cert_v2_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. package cert
  2. import (
  3. "crypto/ed25519"
  4. "crypto/rand"
  5. "encoding/hex"
  6. "net/netip"
  7. "slices"
  8. "testing"
  9. "time"
  10. "github.com/slackhq/nebula/test"
  11. "github.com/stretchr/testify/assert"
  12. "github.com/stretchr/testify/require"
  13. )
  14. func TestCertificateV2_Marshal(t *testing.T) {
  15. t.Parallel()
  16. before := time.Now().Add(time.Second * -60).Round(time.Second)
  17. after := time.Now().Add(time.Second * 60).Round(time.Second)
  18. pubKey := []byte("1234567890abcedfghij1234567890ab")
  19. nc := certificateV2{
  20. details: detailsV2{
  21. name: "testing",
  22. networks: []netip.Prefix{
  23. mustParsePrefixUnmapped("10.1.1.2/16"),
  24. mustParsePrefixUnmapped("10.1.1.1/24"),
  25. },
  26. unsafeNetworks: []netip.Prefix{
  27. mustParsePrefixUnmapped("9.1.1.3/16"),
  28. mustParsePrefixUnmapped("9.1.1.2/24"),
  29. },
  30. groups: []string{"test-group1", "test-group2", "test-group3"},
  31. notBefore: before,
  32. notAfter: after,
  33. isCA: false,
  34. issuer: "1234567890abcdef1234567890abcdef",
  35. },
  36. signature: []byte("1234567890abcdef1234567890abcdef"),
  37. publicKey: pubKey,
  38. }
  39. db, err := nc.details.Marshal()
  40. require.NoError(t, err)
  41. nc.rawDetails = db
  42. b, err := nc.Marshal()
  43. require.NoError(t, err)
  44. //t.Log("Cert size:", len(b))
  45. nc2, err := unmarshalCertificateV2(b, nil, Curve_CURVE25519)
  46. require.NoError(t, err)
  47. assert.Equal(t, Version2, nc.Version())
  48. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  49. assert.Equal(t, nc.Signature(), nc2.Signature())
  50. assert.Equal(t, nc.Name(), nc2.Name())
  51. assert.Equal(t, nc.NotBefore(), nc2.NotBefore())
  52. assert.Equal(t, nc.NotAfter(), nc2.NotAfter())
  53. assert.Equal(t, nc.PublicKey(), nc2.PublicKey())
  54. assert.Equal(t, nc.IsCA(), nc2.IsCA())
  55. assert.Equal(t, nc.Issuer(), nc2.Issuer())
  56. // unmarshalling will sort networks and unsafeNetworks, we need to do the same
  57. // but first make sure it fails
  58. assert.NotEqual(t, nc.Networks(), nc2.Networks())
  59. assert.NotEqual(t, nc.UnsafeNetworks(), nc2.UnsafeNetworks())
  60. slices.SortFunc(nc.details.networks, comparePrefix)
  61. slices.SortFunc(nc.details.unsafeNetworks, comparePrefix)
  62. assert.Equal(t, nc.Networks(), nc2.Networks())
  63. assert.Equal(t, nc.UnsafeNetworks(), nc2.UnsafeNetworks())
  64. assert.Equal(t, nc.Groups(), nc2.Groups())
  65. }
  66. func TestCertificateV2_Unmarshal(t *testing.T) {
  67. t.Parallel()
  68. before := time.Now().Add(time.Second * -60).Round(time.Second)
  69. after := time.Now().Add(time.Second * 60).Round(time.Second)
  70. pubKey := []byte("1234567890abcedfghij1234567890ab")
  71. nc := certificateV2{
  72. details: detailsV2{
  73. name: "testing",
  74. networks: []netip.Prefix{
  75. mustParsePrefixUnmapped("10.1.1.2/16"),
  76. mustParsePrefixUnmapped("10.1.1.1/24"),
  77. },
  78. unsafeNetworks: []netip.Prefix{
  79. mustParsePrefixUnmapped("9.1.1.3/16"),
  80. mustParsePrefixUnmapped("9.1.1.2/24"),
  81. },
  82. groups: []string{"test-group1", "test-group2", "test-group3"},
  83. notBefore: before,
  84. notAfter: after,
  85. isCA: false,
  86. issuer: "1234567890abcdef1234567890abcdef",
  87. },
  88. signature: []byte("1234567890abcdef1234567890abcdef"),
  89. publicKey: pubKey,
  90. }
  91. db, err := nc.details.Marshal()
  92. require.NoError(t, err)
  93. nc.rawDetails = db
  94. certWithPubkey, err := nc.Marshal()
  95. require.NoError(t, err)
  96. //t.Log("Cert size:", len(b))
  97. certWithoutPubkey, err := nc.MarshalForHandshakes()
  98. require.NoError(t, err)
  99. // Cert must not have a pubkey if one is passed in as an argument
  100. _, err = unmarshalCertificateV2(certWithPubkey, pubKey, Curve_CURVE25519)
  101. require.ErrorIs(t, err, ErrCertPubkeyPresent)
  102. // Certs must have pubkeys
  103. _, err = unmarshalCertificateV2(certWithoutPubkey, nil, Curve_CURVE25519)
  104. require.ErrorIs(t, err, ErrBadFormat)
  105. // Ensure proper unmarshal if a pubkey is passed in
  106. nc2, err := unmarshalCertificateV2(certWithoutPubkey, pubKey, Curve_CURVE25519)
  107. require.NoError(t, err)
  108. assert.Equal(t, nc.PublicKey(), nc2.PublicKey())
  109. }
  110. func TestCertificateV2_PublicKeyPem(t *testing.T) {
  111. t.Parallel()
  112. before := time.Now().Add(time.Second * -60).Round(time.Second)
  113. after := time.Now().Add(time.Second * 60).Round(time.Second)
  114. pubKey := ed25519.PublicKey("1234567890abcedfghij1234567890ab")
  115. nc := certificateV2{
  116. details: detailsV2{
  117. name: "testing",
  118. networks: []netip.Prefix{},
  119. unsafeNetworks: []netip.Prefix{},
  120. groups: []string{"test-group1", "test-group2", "test-group3"},
  121. notBefore: before,
  122. notAfter: after,
  123. isCA: false,
  124. issuer: "1234567890abcedfghij1234567890ab",
  125. },
  126. publicKey: pubKey,
  127. signature: []byte("1234567890abcedfghij1234567890ab"),
  128. }
  129. assert.Equal(t, Version2, nc.Version())
  130. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  131. pubPem := "-----BEGIN NEBULA X25519 PUBLIC KEY-----\nMTIzNDU2Nzg5MGFiY2VkZmdoaWoxMjM0NTY3ODkwYWI=\n-----END NEBULA X25519 PUBLIC KEY-----\n"
  132. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), pubPem)
  133. assert.False(t, nc.IsCA())
  134. nc.details.isCA = true
  135. assert.Equal(t, Curve_CURVE25519, nc.Curve())
  136. pubPem = "-----BEGIN NEBULA ED25519 PUBLIC KEY-----\nMTIzNDU2Nzg5MGFiY2VkZmdoaWoxMjM0NTY3ODkwYWI=\n-----END NEBULA ED25519 PUBLIC KEY-----\n"
  137. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), pubPem)
  138. assert.True(t, nc.IsCA())
  139. pubP256KeyPem := []byte(`-----BEGIN NEBULA P256 PUBLIC KEY-----
  140. AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  141. AAAAAAAAAAAAAAAAAAAAAAA=
  142. -----END NEBULA P256 PUBLIC KEY-----
  143. `)
  144. pubP256KeyPemCA := []byte(`-----BEGIN NEBULA ECDSA P256 PUBLIC KEY-----
  145. AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
  146. AAAAAAAAAAAAAAAAAAAAAAA=
  147. -----END NEBULA ECDSA P256 PUBLIC KEY-----
  148. `)
  149. pubP256Key, _, _, err := UnmarshalPublicKeyFromPEM(pubP256KeyPem)
  150. require.NoError(t, err)
  151. nc.curve = Curve_P256
  152. nc.publicKey = pubP256Key
  153. assert.Equal(t, Curve_P256, nc.Curve())
  154. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), string(pubP256KeyPemCA))
  155. assert.True(t, nc.IsCA())
  156. nc.details.isCA = false
  157. assert.Equal(t, Curve_P256, nc.Curve())
  158. assert.Equal(t, string(nc.MarshalPublicKeyPEM()), string(pubP256KeyPem))
  159. assert.False(t, nc.IsCA())
  160. }
  161. func TestCertificateV2_Expired(t *testing.T) {
  162. nc := certificateV2{
  163. details: detailsV2{
  164. notBefore: time.Now().Add(time.Second * -60).Round(time.Second),
  165. notAfter: time.Now().Add(time.Second * 60).Round(time.Second),
  166. },
  167. }
  168. assert.True(t, nc.Expired(time.Now().Add(time.Hour)))
  169. assert.True(t, nc.Expired(time.Now().Add(-time.Hour)))
  170. assert.False(t, nc.Expired(time.Now()))
  171. }
  172. func TestCertificateV2_MarshalJSON(t *testing.T) {
  173. time.Local = time.UTC
  174. pubKey := []byte("1234567890abcedf1234567890abcedf")
  175. nc := certificateV2{
  176. details: detailsV2{
  177. name: "testing",
  178. networks: []netip.Prefix{
  179. mustParsePrefixUnmapped("10.1.1.1/24"),
  180. mustParsePrefixUnmapped("10.1.1.2/16"),
  181. },
  182. unsafeNetworks: []netip.Prefix{
  183. mustParsePrefixUnmapped("9.1.1.2/24"),
  184. mustParsePrefixUnmapped("9.1.1.3/16"),
  185. },
  186. groups: []string{"test-group1", "test-group2", "test-group3"},
  187. notBefore: time.Date(1, 0, 0, 1, 0, 0, 0, time.UTC),
  188. notAfter: time.Date(1, 0, 0, 2, 0, 0, 0, time.UTC),
  189. isCA: false,
  190. issuer: "1234567890abcedf1234567890abcedf",
  191. },
  192. publicKey: pubKey,
  193. signature: []byte("1234567890abcedf1234567890abcedf1234567890abcedf1234567890abcedf"),
  194. }
  195. b, err := nc.MarshalJSON()
  196. require.ErrorIs(t, err, ErrMissingDetails)
  197. rd, err := nc.details.Marshal()
  198. require.NoError(t, err)
  199. nc.rawDetails = rd
  200. b, err = nc.MarshalJSON()
  201. require.NoError(t, err)
  202. assert.JSONEq(
  203. t,
  204. "{\"curve\":\"CURVE25519\",\"details\":{\"groups\":[\"test-group1\",\"test-group2\",\"test-group3\"],\"isCa\":false,\"issuer\":\"1234567890abcedf1234567890abcedf\",\"name\":\"testing\",\"networks\":[\"10.1.1.1/24\",\"10.1.1.2/16\"],\"notAfter\":\"0000-11-30T02:00:00Z\",\"notBefore\":\"0000-11-30T01:00:00Z\",\"unsafeNetworks\":[\"9.1.1.2/24\",\"9.1.1.3/16\"]},\"fingerprint\":\"152d9a7400c1e001cb76cffd035215ebb351f69eeb797f7f847dd086e15e56dd\",\"publicKey\":\"3132333435363738393061626365646631323334353637383930616263656466\",\"signature\":\"31323334353637383930616263656466313233343536373839306162636564663132333435363738393061626365646631323334353637383930616263656466\",\"version\":2}",
  205. string(b),
  206. )
  207. }
  208. func TestCertificateV2_VerifyPrivateKey(t *testing.T) {
  209. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_CURVE25519, time.Time{}, time.Time{}, nil, nil, nil)
  210. err := ca.VerifyPrivateKey(Curve_CURVE25519, caKey)
  211. require.NoError(t, err)
  212. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey[:16])
  213. require.ErrorIs(t, err, ErrInvalidPrivateKey)
  214. _, caKey2, err := ed25519.GenerateKey(rand.Reader)
  215. require.NoError(t, err)
  216. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey2)
  217. require.ErrorIs(t, err, ErrPublicPrivateKeyMismatch)
  218. c, _, priv, _ := NewTestCert(Version2, Curve_CURVE25519, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  219. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  220. require.NoError(t, err)
  221. assert.Empty(t, b)
  222. assert.Equal(t, Curve_CURVE25519, curve)
  223. err = c.VerifyPrivateKey(Curve_CURVE25519, rawPriv)
  224. require.NoError(t, err)
  225. _, priv2 := X25519Keypair()
  226. err = c.VerifyPrivateKey(Curve_P256, priv2)
  227. require.ErrorIs(t, err, ErrPublicPrivateCurveMismatch)
  228. err = c.VerifyPrivateKey(Curve_CURVE25519, priv2)
  229. require.ErrorIs(t, err, ErrPublicPrivateKeyMismatch)
  230. err = c.VerifyPrivateKey(Curve_CURVE25519, priv2[:16])
  231. require.ErrorIs(t, err, ErrInvalidPrivateKey)
  232. ac, ok := c.(*certificateV2)
  233. require.True(t, ok)
  234. ac.curve = Curve(99)
  235. err = c.VerifyPrivateKey(Curve(99), priv2)
  236. require.EqualError(t, err, "invalid curve: 99")
  237. ca2, _, caKey2, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  238. err = ca.VerifyPrivateKey(Curve_CURVE25519, caKey)
  239. require.NoError(t, err)
  240. err = ca2.VerifyPrivateKey(Curve_P256, caKey2[:16])
  241. require.ErrorIs(t, err, ErrInvalidPrivateKey)
  242. c, _, priv, _ = NewTestCert(Version2, Curve_P256, ca2, caKey2, "test", time.Time{}, time.Time{}, nil, nil, nil)
  243. rawPriv, b, curve, err = UnmarshalPrivateKeyFromPEM(priv)
  244. err = c.VerifyPrivateKey(Curve_P256, priv[:16])
  245. require.ErrorIs(t, err, ErrInvalidPrivateKey)
  246. err = c.VerifyPrivateKey(Curve_P256, priv)
  247. require.ErrorIs(t, err, ErrInvalidPrivateKey)
  248. aCa, ok := ca2.(*certificateV2)
  249. require.True(t, ok)
  250. aCa.curve = Curve(99)
  251. err = aCa.VerifyPrivateKey(Curve(99), priv2)
  252. require.EqualError(t, err, "invalid curve: 99")
  253. }
  254. func TestCertificateV2_VerifyPrivateKeyP256(t *testing.T) {
  255. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  256. err := ca.VerifyPrivateKey(Curve_P256, caKey)
  257. require.NoError(t, err)
  258. _, _, caKey2, _ := NewTestCaCert(Version2, Curve_P256, time.Time{}, time.Time{}, nil, nil, nil)
  259. require.NoError(t, err)
  260. err = ca.VerifyPrivateKey(Curve_P256, caKey2)
  261. require.Error(t, err)
  262. c, _, priv, _ := NewTestCert(Version2, Curve_P256, ca, caKey, "test", time.Time{}, time.Time{}, nil, nil, nil)
  263. rawPriv, b, curve, err := UnmarshalPrivateKeyFromPEM(priv)
  264. require.NoError(t, err)
  265. assert.Empty(t, b)
  266. assert.Equal(t, Curve_P256, curve)
  267. err = c.VerifyPrivateKey(Curve_P256, rawPriv)
  268. require.NoError(t, err)
  269. _, priv2 := P256Keypair()
  270. err = c.VerifyPrivateKey(Curve_P256, priv2)
  271. require.Error(t, err)
  272. }
  273. func TestCertificateV2_Copy(t *testing.T) {
  274. ca, _, caKey, _ := NewTestCaCert(Version2, Curve_CURVE25519, time.Now(), time.Now().Add(10*time.Minute), nil, nil, nil)
  275. c, _, _, _ := NewTestCert(Version2, Curve_CURVE25519, ca, caKey, "test", time.Now(), time.Now().Add(5*time.Minute), nil, nil, nil)
  276. cc := c.Copy()
  277. test.AssertDeepCopyEqual(t, c, cc)
  278. }
  279. func TestUnmarshalCertificateV2(t *testing.T) {
  280. data := []byte("\x98\x00\x00")
  281. _, err := unmarshalCertificateV2(data, nil, Curve_CURVE25519)
  282. require.EqualError(t, err, "bad wire format")
  283. }
  284. func TestCertificateV2_marshalForSigningStability(t *testing.T) {
  285. before := time.Date(1996, time.May, 5, 0, 0, 0, 0, time.UTC)
  286. after := before.Add(time.Second * 60).Round(time.Second)
  287. pubKey := []byte("1234567890abcedfghij1234567890ab")
  288. nc := certificateV2{
  289. details: detailsV2{
  290. name: "testing",
  291. networks: []netip.Prefix{
  292. mustParsePrefixUnmapped("10.1.1.2/16"),
  293. mustParsePrefixUnmapped("10.1.1.1/24"),
  294. },
  295. unsafeNetworks: []netip.Prefix{
  296. mustParsePrefixUnmapped("9.1.1.3/16"),
  297. mustParsePrefixUnmapped("9.1.1.2/24"),
  298. },
  299. groups: []string{"test-group1", "test-group2", "test-group3"},
  300. notBefore: before,
  301. notAfter: after,
  302. isCA: false,
  303. issuer: "1234567890abcdef1234567890abcdef",
  304. },
  305. signature: []byte("1234567890abcdef1234567890abcdef"),
  306. publicKey: pubKey,
  307. }
  308. const expectedRawDetailsStr = "a070800774657374696e67a10e04050a0101021004050a01010118a20e0405090101031004050901010218a3270c0b746573742d67726f7570310c0b746573742d67726f7570320c0b746573742d67726f7570338504318bef808604318befbc87101234567890abcdef1234567890abcdef"
  309. expectedRawDetails, err := hex.DecodeString(expectedRawDetailsStr)
  310. require.NoError(t, err)
  311. db, err := nc.details.Marshal()
  312. require.NoError(t, err)
  313. assert.Equal(t, expectedRawDetails, db)
  314. expectedForSigning, err := hex.DecodeString(expectedRawDetailsStr + "00313233343536373839306162636564666768696a313233343536373839306162")
  315. b, err := nc.marshalForSigning()
  316. require.NoError(t, err)
  317. assert.Equal(t, expectedForSigning, b)
  318. }