5842fd5beb
Reviewed-by: xuelei
340 lines
13 KiB
Java
340 lines
13 KiB
Java
/*
|
|
* Copyright (c) 2018, 2023, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 8206929 8212885
|
|
* @summary ensure that client only resumes a session if certain properties
|
|
* of the session are compatible with the new connection
|
|
* @library /javax/net/ssl/templates
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.2 -Djdk.tls.server.enableSessionTicketExtension=false -Djdk.tls.client.enableSessionTicketExtension=false ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.2 -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=false ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.2 -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.3 -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.2 -Djdk.tls.server.enableSessionTicketExtension=false -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.3 -Djdk.tls.server.enableSessionTicketExtension=false -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.server.enableSessionTicketExtension=false -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient BASIC
|
|
* @run main/othervm -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient VERSION_2_TO_3
|
|
* @run main/othervm -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient VERSION_3_TO_2
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.3 -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient CIPHER_SUITE
|
|
* @run main/othervm -Djdk.tls.client.protocols=TLSv1.3 -Djdk.tls.server.enableSessionTicketExtension=true -Djdk.tls.client.enableSessionTicketExtension=true ResumeChecksClient SIGNATURE_SCHEME
|
|
*
|
|
*/
|
|
|
|
import javax.net.*;
|
|
import javax.net.ssl.*;
|
|
import java.io.*;
|
|
import java.security.*;
|
|
import java.net.*;
|
|
import java.util.*;
|
|
|
|
public class ResumeChecksClient extends SSLContextTemplate {
|
|
enum TestMode {
|
|
BASIC,
|
|
VERSION_2_TO_3,
|
|
VERSION_3_TO_2,
|
|
CIPHER_SUITE,
|
|
SIGNATURE_SCHEME
|
|
}
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
new ResumeChecksClient(TestMode.valueOf(args[0])).run();
|
|
}
|
|
|
|
private final TestMode testMode;
|
|
public ResumeChecksClient(TestMode mode) {
|
|
this.testMode = mode;
|
|
}
|
|
|
|
private void run() throws Exception {
|
|
Server server = startServer();
|
|
server.signal();
|
|
SSLContext sslContext = createClientSSLContext();
|
|
while (!server.started) {
|
|
Thread.yield();
|
|
}
|
|
SSLSession firstSession = connect(sslContext, server.port, testMode, false);
|
|
|
|
server.signal();
|
|
long secondStartTime = System.currentTimeMillis();
|
|
Thread.sleep(10);
|
|
SSLSession secondSession = connect(sslContext, server.port, testMode, true);
|
|
|
|
server.go = false;
|
|
server.signal();
|
|
|
|
switch (testMode) {
|
|
case BASIC:
|
|
// fail if session is not resumed
|
|
checkResumedSession(firstSession, secondSession);
|
|
break;
|
|
case VERSION_2_TO_3:
|
|
case VERSION_3_TO_2:
|
|
case CIPHER_SUITE:
|
|
case SIGNATURE_SCHEME:
|
|
// fail if a new session is not created
|
|
if (secondSession.getCreationTime() <= secondStartTime) {
|
|
throw new RuntimeException("Existing session was used");
|
|
}
|
|
break;
|
|
default:
|
|
throw new RuntimeException("unknown mode: " + testMode);
|
|
}
|
|
}
|
|
|
|
private static class NoSig implements AlgorithmConstraints {
|
|
|
|
private final String alg;
|
|
|
|
NoSig(String alg) {
|
|
this.alg = alg;
|
|
}
|
|
|
|
|
|
private boolean test(String a) {
|
|
return !a.toLowerCase().contains(alg.toLowerCase());
|
|
}
|
|
|
|
@Override
|
|
public boolean permits(Set<CryptoPrimitive> primitives, Key key) {
|
|
return true;
|
|
}
|
|
@Override
|
|
public boolean permits(Set<CryptoPrimitive> primitives,
|
|
String algorithm, AlgorithmParameters parameters) {
|
|
|
|
return test(algorithm);
|
|
}
|
|
@Override
|
|
public boolean permits(Set<CryptoPrimitive> primitives,
|
|
String algorithm, Key key, AlgorithmParameters parameters) {
|
|
|
|
return test(algorithm);
|
|
}
|
|
}
|
|
|
|
private static SSLSession connect(SSLContext sslContext, int port,
|
|
TestMode mode, boolean second) {
|
|
|
|
try {
|
|
SSLSocket sock = (SSLSocket)
|
|
sslContext.getSocketFactory().createSocket();
|
|
SSLParameters params = sock.getSSLParameters();
|
|
|
|
switch (mode) {
|
|
case BASIC:
|
|
// do nothing to ensure resumption works
|
|
break;
|
|
case VERSION_2_TO_3:
|
|
if (second) {
|
|
params.setProtocols(new String[] {"TLSv1.3"});
|
|
} else {
|
|
params.setProtocols(new String[] {"TLSv1.2"});
|
|
}
|
|
break;
|
|
case VERSION_3_TO_2:
|
|
if (second) {
|
|
params.setProtocols(new String[] {"TLSv1.2"});
|
|
} else {
|
|
params.setProtocols(new String[] {"TLSv1.3"});
|
|
}
|
|
break;
|
|
case CIPHER_SUITE:
|
|
if (second) {
|
|
params.setCipherSuites(
|
|
new String[] {"TLS_AES_256_GCM_SHA384"});
|
|
} else {
|
|
params.setCipherSuites(
|
|
new String[] {"TLS_AES_128_GCM_SHA256"});
|
|
}
|
|
break;
|
|
case SIGNATURE_SCHEME:
|
|
AlgorithmConstraints constraints =
|
|
params.getAlgorithmConstraints();
|
|
if (second) {
|
|
params.setAlgorithmConstraints(new NoSig("ecdsa"));
|
|
} else {
|
|
params.setAlgorithmConstraints(new NoSig("rsa"));
|
|
}
|
|
break;
|
|
default:
|
|
throw new RuntimeException("unknown mode: " + mode);
|
|
}
|
|
sock.setSSLParameters(params);
|
|
sock.connect(new InetSocketAddress("localhost", port));
|
|
PrintWriter out = new PrintWriter(
|
|
new OutputStreamWriter(sock.getOutputStream()));
|
|
out.println("message");
|
|
out.flush();
|
|
BufferedReader reader = new BufferedReader(
|
|
new InputStreamReader(sock.getInputStream()));
|
|
String inMsg = reader.readLine();
|
|
System.out.println("Client received: " + inMsg);
|
|
SSLSession result = sock.getSession();
|
|
sock.close();
|
|
return result;
|
|
} catch (Exception ex) {
|
|
// unexpected exception
|
|
throw new RuntimeException(ex);
|
|
}
|
|
}
|
|
|
|
private static void checkResumedSession(SSLSession initSession,
|
|
SSLSession resSession) throws Exception {
|
|
StringBuilder diffLog = new StringBuilder();
|
|
|
|
// Initial and resumed SSLSessions should have the same creation
|
|
// times so they get invalidated together.
|
|
long initCt = initSession.getCreationTime();
|
|
long resumeCt = resSession.getCreationTime();
|
|
if (initCt != resumeCt) {
|
|
diffLog.append("Session creation time is different. Initial: ").
|
|
append(initCt).append(", Resumed: ").append(resumeCt).
|
|
append("\n");
|
|
}
|
|
|
|
// Ensure that peer and local certificate lists are preserved
|
|
if (!Arrays.equals(initSession.getLocalCertificates(),
|
|
resSession.getLocalCertificates())) {
|
|
diffLog.append("Local certificate mismatch between initial " +
|
|
"and resumed sessions\n");
|
|
}
|
|
|
|
if (!Arrays.equals(initSession.getPeerCertificates(),
|
|
resSession.getPeerCertificates())) {
|
|
diffLog.append("Peer certificate mismatch between initial " +
|
|
"and resumed sessions\n");
|
|
}
|
|
|
|
// Buffer sizes should also be the same
|
|
if (initSession.getApplicationBufferSize() !=
|
|
resSession.getApplicationBufferSize()) {
|
|
diffLog.append(String.format(
|
|
"App Buffer sizes differ: Init: %d, Res: %d\n",
|
|
initSession.getApplicationBufferSize(),
|
|
resSession.getApplicationBufferSize()));
|
|
}
|
|
|
|
if (initSession.getPacketBufferSize() !=
|
|
resSession.getPacketBufferSize()) {
|
|
diffLog.append(String.format(
|
|
"Packet Buffer sizes differ: Init: %d, Res: %d\n",
|
|
initSession.getPacketBufferSize(),
|
|
resSession.getPacketBufferSize()));
|
|
}
|
|
|
|
// Cipher suite should match
|
|
if (!initSession.getCipherSuite().equals(
|
|
resSession.getCipherSuite())) {
|
|
diffLog.append(String.format(
|
|
"CipherSuite does not match - Init: %s, Res: %s\n",
|
|
initSession.getCipherSuite(), resSession.getCipherSuite()));
|
|
}
|
|
|
|
// Peer host/port should match
|
|
if (!initSession.getPeerHost().equals(resSession.getPeerHost()) ||
|
|
initSession.getPeerPort() != resSession.getPeerPort()) {
|
|
diffLog.append(String.format(
|
|
"Host/Port mismatch - Init: %s/%d, Res: %s/%d\n",
|
|
initSession.getPeerHost(), initSession.getPeerPort(),
|
|
resSession.getPeerHost(), resSession.getPeerPort()));
|
|
}
|
|
|
|
// Check protocol
|
|
if (!initSession.getProtocol().equals(resSession.getProtocol())) {
|
|
diffLog.append(String.format(
|
|
"Protocol mismatch - Init: %s, Res: %s\n",
|
|
initSession.getProtocol(), resSession.getProtocol()));
|
|
}
|
|
|
|
// If the StringBuilder has any data in it then one of the checks
|
|
// above failed and we should throw an exception.
|
|
if (diffLog.length() > 0) {
|
|
throw new RuntimeException(diffLog.toString());
|
|
}
|
|
}
|
|
|
|
private static Server startServer() {
|
|
Server server = new Server();
|
|
new Thread(server).start();
|
|
return server;
|
|
}
|
|
|
|
private static class Server extends SSLContextTemplate implements Runnable {
|
|
|
|
public volatile boolean go = true;
|
|
private boolean signal = false;
|
|
public volatile int port = 0;
|
|
public volatile boolean started = false;
|
|
|
|
private synchronized void waitForSignal() {
|
|
while (!signal) {
|
|
try {
|
|
wait();
|
|
} catch (InterruptedException ex) {
|
|
// do nothing
|
|
}
|
|
}
|
|
signal = false;
|
|
}
|
|
public synchronized void signal() {
|
|
signal = true;
|
|
notify();
|
|
}
|
|
|
|
@Override
|
|
public void run() {
|
|
try {
|
|
|
|
SSLContext sc = createServerSSLContext();
|
|
ServerSocketFactory fac = sc.getServerSocketFactory();
|
|
SSLServerSocket ssock = (SSLServerSocket)
|
|
fac.createServerSocket(0);
|
|
this.port = ssock.getLocalPort();
|
|
|
|
waitForSignal();
|
|
started = true;
|
|
while (go) {
|
|
try {
|
|
System.out.println("Waiting for connection");
|
|
Socket sock = ssock.accept();
|
|
BufferedReader reader = new BufferedReader(
|
|
new InputStreamReader(sock.getInputStream()));
|
|
String line = reader.readLine();
|
|
System.out.println("server read: " + line);
|
|
PrintWriter out = new PrintWriter(
|
|
new OutputStreamWriter(sock.getOutputStream()));
|
|
out.println(line);
|
|
out.flush();
|
|
waitForSignal();
|
|
} catch (Exception ex) {
|
|
ex.printStackTrace();
|
|
}
|
|
}
|
|
} catch (Exception ex) {
|
|
throw new RuntimeException(ex);
|
|
}
|
|
}
|
|
}
|
|
}
|