Remove the status file. This is how we notice that the server's died.
rm -f $1/server-status
> $1/expected-server-output
@@ -67,27 +102,80 @@ exec 1>&3 3>&-
## not sleep for ages. (Yes, a second on each test group is a long time.)
while test ! -r $1/server-status && test ! -S $1/admin; do :; done
+## Make the port number availale.
+AT_CHECK([TRIPECTL -d$1 PORT],, [stdout])
+mv stdout $1/port
+
## Test body...
$3
-## End of the test, now run the server. There's an awful hack here. If a
-## process running under strace exits with a signal, then strace will kill
-## itself with the same signal -- and therefore clobber the original
-## process's core file. So we arrange to run strace in one directory and
-## have the child process run in another.
+## End of the test, now run the server.
) && :; } | {
cd $1
- mkdir -p strace-hack/
echo TRIPE $2 >&2
- (cd strace-hack/
- ulimit -c hard >/dev/null 2>&1
- strace -f -o ../tripe.trace \
- TRIPE -d.. $2 >../server-output 2>../server-errors)
+ WITH_STRACE([tripe], [TRIPE $2 >server-output.full 2>server-errors.full])
stat=$?
echo $stat >server-status
if test $stat -ne 0; then
- echo "exit status: $stat" >>server-errors
+ echo "exit status: $stat" >>server-errors.full
fi
+ grep -v '^+ tripe: ' server-errors.full >server-errors
+
+ ## We interrupt this relatively sensible macro for an especially awful
+ ## hack. The tripe server emits warnings which are often caused by lack of
+ ## synchronization between two peers. These are harmless and shouldn't
+ ## cause test failures. But we shouldn't just trim out all messages that
+ ## look like the spurious ones: if they appear when we're not expecting
+ ## them, that's bad and they should properly cause a test failure.
+ ##
+ ## So we use the WARN command to insert magic directives into the server's
+ ## message stream. The directives begin with `WARN USER test'; remaining
+ ## tokens may be as follows.
+ ##
+ ## PUSH Introduce a new layer of nesting. Settings between
+ ## this PUSH and the matching POP will be forgotten
+ ## following the POP.
+ ##
+ ## POP End a layer of nesting. See PUSH above.
+ ##
+ ## IGNORE tokens Ignore lines which begin with the tokens.
+ ##
+ ## Token comparison isn't done very well, but it's good enough for these
+ ## purposes.
+ ##
+ ## We also trim out trace lines here, since it's useful to produce them for
+ ## debugging purposes and changing or introducing more of them shouldn't
+ ## cause failures.
+ awk '
+ BEGIN {
+ sp = 0;
+ npat = 0;
+ }
+ $[]1 == "TRACE" { next; }
+ $[]1 == "WARN" && $[]2 == "USER" && $[]3 == "test" {
+ if ($[]4 == "PUSH")
+ npatstk[[sp++]] = npat;
+ else if ($[]4 == "IGNORE") {
+ s = "";
+ p = "";
+ for (i = 5; i <= NF; i++) {
+ p = p s $[]i;
+ s = " ";
+ }
+ pat[[npat++]] = p;
+ } else if ($[]4 == "POP")
+ npat = npatstk[[--sp]];
+ next;
+ }
+ {
+ for (i = 0; i < npat; i++) {
+ n = length(pat[[i]]);
+ if (substr($[]0, 1, n) == pat[[i]])
+ next;
+ }
+ print $[]0;
+ }
+ ' server-output.full >server-output
}
exec 3>&-
@@ -98,11 +186,107 @@ AT_CHECK([cat $1/server-output; cat >&2 $1/server-errors],,
[expout], [experr])
])
+## WITH_TRIPE(args, body)
m4_define([WITH_TRIPE], [WITH_TRIPEX([.], [$1], [$2])])
+## WITH_2TRIPES(adir, bdir, bothargs, aargs, bargs, body)
m4_define([WITH_2TRIPES],
[WITH_TRIPEX([$1], [$3 $4], [WITH_TRIPEX([$2], [$3 $5], [$6])])])
+## WITH_3TRIPES(adir, bdir, cdir, allargs, aargs, bargs, cargs, body)
+m4_define([WITH_3TRIPES],
+ [WITH_TRIPEX([$1], [$4 $5],
+ [WITH_TRIPEX([$2], [$4 $6],
+ [WITH_TRIPEX([$3], [$4 $7],
+ [$8])])])])
+
+## RETRY(n, body)
+m4_define([RETRY], [
+ n=0 rc=1
+ while test $n -lt $1; do
+ if $2
+ then rc=0; break
+ fi
+ n=$(( $n + 1 ))
+ done
+ exit $rc
+])
+
+## COMMS_EPING(adir, aname, bdir, bname, [n])
+m4_define([COMMS_EPING], [
+ AT_CHECK([RETRY([m4_default([$5], [1])],
+ [TRIPECTL -d$1 EPING $4])],, [ignore])
+ AT_CHECK([RETRY([m4_default([$5], [1])],
+ [TRIPECTL -d$3 EPING $2])],, [ignore])
+])
+
+## COMMS_SLIP(adir, aname, bdir, bname)
+m4_define([COMMS_SLIP], [
+ AT_CHECK([echo "from $1" | USLIP -p $1/$4])
+ AT_CHECK([USLIP -g $3/$2],, [from $1[]nl])
+ AT_CHECK([echo "from $3" | USLIP -p $3/$2])
+ AT_CHECK([USLIP -g $1/$4],, [from $3[]nl])
+])
+
+## AWAIT_KXDONE(adir, aname, bdir, bname, body)
+m4_define([AWAIT_KXDONE], [
+
+ ## Ignore some reports caused by races.
+ for i in $1!$4 $3!$2; do
+ d=${i%!*} o=${i#*!}
+ TRIPECTL -d$d WARN test PUSH
+ TRIPECTL -d$d WARN test IGNORE WARN KX $o incorrect cookie
+ TRIPECTL -d$d WARN test IGNORE WARN KX $o unexpected pre-challenge
+ TRIPECTL -d$d WARN test IGNORE WARN KX $o unexpected challenge
+ done
+
+ ## Watch for the key-exchange completion announcement in the background.
+ COPROCESSES([wait-$1], [
+ echo WATCH +n
+ while read line; do
+ set x $line; shift
+ echo >&2 ">>> $line"
+ case "$[]1:$[]2:$[]3" in
+ OK::) ;;
+ NOTE:KXDONE:$4) break ;;
+ NOTE:* | TRACE:* | WARN:*) ;;
+ *) exit 63 ;;
+ esac
+ done
+ ], [
+ TRIPECTL -d$1
+ ]) & waiter_$1=$!
+
+ $5
+
+ ## Collect the completion announcement.
+ wait $waiter_$1; waitrc=$?
+ AT_CHECK([echo $waitrc],, [0[]nl])
+
+ ## Be interested in key-exchange warnings again.
+ for d in $1 $3; do TRIPECTL -d$d WARN test POP; done
+])
+
+## ESTABLISH(adir, aname, aopts, bdir, bname, bopts, [aport], [bport])
+m4_define([ESTABLISH], [
+
+ ## Set up the establishment.
+ AWAIT_KXDONE([$1], [$2], [$4], [$5], [
+ AT_CHECK([TRIPECTL -d$1 ADD -cork $6 $5 INET 127.0.0.1 \
+ m4_if([$8], [], [$(cat $4/port)], [$8])])
+ AT_CHECK([TRIPECTL -d$4 ADD $3 $2 INET 127.0.0.1 \
+ m4_if([$7], [], [$(cat $1/port)], [$7])])
+ ])
+
+ ## Check transport pinging.
+ AT_CHECK([TRIPECTL -d$1 PING $5],, [ignore])
+ AT_CHECK([TRIPECTL -d$4 PING $2],, [ignore])
+
+ ## Check communication works.
+ COMMS_EPING([$1], [$2], [$4], [$5])
+ COMMS_SLIP([$1], [$2], [$4], [$5])
+])
+
###--------------------------------------------------------------------------
### Very unpleasant coprocess handling.
@@ -135,7 +319,7 @@ m4_define([TRIPECTL_COMMAND], [
### Make sure the thing basically works.
AT_SETUP([server basics])
-SETUPDIR([ec])
+SETUPDIR([alpha])
AT_CHECK([echo port | TRIPE -p54321],, [INFO 54321[]nl[]OK[]nl])
AT_CLEANUP
@@ -144,7 +328,7 @@ AT_CLEANUP
AT_SETUP([server challenges])
AT_KEYWORDS([chal])
-SETUPDIR([ec])
+SETUPDIR([alpha])
WITH_TRIPE(, [
## A simple test.
@@ -202,56 +386,272 @@ AT_SETUP([server communication])
AT_KEYWORDS([comm])
export TRIPE_SLIPIF=USLIP
-for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([ec])); done
+for k in alpha beta-new; do
+ for p in alice bob; do (
+ rm -rf $p; mkdir $p; cd $p; SETUPDIR([$k])
+ ); done
+ WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [
+ ESTABLISH([alice], [not-alice], [-key alice],
+ [bob], [bob], [])
+ ])
+ for p in alice bob; do rm -rf $p.$k; mv $p $p.$k; done
+done
-WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [
+AT_CLEANUP
- AT_CHECK([TRIPECTL -dalice PORT],, [stdout])
- mv stdout alice/port
+###--------------------------------------------------------------------------
+### Mobile peer tracking.
- AT_CHECK([TRIPECTL -dbob PORT],, [stdout])
- mv stdout bob/port
+AT_SETUP([peer tracking])
+AT_KEYWORDS([mobile])
+export TRIPE_SLIPIF=USLIP
- ## Watch for the key-exchange completion announcement, and then exit.
- COPROCESSES([wait], [
- echo WATCH +n
- while read line; do
- case "$line" in
- OK) ;;
- "NOTE KXDONE "*) break ;;
- NOTE*) ;;
- *) exit 63 ;;
- esac
- done
- ], [
- TRIPECTL -dalice
- ]) &
+for p in alice bob carol; do (mkdir $p; cd $p; SETUPDIR([alpha])); done
+
+## WITH_MITM(adir, aport, bdir, bport, body)
+m4_define([WITH_MITM], [
+ aspec="$2" bspec="$4"
+ case $aspec in =*) aport="?$1/$3.mitm" ;; *) aport=$aspec ;; esac
+ case $bspec in =*) bport="?$3/$1.mitm" ;; *) bport=$bspec ;; esac
+ MITM -k$1/keyring.pub \
+ peer:$1:$aport:127.0.0.1:$(cat $1/port) \
+ peer:$3:$bport:127.0.0.1:$(cat $3/port) \
+ filt:send& mitmpid_$1_$3=$!
+ SLEEP
+ case $aspec in =*) aport=$(cat ${aport#\?}); eval ${aspec#=}=\$aport ;; esac
+ case $bspec in =*) bport=$(cat ${bport#\?}); eval ${bspec#=}=\$bport ;; esac
+ echo >&2 "mitm: $1 <--> :$aport <-mitm-> :$bport <--> $3"
+ trap 'kill $mitmpid_$1_$3; exit 127' EXIT INT QUIT TERM HUP
+ SLEEP
+ $5
+ kill $mitmpid_$1_$3; trap - EXIT INT QUIT TERM HUP
+])
- ## Don't panic if you don't see the unexpected-source warning. It happens
- ## for me, but it's not important either way.
- AT_CHECK([TRIPECTL -dalice ADD bob INET 127.0.0.1 $(cat bob/port)])
- echo >>bob/expected-server-output \
- "WARN PEER - unexpected-source INET 127.0.0.1 $(cat alice/port)"
- AT_CHECK([TRIPECTL -dbob ADD -key alice not-alice \
- INET 127.0.0.1 $(cat alice/port)])
+WITH_3TRIPES([alice], [bob], [carol], [-nslip],
+ [-talice], [-tbob], [-tcarol], [
- ## Check transport pinging.
- AT_CHECK([TRIPECTL -dalice PING bob],, [ignore])
- AT_CHECK([TRIPECTL -dbob PING not-alice],, [ignore])
+ ## We need an indirection layer between the two peers so that we can
+ ## simulate the effects of NAT remapping. The nearest thing we have to
+ ## this is the mitm proxy, so we may as well use that.
+ ##
+ ## alice <--> :5311 <-mitm-> :5312 <--> bob
+ ## alice <--> :5321 <-mitm-> :5322 <--> carol
+
+ WITH_MITM([alice], [=bob_from_alice], [bob], [=alice_from_bob], [
+ ESTABLISH([alice], [alice], [],
+ [bob], [bob], [-mobile],
+ [$alice_from_bob], [$bob_from_alice])
+ ])
+
+ WITH_MITM([alice], [=new_bob_from_alice], [bob], [$alice_from_bob], [
+ COMMS_EPING([bob], [bob], [alice], [alice])
+ COMMS_SLIP([bob], [bob], [alice], [alice])
+ ])
+
+ WITH_MITM([alice], [=carol_from_alice], [carol], [=alice_from_carol], [
+ ESTABLISH([alice], [alice], [],
+ [carol], [carol], [-mobile],
+ [$alice_from_carol], [$carol_from_alice])
+ ])
- ## Wait for the completion announcement.
+ WITH_MITM([alice], [$bob_from_alice], [bob], [$alice_from_bob], [
+ WITH_MITM([alice], [$carol_from_alice], [carol], [$alice_from_carol], [
+ COMMS_EPING([bob], [bob], [alice], [alice])
+ COMMS_EPING([carol], [carol], [alice], [alice])
+ COMMS_SLIP([bob], [bob], [alice], [alice])
+ COMMS_SLIP([carol], [carol], [alice], [alice])
+ ])])
+
+ WITH_MITM([alice], [$carol_from_alice], [bob], [$alice_from_bob], [
+ WITH_MITM([alice], [$bob_from_alice], [carol], [$alice_from_carol], [
+ COMMS_EPING([bob], [bob], [alice], [alice])
+ COMMS_EPING([carol], [carol], [alice], [alice])
+ COMMS_SLIP([bob], [bob], [alice], [alice])
+ COMMS_SLIP([carol], [carol], [alice], [alice])
+ ])])
wait
+])
- ## Check encrypted pinging.
- AT_CHECK([TRIPECTL -dalice EPING bob],, [ignore])
- AT_CHECK([TRIPECTL -dbob EPING not-alice],, [ignore])
+AT_CLEANUP
- ## Check that packets can flow from one to the other.
- AT_CHECK([echo "from alice" | USLIP -p alice/bob])
- AT_CHECK([USLIP -g bob/not-alice],, [from alice[]nl])
+###--------------------------------------------------------------------------
+### Adverse communication.
- AT_CHECK([echo "from bob" | USLIP -p bob/not-alice])
- AT_CHECK([USLIP -g alice/bob],, [from bob[]nl])
+AT_SETUP([server retry])
+AT_KEYWORDS([backoff])
+export TRIPE_SLIPIF=USLIP
+
+for i in alice bob; do (mkdir $i; cd $i; SETUPDIR([beta])); done
+
+WITH_2TRIPES([alice], [bob], [-nslip], [-talice], [-tbob], [
+
+ ## Set up the evil proxy.
+ mknod pipe-mitmpid p
+ WITH_STRACE([mitm],
+ [sh -c 'echo $$ >pipe-mitmpid; exec "$@"' - \
+ MITM -kalice/keyring.pub >mitm.out 2>mitm.err \
+ peer:alice:\?alice.mitm:127.0.0.1:$(cat alice/port) \
+ peer:bob:\?bob.mitm:127.0.0.1:$(cat bob/port) \
+ filt:drop:5 filt:send])&
+ read mitmpid &-
+
+ ## Try to establish keys anyway.
+ AWAIT_KXDONE([alice], [alice], [bob], [bob], [
+ AT_CHECK([TRIPECTL -dalice ADD -cork bob INET 127.0.0.1 $alicemitm])
+ AT_CHECK([TRIPECTL -dbob ADD alice INET 127.0.0.1 $bobmitm])
+ ])
+
+ ## Check pinging.
+ COMMS_EPING([alice], [alice], [bob], [bob], [10])
+ COMMS_EPING([bob], [bob], [alice], [alice], [10])
+
+ ## Tear down the MITM proxy.
+ kill $mitmpid
+])
+
+AT_CLEANUP
+
+###--------------------------------------------------------------------------
+### Key management.
+
+AT_SETUP([server key-management])
+AT_KEYWORDS([keymgmt])
+export TRIPE_SLIPIF=USLIP
+
+## Determine all of the nets and the principals.
+princs=""
+nets=" "
+while read princ pnets; do
+ princs="$princs $princ"
+ for n in $pnets; do
+ case " $nets " in *" $n "*) ;; *) nets="$nets$n " ;; esac
+ done
+done <&2 ">>> $line"
+ case "$1:$2:$3" in
+ OK::) ;;
+ NOTE:KNOCK:bob) shift 3; echo "$*" >knock-addr; break ;;
+ NOTE:* | TRACE:* | WARN:*) ;;
+ *) exit 63 ;;
+ esac
+ done
+ ], [
+ TRIPECTL -dalice
+ ])& waiter=$!
+
+ AT_CHECK([TRIPECTL -dbob ADD -knock bob -ephemeral alice INET 127.0.0.1 $alice_from_bob])
+
+ wait $waiter; waitrc=$?
+ AT_CHECK([echo $waitrc],, [0[]nl])
+ AT_CHECK_UNQUOTED([cat knock-addr],, [INET 127.0.0.1 $bob_from_alice[]nl])
+
+ AWAIT_KXDONE([alice], [alice], [bob], [bob], [
+ AT_CHECK([TRIPECTL -dalice ADD -ephemeral bob INET 127.0.0.1 $bob_from_alice])
+ ])
+
+ COMMS_EPING([alice], [alice], [bob], [bob])
+ COMMS_SLIP([alice], [alice], [bob], [bob])
+ ])
+
+ WITH_MITM([alice], [=new_bob_from_alice], [bob], [$alice_from_bob], [
+ AWAIT_KXDONE([alice], [alice], [bob], [bob], [
+ AT_CHECK([TRIPECTL -dalice FORCEKX bob])
+ AT_CHECK([TRIPECTL -dbob FORCEKX alice])
+ ])
+
+ AT_CHECK([TRIPECTL -dbob KILL alice])
+ AT_CHECK([TRIPECTL -dalice LIST],, [])
+ ])
+])
+
+AT_CLEANUP
+
+###--------------------------------------------------------------------------
+### Key-exchange ad bulk crypto round trip.
+
+AT_SETUP([server roundtrip])
+AT_KEYWORDS([roundtrip])
+
+while read label genalg paramalg spec; do
+ paramopts=${spec%--*} attrs=${spec#*--}
+ key -kkeyring.$label add -a$paramalg -eforever $paramopts -tparam tripe-param $attrs
+ key -kkeyring.$label add -a$genalg -pparam -eforever -talice tripe
+ key -kkeyring.$label extract -f-secret keyring.$label-pub
+ { sh -c "echo $$"; date; } >msg
+ AT_CHECK([BULKTEST -kkeyring.$label -talice \
+ ies-encrypt 99 "$(cat msg)nl"], [0], [stdout], [stderr])
+ cp msg expout; mv stdout ct
+ AT_CHECK([BULKTEST -kkeyring.$label -talice \
+ ies-decrypt 99 "$(cat ct)"], [0], [expout], [stderr])
+done <