2021-01-27 15:32:13 +00:00
|
|
|
package dnsforward
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/dnsproxy/proxy"
|
|
|
|
"github.com/lucas-clemente/quic-go"
|
|
|
|
"github.com/stretchr/testify/assert"
|
2021-02-11 12:20:30 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2021-01-27 15:32:13 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// testTLSConn is a tlsConn for tests.
|
|
|
|
type testTLSConn struct {
|
|
|
|
// Conn is embedded here simply to make testTLSConn a net.Conn without
|
2021-04-13 13:23:36 +00:00
|
|
|
// actually implementing all methods.
|
2021-01-27 15:32:13 +00:00
|
|
|
net.Conn
|
|
|
|
|
|
|
|
serverName string
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConnectionState implements the tlsConn interface for testTLSConn.
|
|
|
|
func (c testTLSConn) ConnectionState() (cs tls.ConnectionState) {
|
|
|
|
cs.ServerName = c.serverName
|
|
|
|
|
|
|
|
return cs
|
|
|
|
}
|
|
|
|
|
|
|
|
// testQUICSession is a quicSession for tests.
|
|
|
|
type testQUICSession struct {
|
|
|
|
// Session is embedded here simply to make testQUICSession
|
|
|
|
// a quic.Session without acctually implementing all methods.
|
|
|
|
quic.Session
|
|
|
|
|
|
|
|
serverName string
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConnectionState implements the quicSession interface for testQUICSession.
|
|
|
|
func (c testQUICSession) ConnectionState() (cs quic.ConnectionState) {
|
2021-04-21 09:49:41 +00:00
|
|
|
cs.TLS.ServerName = c.serverName
|
2021-01-27 15:32:13 +00:00
|
|
|
|
|
|
|
return cs
|
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
func TestServer_clientIDFromDNSContext(t *testing.T) {
|
2021-08-09 13:03:37 +00:00
|
|
|
// TODO(a.garipov): Consider moving away from the text-based error
|
|
|
|
// checks and onto a more structured approach.
|
2021-01-27 15:32:13 +00:00
|
|
|
testCases := []struct {
|
|
|
|
name string
|
2021-06-29 12:53:28 +00:00
|
|
|
proto proxy.Proto
|
2021-01-27 15:32:13 +00:00
|
|
|
hostSrvName string
|
|
|
|
cliSrvName string
|
|
|
|
wantClientID string
|
|
|
|
wantErrMsg string
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI bool
|
2021-01-27 15:32:13 +00:00
|
|
|
}{{
|
|
|
|
name: "udp",
|
|
|
|
proto: proxy.ProtoUDP,
|
|
|
|
hostSrvName: "",
|
|
|
|
cliSrvName: "",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: "",
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: false,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
|
|
|
name: "tls_no_client_id",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "example.com",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: "",
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: true,
|
|
|
|
}, {
|
|
|
|
name: "tls_no_client_server_name",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: `client id check: client server name "" ` +
|
|
|
|
`doesn't match host server name "example.com"`,
|
|
|
|
strictSNI: true,
|
|
|
|
}, {
|
|
|
|
name: "tls_no_client_server_name_no_strict",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: "",
|
|
|
|
strictSNI: false,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
|
|
|
name: "tls_client_id",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "cli.example.com",
|
|
|
|
wantClientID: "cli",
|
|
|
|
wantErrMsg: "",
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: true,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
|
|
|
name: "tls_client_id_hostname_error",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "cli.example.net",
|
|
|
|
wantClientID: "",
|
2021-02-11 12:20:30 +00:00
|
|
|
wantErrMsg: `client id check: client server name "cli.example.net" ` +
|
|
|
|
`doesn't match host server name "example.com"`,
|
|
|
|
strictSNI: true,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
|
|
|
name: "tls_invalid_client_id",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "!!!.example.com",
|
|
|
|
wantClientID: "",
|
2021-05-06 10:02:48 +00:00
|
|
|
wantErrMsg: `client id check: invalid client id "!!!": ` +
|
2021-08-09 13:03:37 +00:00
|
|
|
`bad domain name label rune '!'`,
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: true,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
2021-02-11 12:20:30 +00:00
|
|
|
name: "tls_client_id_too_long",
|
|
|
|
proto: proxy.ProtoTLS,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: `abcdefghijklmnopqrstuvwxyz0123456789abcdefghijklmno` +
|
|
|
|
`pqrstuvwxyz0123456789.example.com`,
|
2021-01-27 15:32:13 +00:00
|
|
|
wantClientID: "",
|
2021-05-06 10:02:48 +00:00
|
|
|
wantErrMsg: `client id check: invalid client id "abcdefghijklmno` +
|
|
|
|
`pqrstuvwxyz0123456789abcdefghijklmnopqrstuvwxyz0123456789": ` +
|
2021-08-09 13:03:37 +00:00
|
|
|
`domain name label is too long: got 72, max 63`,
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: true,
|
2021-01-27 15:32:13 +00:00
|
|
|
}, {
|
|
|
|
name: "quic_client_id",
|
|
|
|
proto: proxy.ProtoQUIC,
|
|
|
|
hostSrvName: "example.com",
|
|
|
|
cliSrvName: "cli.example.com",
|
|
|
|
wantClientID: "cli",
|
|
|
|
wantErrMsg: "",
|
2021-02-11 12:20:30 +00:00
|
|
|
strictSNI: true,
|
2021-01-27 15:32:13 +00:00
|
|
|
}}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
2021-02-11 12:20:30 +00:00
|
|
|
tlsConf := TLSConfig{
|
|
|
|
ServerName: tc.hostSrvName,
|
|
|
|
StrictSNICheck: tc.strictSNI,
|
|
|
|
}
|
2021-06-29 12:53:28 +00:00
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
srv := &Server{
|
2021-02-11 12:20:30 +00:00
|
|
|
conf: ServerConfig{TLSConfig: tlsConf},
|
2021-01-27 15:32:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var conn net.Conn
|
|
|
|
if tc.proto == proxy.ProtoTLS {
|
|
|
|
conn = testTLSConn{
|
|
|
|
serverName: tc.cliSrvName,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var qs quic.Session
|
|
|
|
if tc.proto == proxy.ProtoQUIC {
|
|
|
|
qs = testQUICSession{
|
|
|
|
serverName: tc.cliSrvName,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
pctx := &proxy.DNSContext{
|
|
|
|
Proto: tc.proto,
|
|
|
|
Conn: conn,
|
|
|
|
QUICSession: qs,
|
2021-01-27 15:32:13 +00:00
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
clientID, err := srv.clientIDFromDNSContext(pctx)
|
|
|
|
assert.Equal(t, tc.wantClientID, clientID)
|
2021-01-27 15:32:13 +00:00
|
|
|
|
2021-02-11 12:20:30 +00:00
|
|
|
if tc.wantErrMsg == "" {
|
2021-06-29 12:53:28 +00:00
|
|
|
assert.NoError(t, err)
|
2021-02-11 12:20:30 +00:00
|
|
|
} else {
|
2021-06-29 12:53:28 +00:00
|
|
|
require.Error(t, err)
|
|
|
|
|
|
|
|
assert.Equal(t, tc.wantErrMsg, err.Error())
|
2021-01-27 15:32:13 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
func TestClientIDFromDNSContextHTTPS(t *testing.T) {
|
2021-01-27 15:32:13 +00:00
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
path string
|
|
|
|
wantClientID string
|
|
|
|
wantErrMsg string
|
|
|
|
}{{
|
|
|
|
name: "no_client_id",
|
|
|
|
path: "/dns-query",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: "",
|
|
|
|
}, {
|
|
|
|
name: "no_client_id_slash",
|
|
|
|
path: "/dns-query/",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: "",
|
|
|
|
}, {
|
|
|
|
name: "client_id",
|
|
|
|
path: "/dns-query/cli",
|
|
|
|
wantClientID: "cli",
|
|
|
|
wantErrMsg: "",
|
|
|
|
}, {
|
|
|
|
name: "client_id_slash",
|
|
|
|
path: "/dns-query/cli/",
|
|
|
|
wantClientID: "cli",
|
|
|
|
wantErrMsg: "",
|
|
|
|
}, {
|
|
|
|
name: "bad_url",
|
|
|
|
path: "/foo",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: `client id check: invalid path "/foo"`,
|
|
|
|
}, {
|
|
|
|
name: "extra",
|
|
|
|
path: "/dns-query/cli/foo",
|
|
|
|
wantClientID: "",
|
|
|
|
wantErrMsg: `client id check: invalid path "/dns-query/cli/foo": extra parts`,
|
|
|
|
}, {
|
|
|
|
name: "invalid_client_id",
|
|
|
|
path: "/dns-query/!!!",
|
|
|
|
wantClientID: "",
|
2021-05-06 10:02:48 +00:00
|
|
|
wantErrMsg: `client id check: invalid client id "!!!": ` +
|
2021-08-09 13:03:37 +00:00
|
|
|
`bad domain name label rune '!'`,
|
2021-01-27 15:32:13 +00:00
|
|
|
}}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
r := &http.Request{
|
|
|
|
URL: &url.URL{
|
|
|
|
Path: tc.path,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
pctx := &proxy.DNSContext{
|
|
|
|
Proto: proxy.ProtoHTTPS,
|
|
|
|
HTTPRequest: r,
|
2021-01-27 15:32:13 +00:00
|
|
|
}
|
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
clientID, err := clientIDFromDNSContextHTTPS(pctx)
|
|
|
|
assert.Equal(t, tc.wantClientID, clientID)
|
2021-01-27 15:32:13 +00:00
|
|
|
|
2021-02-11 12:20:30 +00:00
|
|
|
if tc.wantErrMsg == "" {
|
2021-06-29 12:53:28 +00:00
|
|
|
assert.NoError(t, err)
|
2021-02-11 12:20:30 +00:00
|
|
|
} else {
|
2021-06-29 12:53:28 +00:00
|
|
|
require.Error(t, err)
|
2021-03-25 13:00:27 +00:00
|
|
|
|
2021-06-29 12:53:28 +00:00
|
|
|
assert.Equal(t, tc.wantErrMsg, err.Error())
|
2021-01-27 15:32:13 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|