|
| 1 | +/* |
| 2 | + * Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved. |
| 3 | + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
| 4 | + * |
| 5 | + * This code is free software; you can redistribute it and/or modify it |
| 6 | + * under the terms of the GNU General Public License version 2 only, as |
| 7 | + * published by the Free Software Foundation. |
| 8 | + * |
| 9 | + * This code is distributed in the hope that it will be useful, but WITHOUT |
| 10 | + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| 11 | + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
| 12 | + * version 2 for more details (a copy is included in the LICENSE file that |
| 13 | + * accompanied this code). |
| 14 | + * |
| 15 | + * You should have received a copy of the GNU General Public License version |
| 16 | + * 2 along with this work; if not, write to the Free Software Foundation, |
| 17 | + * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
| 18 | + * |
| 19 | + * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
| 20 | + * or visit www.oracle.com if you need additional information or have any |
| 21 | + * questions. |
| 22 | + */ |
| 23 | + |
| 24 | +/* |
| 25 | + * @test |
| 26 | + * @bug 8182621 |
| 27 | + * @summary Verify JSSE rejects empty Handshake, Alert, and ChangeCipherSpec messages. |
| 28 | + * @library /javax/net/ssl/templates |
| 29 | + * @run main SSLSocketEmptyFragments |
| 30 | + */ |
| 31 | + |
| 32 | +import javax.net.ssl.*; |
| 33 | +import java.io.*; |
| 34 | +import java.net.InetAddress; |
| 35 | +import java.net.Socket; |
| 36 | +import java.nio.ByteBuffer; |
| 37 | +import java.util.concurrent.*; |
| 38 | +import java.util.function.Consumer; |
| 39 | + |
| 40 | +public class SSLSocketEmptyFragments extends SSLContextTemplate { |
| 41 | + private static final boolean DEBUG = Boolean.getBoolean("test.debug"); |
| 42 | + private static final byte HANDSHAKE_TYPE = 22; |
| 43 | + private static final byte ALERT_TYPE = 21; |
| 44 | + private static final byte CHANGE_CIPHERSPEC_TYPE = 20; |
| 45 | + |
| 46 | + private static final byte[] INVALID_ALERT = {ALERT_TYPE, 3, 3, 0, 0}; |
| 47 | + |
| 48 | + private static final byte[] INVALID_HANDSHAKE = {HANDSHAKE_TYPE, 3, 3, 0, 0}; |
| 49 | + private static final int SERVER_WAIT_SEC = 5; |
| 50 | + private static final String TLSv13 = "TLSv1.3"; |
| 51 | + private static final String TLSv12 = "TLSv1.2"; |
| 52 | + |
| 53 | + private final String protocol; |
| 54 | + |
| 55 | + public SSLSocketEmptyFragments(String protocol) { |
| 56 | + this.protocol = protocol; |
| 57 | + } |
| 58 | + |
| 59 | + |
| 60 | + private void testEmptyHandshakeRecord(Socket client) { |
| 61 | + log("Sending bad handshake packet to server..."); |
| 62 | + |
| 63 | + try { |
| 64 | + OutputStream os = client.getOutputStream(); |
| 65 | + os.write(INVALID_HANDSHAKE); |
| 66 | + os.flush(); |
| 67 | + } catch (IOException exc) { |
| 68 | + throw new RuntimeException("Unexpected IOException thrown by socket operations", exc); |
| 69 | + } |
| 70 | + } |
| 71 | + |
| 72 | + |
| 73 | + private void testEmptyAlertNotHandshaking(Socket client) { |
| 74 | + log("Sending empty alert packet before handshaking starts."); |
| 75 | + |
| 76 | + try { |
| 77 | + OutputStream os = client.getOutputStream(); |
| 78 | + os.write(INVALID_ALERT); |
| 79 | + os.flush(); |
| 80 | + } catch (IOException exc) { |
| 81 | + throw new RuntimeException("Unexpected IOException thrown by socket operations.", exc); |
| 82 | + } |
| 83 | + } |
| 84 | + |
| 85 | + /** |
| 86 | + * Runs a test where the server -- in a separate thread -- accepts a connection |
| 87 | + * and attempts to read from the remote side. Tests are successful if the |
| 88 | + * server thread returns true. |
| 89 | + * |
| 90 | + * @param clientConsumer Client-side test code that injects bad packets into the TLS handshake. |
| 91 | + * @param expectedException The exception that should be thrown by the server |
| 92 | + */ |
| 93 | + private void executeTest(Consumer<Socket> clientConsumer, |
| 94 | + final Class<?> expectedException) throws Exception { |
| 95 | + SSLContext serverContext = createServerSSLContext(); |
| 96 | + SSLServerSocketFactory factory = serverContext.getServerSocketFactory(); |
| 97 | + |
| 98 | + try(ExecutorService threadPool = Executors.newFixedThreadPool(1); |
| 99 | + SSLServerSocket serverSocket = (SSLServerSocket) factory.createServerSocket()) { |
| 100 | + serverSocket.bind(null); |
| 101 | + int port = serverSocket.getLocalPort(); |
| 102 | + InetAddress address = serverSocket.getInetAddress(); |
| 103 | + |
| 104 | + Future<Boolean> serverThread = threadPool.submit(() -> { |
| 105 | + try (SSLSocket socket = (SSLSocket) serverSocket.accept()) { |
| 106 | + log("Server reading data from client."); |
| 107 | + socket.getInputStream().read(); |
| 108 | + log("The expected exception was not thrown."); |
| 109 | + return false; |
| 110 | + |
| 111 | + } catch (Exception exc) { |
| 112 | + if (expectedException.isAssignableFrom(exc.getClass())) { |
| 113 | + log("Server thread received expected exception: " + expectedException.getName()); |
| 114 | + return true; |
| 115 | + } else { |
| 116 | + log("Server thread threw an unexpected exception: " + exc); |
| 117 | + throw exc; |
| 118 | + } |
| 119 | + } |
| 120 | + }); |
| 121 | + |
| 122 | + try(Socket socket = new Socket(address, port)) { |
| 123 | + clientConsumer.accept(socket); |
| 124 | + log("waiting for server to exit."); |
| 125 | + |
| 126 | + // wait for the server to exit, which should be quick if the test passes. |
| 127 | + if (!serverThread.get(SERVER_WAIT_SEC, TimeUnit.SECONDS)) { |
| 128 | + throw new RuntimeException( |
| 129 | + "The server side of the connection did not throw the expected exception"); |
| 130 | + } |
| 131 | + } |
| 132 | + } |
| 133 | + } |
| 134 | + |
| 135 | + /** |
| 136 | + * Performs the client side of the TLS handshake, sending and receiving |
| 137 | + * packets over the given socket. |
| 138 | + * @param socket Connected socket to the server side. |
| 139 | + * @throws IOException |
| 140 | + */ |
| 141 | + private void testEmptyAlertDuringHandshake(Socket socket) { |
| 142 | + log("**** Testing empty alert during handshake"); |
| 143 | + |
| 144 | + try { |
| 145 | + SSLEngine engine = createClientSSLContext().createSSLEngine(); |
| 146 | + engine.setUseClientMode(true); |
| 147 | + SSLSession session = engine.getSession(); |
| 148 | + |
| 149 | + int appBufferMax = session.getApplicationBufferSize(); |
| 150 | + int netBufferMax = session.getPacketBufferSize(); |
| 151 | + |
| 152 | + ByteBuffer clientIn = ByteBuffer.allocate(appBufferMax + 50); |
| 153 | + ByteBuffer clientToServer = ByteBuffer.allocate(appBufferMax + 50); |
| 154 | + ByteBuffer clientOut = ByteBuffer.wrap("Hi Server, I'm Client".getBytes()); |
| 155 | + |
| 156 | + wrap(engine, clientOut, clientToServer); |
| 157 | + runDelegatedTasks(engine); |
| 158 | + clientToServer.flip(); |
| 159 | + |
| 160 | + OutputStream socketOut = socket.getOutputStream(); |
| 161 | + byte [] outbound = new byte[netBufferMax]; |
| 162 | + clientToServer.get(outbound, 0, clientToServer.limit()); |
| 163 | + socketOut.write(outbound, 0, clientToServer.limit()); |
| 164 | + socketOut.flush(); |
| 165 | + |
| 166 | + processServerResponse(engine, clientIn, socket.getInputStream()); |
| 167 | + |
| 168 | + log("Sending invalid alert packet!"); |
| 169 | + socketOut.write(new byte[]{ALERT_TYPE, 3, 3, 0, 0}); |
| 170 | + socketOut.flush(); |
| 171 | + |
| 172 | + } catch (Exception exc){ |
| 173 | + throw new RuntimeException("An error occurred running the test.", exc); |
| 174 | + } |
| 175 | + } |
| 176 | + |
| 177 | + /** |
| 178 | + * Performs TLS handshake until the client (this method) needs to send the |
| 179 | + * ChangeCipherSpec message. Then we send a packet with a zero-length fragment. |
| 180 | + */ |
| 181 | + private void testEmptyChangeCipherSpecMessage(Socket socket) { |
| 182 | + log("**** Testing invalid ChangeCipherSpec message"); |
| 183 | + |
| 184 | + try { |
| 185 | + socket.setSoTimeout(500); |
| 186 | + SSLEngine engine = createClientSSLContext().createSSLEngine(); |
| 187 | + engine.setUseClientMode(true); |
| 188 | + SSLSession session = engine.getSession(); |
| 189 | + int appBufferMax = session.getApplicationBufferSize(); |
| 190 | + |
| 191 | + ByteBuffer clientIn = ByteBuffer.allocate(appBufferMax + 50); |
| 192 | + ByteBuffer clientToServer = ByteBuffer.allocate(appBufferMax + 50); |
| 193 | + |
| 194 | + ByteBuffer clientOut = ByteBuffer.wrap("Hi Server, I'm Client".getBytes()); |
| 195 | + |
| 196 | + OutputStream outputStream = socket.getOutputStream(); |
| 197 | + |
| 198 | + boolean foundCipherSpecMsg = false; |
| 199 | + |
| 200 | + byte[] outbound = new byte[8192]; |
| 201 | + do { |
| 202 | + wrap(engine, clientOut, clientToServer); |
| 203 | + runDelegatedTasks(engine); |
| 204 | + clientToServer.flip(); |
| 205 | + |
| 206 | + if(clientToServer.get(0) == CHANGE_CIPHERSPEC_TYPE) { |
| 207 | + foundCipherSpecMsg = true; |
| 208 | + break; |
| 209 | + } |
| 210 | + clientToServer.get(outbound, 0, clientToServer.limit()); |
| 211 | + debug("Writing " + clientToServer.limit() + " bytes to the server."); |
| 212 | + outputStream.write(outbound, 0, clientToServer.limit()); |
| 213 | + outputStream.flush(); |
| 214 | + |
| 215 | + processServerResponse(engine, clientIn, socket.getInputStream()); |
| 216 | + |
| 217 | + clientToServer.clear(); |
| 218 | + |
| 219 | + } while(engine.getHandshakeStatus() != SSLEngineResult.HandshakeStatus.FINISHED); |
| 220 | + |
| 221 | + if (!foundCipherSpecMsg) { |
| 222 | + throw new RuntimeException("Didn't intercept the ChangeCipherSpec message."); |
| 223 | + } else { |
| 224 | + log("Sending invalid ChangeCipherSpec message"); |
| 225 | + outputStream.write(new byte[]{CHANGE_CIPHERSPEC_TYPE, 3, 3, 0, 0}); |
| 226 | + outputStream.flush(); |
| 227 | + } |
| 228 | + |
| 229 | + } catch (Exception exc) { |
| 230 | + throw new RuntimeException("An error occurred running the test.", exc); |
| 231 | + } |
| 232 | + } |
| 233 | + |
| 234 | + /** |
| 235 | + * Processes TLS handshake messages received from the server. |
| 236 | + */ |
| 237 | + private static void processServerResponse(SSLEngine engine, ByteBuffer clientIn, |
| 238 | + InputStream inputStream) throws IOException { |
| 239 | + byte [] inbound = new byte[8192]; |
| 240 | + ByteBuffer serverToClient = ByteBuffer.allocate( |
| 241 | + engine.getSession().getApplicationBufferSize() + 50); |
| 242 | + |
| 243 | + while(engine.getHandshakeStatus() == SSLEngineResult.HandshakeStatus.NEED_UNWRAP) { |
| 244 | + log("reading data from server."); |
| 245 | + int len = inputStream.read(inbound); |
| 246 | + if (len == -1) { |
| 247 | + throw new IOException("Could not read from server."); |
| 248 | + } |
| 249 | + |
| 250 | + dumpBytes(inbound, len); |
| 251 | + |
| 252 | + serverToClient.put(inbound, 0, len); |
| 253 | + serverToClient.flip(); |
| 254 | + |
| 255 | + // unwrap packets in a loop because we sometimes get multiple |
| 256 | + // TLS messages in one read() operation. |
| 257 | + do { |
| 258 | + unwrap(engine, serverToClient, clientIn); |
| 259 | + runDelegatedTasks(engine); |
| 260 | + log("Status after running tasks: " + engine.getHandshakeStatus()); |
| 261 | + } while (serverToClient.hasRemaining()); |
| 262 | + serverToClient.compact(); |
| 263 | + } |
| 264 | + } |
| 265 | + |
| 266 | + private static SSLEngineResult wrap(SSLEngine engine, ByteBuffer src, ByteBuffer dst) throws SSLException { |
| 267 | + debug("Wrapping..."); |
| 268 | + SSLEngineResult result = engine.wrap(src, dst); |
| 269 | + logEngineStatus(engine, result); |
| 270 | + return result; |
| 271 | + } |
| 272 | + |
| 273 | + private static SSLEngineResult unwrap(SSLEngine engine, ByteBuffer src, ByteBuffer dst) throws SSLException { |
| 274 | + debug("Unwrapping"); |
| 275 | + SSLEngineResult result = engine.unwrap(src, dst); |
| 276 | + logEngineStatus(engine, result); |
| 277 | + return result; |
| 278 | + } |
| 279 | + |
| 280 | + protected static void runDelegatedTasks(SSLEngine engine) { |
| 281 | + if (engine.getHandshakeStatus() == SSLEngineResult.HandshakeStatus.NEED_TASK) { |
| 282 | + Runnable runnable; |
| 283 | + while ((runnable = engine.getDelegatedTask()) != null) { |
| 284 | + debug(" running delegated task..."); |
| 285 | + runnable.run(); |
| 286 | + } |
| 287 | + SSLEngineResult.HandshakeStatus hsStatus = engine.getHandshakeStatus(); |
| 288 | + if (hsStatus == SSLEngineResult.HandshakeStatus.NEED_TASK) { |
| 289 | + throw new RuntimeException( |
| 290 | + "handshake shouldn't need additional tasks"); |
| 291 | + } |
| 292 | + } |
| 293 | + } |
| 294 | + |
| 295 | + |
| 296 | + @Override |
| 297 | + protected ContextParameters getClientContextParameters() { |
| 298 | + return getContextParameters(); |
| 299 | + } |
| 300 | + |
| 301 | + @Override |
| 302 | + protected ContextParameters getServerContextParameters() { |
| 303 | + return getContextParameters(); |
| 304 | + } |
| 305 | + |
| 306 | + private ContextParameters getContextParameters() { |
| 307 | + return new ContextParameters(protocol, "PKIX", "NewSunX509"); |
| 308 | + } |
| 309 | + |
| 310 | + private static void log(String message) { |
| 311 | + System.out.println(message); |
| 312 | + System.out.flush(); |
| 313 | + } |
| 314 | + |
| 315 | + private static void dumpBytes(byte[] buffer, int length) { |
| 316 | + int totalLength = Math.min(buffer.length, length); |
| 317 | + StringBuffer sb = new StringBuffer(); |
| 318 | + int counter = 0; |
| 319 | + for (int idx = 0; idx < totalLength ; ++idx) { |
| 320 | + sb.append(String.format("%02x ", buffer[idx])); |
| 321 | + if (++counter == 16) { |
| 322 | + sb.append("\n"); |
| 323 | + counter = 0; |
| 324 | + } |
| 325 | + } |
| 326 | + debug(sb.toString()); |
| 327 | + } |
| 328 | + |
| 329 | + private static void debug(String message) { |
| 330 | + if (DEBUG) { |
| 331 | + log(message); |
| 332 | + } |
| 333 | + } |
| 334 | + |
| 335 | + private static FileWriter fw; |
| 336 | + |
| 337 | + private static void logEngineStatus( |
| 338 | + SSLEngine engine, SSLEngineResult result) { |
| 339 | + debug("\tResult Status : " + result.getStatus()); |
| 340 | + debug("\tResult HS Status : " + result.getHandshakeStatus()); |
| 341 | + debug("\tEngine HS Status : " + engine.getHandshakeStatus()); |
| 342 | + debug("\tisInboundDone() : " + engine.isInboundDone()); |
| 343 | + debug("\tisOutboundDone() : " + engine.isOutboundDone()); |
| 344 | + debug("\tMore Result : " + result); |
| 345 | + } |
| 346 | + |
| 347 | + |
| 348 | + public static void main(String [] args) throws Exception { |
| 349 | + SSLSocketEmptyFragments tests = new SSLSocketEmptyFragments(TLSv12); |
| 350 | + |
| 351 | + tests.executeTest( |
| 352 | + tests::testEmptyHandshakeRecord, SSLProtocolException.class); |
| 353 | + tests.executeTest( |
| 354 | + tests::testEmptyAlertNotHandshaking, SSLHandshakeException.class); |
| 355 | + tests.executeTest( |
| 356 | + tests::testEmptyAlertDuringHandshake, SSLHandshakeException.class); |
| 357 | + tests.executeTest( |
| 358 | + tests::testEmptyChangeCipherSpecMessage, SSLProtocolException.class); |
| 359 | + |
| 360 | + tests = new SSLSocketEmptyFragments(TLSv13); |
| 361 | + tests.executeTest( |
| 362 | + tests::testEmptyHandshakeRecord, SSLProtocolException.class); |
| 363 | + tests.executeTest( |
| 364 | + tests::testEmptyAlertNotHandshaking, SSLHandshakeException.class); |
| 365 | + } |
| 366 | +} |
0 commit comments