mirror of https://github.com/telemt/telemt.git
277 lines
7.8 KiB
Rust
277 lines
7.8 KiB
Rust
use super::*;
|
|
use crate::crypto::sha256_hmac;
|
|
use std::time::Duration;
|
|
|
|
fn make_valid_tls_handshake(secret: &[u8], timestamp: u32) -> Vec<u8> {
|
|
let session_id_len: usize = 32;
|
|
let len = tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN + 1 + session_id_len;
|
|
let mut handshake = vec![0x42u8; len];
|
|
|
|
handshake[tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN] = session_id_len as u8;
|
|
handshake[tls::TLS_DIGEST_POS..tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN].fill(0);
|
|
|
|
let computed = sha256_hmac(secret, &handshake);
|
|
let mut digest = computed;
|
|
let ts = timestamp.to_le_bytes();
|
|
for i in 0..4 {
|
|
digest[28 + i] ^= ts[i];
|
|
}
|
|
|
|
handshake[tls::TLS_DIGEST_POS..tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN]
|
|
.copy_from_slice(&digest);
|
|
handshake
|
|
}
|
|
|
|
fn test_config_with_secret_hex(secret_hex: &str) -> ProxyConfig {
|
|
let mut cfg = ProxyConfig::default();
|
|
cfg.access.users.clear();
|
|
cfg.access
|
|
.users
|
|
.insert("user".to_string(), secret_hex.to_string());
|
|
cfg.access.ignore_time_skew = true;
|
|
cfg
|
|
}
|
|
|
|
#[test]
|
|
fn test_generate_tg_nonce() {
|
|
let client_dec_key = [0x42u8; 32];
|
|
let client_dec_iv = 12345u128;
|
|
let client_enc_key = [0x24u8; 32];
|
|
let client_enc_iv = 54321u128;
|
|
|
|
let rng = SecureRandom::new();
|
|
let (nonce, _tg_enc_key, _tg_enc_iv, _tg_dec_key, _tg_dec_iv) = generate_tg_nonce(
|
|
ProtoTag::Secure,
|
|
2,
|
|
&client_dec_key,
|
|
client_dec_iv,
|
|
&client_enc_key,
|
|
client_enc_iv,
|
|
&rng,
|
|
false,
|
|
);
|
|
|
|
assert_eq!(nonce.len(), HANDSHAKE_LEN);
|
|
|
|
let tag_bytes: [u8; 4] = nonce[PROTO_TAG_POS..PROTO_TAG_POS + 4].try_into().unwrap();
|
|
assert_eq!(ProtoTag::from_bytes(tag_bytes), Some(ProtoTag::Secure));
|
|
}
|
|
|
|
#[test]
|
|
fn test_encrypt_tg_nonce() {
|
|
let client_dec_key = [0x42u8; 32];
|
|
let client_dec_iv = 12345u128;
|
|
let client_enc_key = [0x24u8; 32];
|
|
let client_enc_iv = 54321u128;
|
|
|
|
let rng = SecureRandom::new();
|
|
let (nonce, _, _, _, _) = generate_tg_nonce(
|
|
ProtoTag::Secure,
|
|
2,
|
|
&client_dec_key,
|
|
client_dec_iv,
|
|
&client_enc_key,
|
|
client_enc_iv,
|
|
&rng,
|
|
false,
|
|
);
|
|
|
|
let encrypted = encrypt_tg_nonce(&nonce);
|
|
|
|
assert_eq!(encrypted.len(), HANDSHAKE_LEN);
|
|
assert_eq!(&encrypted[..PROTO_TAG_POS], &nonce[..PROTO_TAG_POS]);
|
|
assert_ne!(&encrypted[PROTO_TAG_POS..], &nonce[PROTO_TAG_POS..]);
|
|
}
|
|
|
|
#[test]
|
|
fn test_handshake_success_zeroize_on_drop() {
|
|
let success = HandshakeSuccess {
|
|
user: "test".to_string(),
|
|
dc_idx: 2,
|
|
proto_tag: ProtoTag::Secure,
|
|
dec_key: [0xAA; 32],
|
|
dec_iv: 0xBBBBBBBB,
|
|
enc_key: [0xCC; 32],
|
|
enc_iv: 0xDDDDDDDD,
|
|
peer: "127.0.0.1:1234".parse().unwrap(),
|
|
is_tls: true,
|
|
};
|
|
|
|
assert_eq!(success.dec_key, [0xAA; 32]);
|
|
assert_eq!(success.enc_key, [0xCC; 32]);
|
|
|
|
drop(success);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn tls_replay_second_identical_handshake_is_rejected() {
|
|
let secret = [0x11u8; 16];
|
|
let config = test_config_with_secret_hex("11111111111111111111111111111111");
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let rng = SecureRandom::new();
|
|
let peer: SocketAddr = "127.0.0.1:44321".parse().unwrap();
|
|
let handshake = make_valid_tls_handshake(&secret, 0);
|
|
|
|
let first = handle_tls_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
assert!(matches!(first, HandshakeResult::Success(_)));
|
|
|
|
let second = handle_tls_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
assert!(matches!(second, HandshakeResult::BadClient { .. }));
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn invalid_tls_probe_does_not_pollute_replay_cache() {
|
|
let config = test_config_with_secret_hex("11111111111111111111111111111111");
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let rng = SecureRandom::new();
|
|
let peer: SocketAddr = "127.0.0.1:44322".parse().unwrap();
|
|
|
|
let mut invalid = vec![0x42u8; tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN + 1 + 32];
|
|
invalid[tls::TLS_DIGEST_POS + tls::TLS_DIGEST_LEN] = 32;
|
|
|
|
let before = replay_checker.stats();
|
|
let result = handle_tls_handshake(
|
|
&invalid,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
let after = replay_checker.stats();
|
|
|
|
assert!(matches!(result, HandshakeResult::BadClient { .. }));
|
|
assert_eq!(before.total_additions, after.total_additions);
|
|
assert_eq!(before.total_hits, after.total_hits);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn empty_decoded_secret_is_rejected() {
|
|
let config = test_config_with_secret_hex("");
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let rng = SecureRandom::new();
|
|
let peer: SocketAddr = "127.0.0.1:44323".parse().unwrap();
|
|
let handshake = make_valid_tls_handshake(&[], 0);
|
|
|
|
let result = handle_tls_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
|
|
assert!(matches!(result, HandshakeResult::BadClient { .. }));
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn wrong_length_decoded_secret_is_rejected() {
|
|
let config = test_config_with_secret_hex("aa");
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let rng = SecureRandom::new();
|
|
let peer: SocketAddr = "127.0.0.1:44324".parse().unwrap();
|
|
let handshake = make_valid_tls_handshake(&[0xaau8], 0);
|
|
|
|
let result = handle_tls_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
|
|
assert!(matches!(result, HandshakeResult::BadClient { .. }));
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn invalid_mtproto_probe_does_not_pollute_replay_cache() {
|
|
let config = test_config_with_secret_hex("11111111111111111111111111111111");
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let peer: SocketAddr = "127.0.0.1:44325".parse().unwrap();
|
|
let handshake = [0u8; HANDSHAKE_LEN];
|
|
|
|
let before = replay_checker.stats();
|
|
let result = handle_mtproto_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
false,
|
|
None,
|
|
)
|
|
.await;
|
|
let after = replay_checker.stats();
|
|
|
|
assert!(matches!(result, HandshakeResult::BadClient { .. }));
|
|
assert_eq!(before.total_additions, after.total_additions);
|
|
assert_eq!(before.total_hits, after.total_hits);
|
|
}
|
|
|
|
#[tokio::test]
|
|
async fn mixed_secret_lengths_keep_valid_user_authenticating() {
|
|
let good_secret = [0x22u8; 16];
|
|
let mut config = ProxyConfig::default();
|
|
config.access.users.clear();
|
|
config
|
|
.access
|
|
.users
|
|
.insert("broken_user".to_string(), "aa".to_string());
|
|
config
|
|
.access
|
|
.users
|
|
.insert("valid_user".to_string(), "22222222222222222222222222222222".to_string());
|
|
config.access.ignore_time_skew = true;
|
|
|
|
let replay_checker = ReplayChecker::new(128, Duration::from_secs(60));
|
|
let rng = SecureRandom::new();
|
|
let peer: SocketAddr = "127.0.0.1:44326".parse().unwrap();
|
|
let handshake = make_valid_tls_handshake(&good_secret, 0);
|
|
|
|
let result = handle_tls_handshake(
|
|
&handshake,
|
|
tokio::io::empty(),
|
|
tokio::io::sink(),
|
|
peer,
|
|
&config,
|
|
&replay_checker,
|
|
&rng,
|
|
None,
|
|
)
|
|
.await;
|
|
|
|
assert!(matches!(result, HandshakeResult::Success(_)));
|
|
}
|