mirror of
https://github.com/Luzifer/cloudkeys-go.git
synced 2024-11-14 08:52:44 +00:00
Knut Ahlers
a1df72edc5
commitf0db1ff1f8
Author: Knut Ahlers <knut@ahlers.me> Date: Sun Dec 24 12:19:56 2017 +0100 Mark option as deprecated Signed-off-by: Knut Ahlers <knut@ahlers.me> commit9891df2a16
Author: Knut Ahlers <knut@ahlers.me> Date: Sun Dec 24 12:11:56 2017 +0100 Fix: Typo Signed-off-by: Knut Ahlers <knut@ahlers.me> commit836006de64
Author: Knut Ahlers <knut@ahlers.me> Date: Sun Dec 24 12:04:20 2017 +0100 Add new dependencies Signed-off-by: Knut Ahlers <knut@ahlers.me> commitd64fee60c8
Author: Knut Ahlers <knut@ahlers.me> Date: Sun Dec 24 11:55:52 2017 +0100 Replace insecure password hashing Prior this commit passwords were hashed with a static salt and using the SHA1 hashing function. This could lead to passwords being attackable in case someone gets access to the raw data stored inside the database. This commit introduces password hashing using bcrypt hashing function which addresses this issue. Old passwords are not automatically re-hashed as they are unknown. Replacing the old password scheme is not that easy and needs #10 to be solved. Therefore the old hashing scheme is kept for compatibility reason. Signed-off-by: Knut Ahlers <knut@ahlers.me> Signed-off-by: Knut Ahlers <knut@ahlers.me> closes #14 closes #15
470 lines
15 KiB
Go
470 lines
15 KiB
Go
// Copyright 2012 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package otr
|
|
|
|
import (
|
|
"bufio"
|
|
"bytes"
|
|
"crypto/rand"
|
|
"encoding/hex"
|
|
"math/big"
|
|
"os"
|
|
"os/exec"
|
|
"testing"
|
|
)
|
|
|
|
var isQueryTests = []struct {
|
|
msg string
|
|
expectedVersion int
|
|
}{
|
|
{"foo", 0},
|
|
{"?OtR", 0},
|
|
{"?OtR?", 0},
|
|
{"?OTR?", 0},
|
|
{"?OTRv?", 0},
|
|
{"?OTRv1?", 0},
|
|
{"?OTR?v1?", 0},
|
|
{"?OTR?v?", 0},
|
|
{"?OTR?v2?", 2},
|
|
{"?OTRv2?", 2},
|
|
{"?OTRv23?", 2},
|
|
{"?OTRv23 ?", 0},
|
|
}
|
|
|
|
func TestIsQuery(t *testing.T) {
|
|
for i, test := range isQueryTests {
|
|
version := isQuery([]byte(test.msg))
|
|
if version != test.expectedVersion {
|
|
t.Errorf("#%d: got %d, want %d", i, version, test.expectedVersion)
|
|
}
|
|
}
|
|
}
|
|
|
|
var alicePrivateKeyHex = "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"
|
|
|
|
var aliceFingerprintHex = "0bb01c360424522e94ee9c346ce877a1a4288b2f"
|
|
|
|
var bobPrivateKeyHex = "000000000080a5138eb3d3eb9c1d85716faecadb718f87d31aaed1157671d7fee7e488f95e8e0ba60ad449ec732710a7dec5190f7182af2e2f98312d98497221dff160fd68033dd4f3a33b7c078d0d9f66e26847e76ca7447d4bab35486045090572863d9e4454777f24d6706f63e02548dfec2d0a620af37bbc1d24f884708a212c343b480d00000014e9c58f0ea21a5e4dfd9f44b6a9f7f6a9961a8fa9000000803c4d111aebd62d3c50c2889d420a32cdf1e98b70affcc1fcf44d59cca2eb019f6b774ef88153fb9b9615441a5fe25ea2d11b74ce922ca0232bd81b3c0fcac2a95b20cb6e6c0c5c1ace2e26f65dc43c751af0edbb10d669890e8ab6beea91410b8b2187af1a8347627a06ecea7e0f772c28aae9461301e83884860c9b656c722f0000008065af8625a555ea0e008cd04743671a3cda21162e83af045725db2eb2bb52712708dc0cc1a84c08b3649b88a966974bde27d8612c2861792ec9f08786a246fcadd6d8d3a81a32287745f309238f47618c2bd7612cb8b02d940571e0f30b96420bcd462ff542901b46109b1e5ad6423744448d20a57818a8cbb1647d0fea3b664e0000001440f9f2eb554cb00d45a5826b54bfa419b6980e48"
|
|
|
|
func TestKeySerialization(t *testing.T) {
|
|
var priv PrivateKey
|
|
alicePrivateKey, _ := hex.DecodeString(alicePrivateKeyHex)
|
|
rest, ok := priv.Parse(alicePrivateKey)
|
|
if !ok {
|
|
t.Error("failed to parse private key")
|
|
}
|
|
if len(rest) > 0 {
|
|
t.Error("data remaining after parsing private key")
|
|
}
|
|
|
|
out := priv.Serialize(nil)
|
|
if !bytes.Equal(alicePrivateKey, out) {
|
|
t.Errorf("serialization (%x) is not equal to original (%x)", out, alicePrivateKey)
|
|
}
|
|
|
|
aliceFingerprint, _ := hex.DecodeString(aliceFingerprintHex)
|
|
fingerprint := priv.PublicKey.Fingerprint()
|
|
if !bytes.Equal(aliceFingerprint, fingerprint) {
|
|
t.Errorf("fingerprint (%x) is not equal to expected value (%x)", fingerprint, aliceFingerprint)
|
|
}
|
|
}
|
|
|
|
const libOTRPrivateKey = `(privkeys
|
|
(account
|
|
(name "foo@example.com")
|
|
(protocol prpl-jabber)
|
|
(private-key
|
|
(dsa
|
|
(p #00FC07ABCF0DC916AFF6E9AE47BEF60C7AB9B4D6B2469E436630E36F8A489BE812486A09F30B71224508654940A835301ACC525A4FF133FC152CC53DCC59D65C30A54F1993FE13FE63E5823D4C746DB21B90F9B9C00B49EC7404AB1D929BA7FBA12F2E45C6E0A651689750E8528AB8C031D3561FECEE72EBB4A090D450A9B7A857#)
|
|
(q #00997BD266EF7B1F60A5C23F3A741F2AEFD07A2081#)
|
|
(g #535E360E8A95EBA46A4F7DE50AD6E9B2A6DB785A66B64EB9F20338D2A3E8FB0E94725848F1AA6CC567CB83A1CC517EC806F2E92EAE71457E80B2210A189B91250779434B41FC8A8873F6DB94BEA7D177F5D59E7E114EE10A49CFD9CEF88AE43387023B672927BA74B04EB6BBB5E57597766A2F9CE3857D7ACE3E1E3BC1FC6F26#)
|
|
(y #0AC8670AD767D7A8D9D14CC1AC6744CD7D76F993B77FFD9E39DF01E5A6536EF65E775FCEF2A983E2A19BD6415500F6979715D9FD1257E1FE2B6F5E1E74B333079E7C880D39868462A93454B41877BE62E5EF0A041C2EE9C9E76BD1E12AE25D9628DECB097025DD625EF49C3258A1A3C0FF501E3DC673B76D7BABF349009B6ECF#)
|
|
(x #14D0345A3562C480A039E3C72764F72D79043216#)
|
|
)
|
|
)
|
|
)
|
|
)`
|
|
|
|
func TestParseLibOTRPrivateKey(t *testing.T) {
|
|
var priv PrivateKey
|
|
|
|
if !priv.Import([]byte(libOTRPrivateKey)) {
|
|
t.Fatalf("Failed to import sample private key")
|
|
}
|
|
}
|
|
|
|
func TestSignVerify(t *testing.T) {
|
|
var priv PrivateKey
|
|
alicePrivateKey, _ := hex.DecodeString(alicePrivateKeyHex)
|
|
_, ok := priv.Parse(alicePrivateKey)
|
|
if !ok {
|
|
t.Error("failed to parse private key")
|
|
}
|
|
|
|
var msg [32]byte
|
|
rand.Reader.Read(msg[:])
|
|
|
|
sig := priv.Sign(rand.Reader, msg[:])
|
|
rest, ok := priv.PublicKey.Verify(msg[:], sig)
|
|
if !ok {
|
|
t.Errorf("signature (%x) of %x failed to verify", sig, msg[:])
|
|
} else if len(rest) > 0 {
|
|
t.Error("signature data remains after verification")
|
|
}
|
|
|
|
sig[10] ^= 80
|
|
_, ok = priv.PublicKey.Verify(msg[:], sig)
|
|
if ok {
|
|
t.Errorf("corrupted signature (%x) of %x verified", sig, msg[:])
|
|
}
|
|
}
|
|
|
|
func setupConversation(t *testing.T) (alice, bob *Conversation) {
|
|
alicePrivateKey, _ := hex.DecodeString(alicePrivateKeyHex)
|
|
bobPrivateKey, _ := hex.DecodeString(bobPrivateKeyHex)
|
|
|
|
alice, bob = new(Conversation), new(Conversation)
|
|
|
|
alice.PrivateKey = new(PrivateKey)
|
|
bob.PrivateKey = new(PrivateKey)
|
|
alice.PrivateKey.Parse(alicePrivateKey)
|
|
bob.PrivateKey.Parse(bobPrivateKey)
|
|
alice.FragmentSize = 100
|
|
bob.FragmentSize = 100
|
|
|
|
if alice.IsEncrypted() {
|
|
t.Error("Alice believes that the conversation is secure before we've started")
|
|
}
|
|
if bob.IsEncrypted() {
|
|
t.Error("Bob believes that the conversation is secure before we've started")
|
|
}
|
|
|
|
performHandshake(t, alice, bob)
|
|
return alice, bob
|
|
}
|
|
|
|
func performHandshake(t *testing.T, alice, bob *Conversation) {
|
|
var alicesMessage, bobsMessage [][]byte
|
|
var out []byte
|
|
var aliceChange, bobChange SecurityChange
|
|
var err error
|
|
alicesMessage = append(alicesMessage, []byte(QueryMessage))
|
|
|
|
for round := 0; len(alicesMessage) > 0 || len(bobsMessage) > 0; round++ {
|
|
bobsMessage = nil
|
|
for i, msg := range alicesMessage {
|
|
out, _, bobChange, bobsMessage, err = bob.Receive(msg)
|
|
if len(out) > 0 {
|
|
t.Errorf("Bob generated output during key exchange, round %d, message %d", round, i)
|
|
}
|
|
if err != nil {
|
|
t.Fatalf("Bob returned an error, round %d, message %d (%x): %s", round, i, msg, err)
|
|
}
|
|
if len(bobsMessage) > 0 && i != len(alicesMessage)-1 {
|
|
t.Errorf("Bob produced output while processing a fragment, round %d, message %d", round, i)
|
|
}
|
|
}
|
|
|
|
alicesMessage = nil
|
|
for i, msg := range bobsMessage {
|
|
out, _, aliceChange, alicesMessage, err = alice.Receive(msg)
|
|
if len(out) > 0 {
|
|
t.Errorf("Alice generated output during key exchange, round %d, message %d", round, i)
|
|
}
|
|
if err != nil {
|
|
t.Fatalf("Alice returned an error, round %d, message %d (%x): %s", round, i, msg, err)
|
|
}
|
|
if len(alicesMessage) > 0 && i != len(bobsMessage)-1 {
|
|
t.Errorf("Alice produced output while processing a fragment, round %d, message %d", round, i)
|
|
}
|
|
}
|
|
}
|
|
|
|
if aliceChange != NewKeys {
|
|
t.Errorf("Alice terminated without signaling new keys")
|
|
}
|
|
if bobChange != NewKeys {
|
|
t.Errorf("Bob terminated without signaling new keys")
|
|
}
|
|
|
|
if !bytes.Equal(alice.SSID[:], bob.SSID[:]) {
|
|
t.Errorf("Session identifiers don't match. Alice has %x, Bob has %x", alice.SSID[:], bob.SSID[:])
|
|
}
|
|
|
|
if !alice.IsEncrypted() {
|
|
t.Error("Alice doesn't believe that the conversation is secure")
|
|
}
|
|
if !bob.IsEncrypted() {
|
|
t.Error("Bob doesn't believe that the conversation is secure")
|
|
}
|
|
}
|
|
|
|
const (
|
|
firstRoundTrip = iota
|
|
subsequentRoundTrip
|
|
noMACKeyCheck
|
|
)
|
|
|
|
func roundTrip(t *testing.T, alice, bob *Conversation, message []byte, macKeyCheck int) {
|
|
alicesMessage, err := alice.Send(message)
|
|
if err != nil {
|
|
t.Errorf("Error from Alice sending message: %s", err)
|
|
}
|
|
|
|
if len(alice.oldMACs) != 0 {
|
|
t.Errorf("Alice has not revealed all MAC keys")
|
|
}
|
|
|
|
for i, msg := range alicesMessage {
|
|
out, encrypted, _, _, err := bob.Receive(msg)
|
|
|
|
if err != nil {
|
|
t.Errorf("Error generated while processing test message: %s", err.Error())
|
|
}
|
|
if len(out) > 0 {
|
|
if i != len(alicesMessage)-1 {
|
|
t.Fatal("Bob produced a message while processing a fragment of Alice's")
|
|
}
|
|
if !encrypted {
|
|
t.Errorf("Message was not marked as encrypted")
|
|
}
|
|
if !bytes.Equal(out, message) {
|
|
t.Errorf("Message corrupted: got %x, want %x", out, message)
|
|
}
|
|
}
|
|
}
|
|
|
|
switch macKeyCheck {
|
|
case firstRoundTrip:
|
|
if len(bob.oldMACs) != 0 {
|
|
t.Errorf("Bob should not have MAC keys to reveal")
|
|
}
|
|
case subsequentRoundTrip:
|
|
if len(bob.oldMACs) != 40 {
|
|
t.Errorf("Bob has %d bytes of MAC keys to reveal, but should have 40", len(bob.oldMACs))
|
|
}
|
|
}
|
|
|
|
bobsMessage, err := bob.Send(message)
|
|
if err != nil {
|
|
t.Errorf("Error from Bob sending message: %s", err)
|
|
}
|
|
|
|
if len(bob.oldMACs) != 0 {
|
|
t.Errorf("Bob has not revealed all MAC keys")
|
|
}
|
|
|
|
for i, msg := range bobsMessage {
|
|
out, encrypted, _, _, err := alice.Receive(msg)
|
|
|
|
if err != nil {
|
|
t.Errorf("Error generated while processing test message: %s", err.Error())
|
|
}
|
|
if len(out) > 0 {
|
|
if i != len(bobsMessage)-1 {
|
|
t.Fatal("Alice produced a message while processing a fragment of Bob's")
|
|
}
|
|
if !encrypted {
|
|
t.Errorf("Message was not marked as encrypted")
|
|
}
|
|
if !bytes.Equal(out, message) {
|
|
t.Errorf("Message corrupted: got %x, want %x", out, message)
|
|
}
|
|
}
|
|
}
|
|
|
|
switch macKeyCheck {
|
|
case firstRoundTrip:
|
|
if len(alice.oldMACs) != 20 {
|
|
t.Errorf("Alice has %d bytes of MAC keys to reveal, but should have 20", len(alice.oldMACs))
|
|
}
|
|
case subsequentRoundTrip:
|
|
if len(alice.oldMACs) != 40 {
|
|
t.Errorf("Alice has %d bytes of MAC keys to reveal, but should have 40", len(alice.oldMACs))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestConversation(t *testing.T) {
|
|
alice, bob := setupConversation(t)
|
|
|
|
var testMessages = [][]byte{
|
|
[]byte("hello"), []byte("bye"),
|
|
}
|
|
|
|
roundTripType := firstRoundTrip
|
|
|
|
for _, testMessage := range testMessages {
|
|
roundTrip(t, alice, bob, testMessage, roundTripType)
|
|
roundTripType = subsequentRoundTrip
|
|
}
|
|
}
|
|
|
|
func TestGoodSMP(t *testing.T) {
|
|
var alice, bob Conversation
|
|
|
|
alice.smp.secret = new(big.Int).SetInt64(42)
|
|
bob.smp.secret = alice.smp.secret
|
|
|
|
var alicesMessages, bobsMessages []tlv
|
|
var aliceComplete, bobComplete bool
|
|
var err error
|
|
var out tlv
|
|
|
|
alicesMessages = alice.startSMP("")
|
|
for round := 0; len(alicesMessages) > 0 || len(bobsMessages) > 0; round++ {
|
|
bobsMessages = bobsMessages[:0]
|
|
for i, msg := range alicesMessages {
|
|
out, bobComplete, err = bob.processSMP(msg)
|
|
if err != nil {
|
|
t.Errorf("Error from Bob in round %d: %s", round, err)
|
|
}
|
|
if bobComplete && i != len(alicesMessages)-1 {
|
|
t.Errorf("Bob returned a completed signal before processing all of Alice's messages in round %d", round)
|
|
}
|
|
if out.typ != 0 {
|
|
bobsMessages = append(bobsMessages, out)
|
|
}
|
|
}
|
|
|
|
alicesMessages = alicesMessages[:0]
|
|
for i, msg := range bobsMessages {
|
|
out, aliceComplete, err = alice.processSMP(msg)
|
|
if err != nil {
|
|
t.Errorf("Error from Alice in round %d: %s", round, err)
|
|
}
|
|
if aliceComplete && i != len(bobsMessages)-1 {
|
|
t.Errorf("Alice returned a completed signal before processing all of Bob's messages in round %d", round)
|
|
}
|
|
if out.typ != 0 {
|
|
alicesMessages = append(alicesMessages, out)
|
|
}
|
|
}
|
|
}
|
|
|
|
if !aliceComplete || !bobComplete {
|
|
t.Errorf("SMP completed without both sides reporting success: alice: %v, bob: %v\n", aliceComplete, bobComplete)
|
|
}
|
|
}
|
|
|
|
func TestBadSMP(t *testing.T) {
|
|
var alice, bob Conversation
|
|
|
|
alice.smp.secret = new(big.Int).SetInt64(42)
|
|
bob.smp.secret = new(big.Int).SetInt64(43)
|
|
|
|
var alicesMessages, bobsMessages []tlv
|
|
|
|
alicesMessages = alice.startSMP("")
|
|
for round := 0; len(alicesMessages) > 0 || len(bobsMessages) > 0; round++ {
|
|
bobsMessages = bobsMessages[:0]
|
|
for _, msg := range alicesMessages {
|
|
out, complete, _ := bob.processSMP(msg)
|
|
if complete {
|
|
t.Errorf("Bob signaled completion in round %d", round)
|
|
}
|
|
if out.typ != 0 {
|
|
bobsMessages = append(bobsMessages, out)
|
|
}
|
|
}
|
|
|
|
alicesMessages = alicesMessages[:0]
|
|
for _, msg := range bobsMessages {
|
|
out, complete, _ := alice.processSMP(msg)
|
|
if complete {
|
|
t.Errorf("Alice signaled completion in round %d", round)
|
|
}
|
|
if out.typ != 0 {
|
|
alicesMessages = append(alicesMessages, out)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestRehandshaking(t *testing.T) {
|
|
alice, bob := setupConversation(t)
|
|
roundTrip(t, alice, bob, []byte("test"), firstRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 2"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 3"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 4"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 5"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 6"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 7"), subsequentRoundTrip)
|
|
roundTrip(t, alice, bob, []byte("test 8"), subsequentRoundTrip)
|
|
performHandshake(t, alice, bob)
|
|
roundTrip(t, alice, bob, []byte("test"), noMACKeyCheck)
|
|
roundTrip(t, alice, bob, []byte("test 2"), noMACKeyCheck)
|
|
}
|
|
|
|
func TestAgainstLibOTR(t *testing.T) {
|
|
// This test requires otr.c.test to be built as /tmp/a.out.
|
|
// If enabled, this tests runs forever performing OTR handshakes in a
|
|
// loop.
|
|
return
|
|
|
|
alicePrivateKey, _ := hex.DecodeString(alicePrivateKeyHex)
|
|
var alice Conversation
|
|
alice.PrivateKey = new(PrivateKey)
|
|
alice.PrivateKey.Parse(alicePrivateKey)
|
|
|
|
cmd := exec.Command("/tmp/a.out")
|
|
cmd.Stderr = os.Stderr
|
|
|
|
out, err := cmd.StdinPipe()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
defer out.Close()
|
|
stdout, err := cmd.StdoutPipe()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
in := bufio.NewReader(stdout)
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
out.Write([]byte(QueryMessage))
|
|
out.Write([]byte("\n"))
|
|
var expectedText = []byte("test message")
|
|
|
|
for {
|
|
line, isPrefix, err := in.ReadLine()
|
|
if isPrefix {
|
|
t.Fatal("line from subprocess too long")
|
|
}
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
text, encrypted, change, alicesMessage, err := alice.Receive(line)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for _, msg := range alicesMessage {
|
|
out.Write(msg)
|
|
out.Write([]byte("\n"))
|
|
}
|
|
if change == NewKeys {
|
|
alicesMessage, err := alice.Send([]byte("Go -> libotr test message"))
|
|
if err != nil {
|
|
t.Fatalf("error sending message: %s", err.Error())
|
|
} else {
|
|
for _, msg := range alicesMessage {
|
|
out.Write(msg)
|
|
out.Write([]byte("\n"))
|
|
}
|
|
}
|
|
}
|
|
if len(text) > 0 {
|
|
if !bytes.Equal(text, expectedText) {
|
|
t.Fatalf("expected %x, but got %x", expectedText, text)
|
|
}
|
|
if !encrypted {
|
|
t.Fatal("message wasn't encrypted")
|
|
}
|
|
}
|
|
}
|
|
}
|