apple_client_platform_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453
  1. //go:build darwin && cgo
  2. package tls
  3. import (
  4. "context"
  5. stdtls "crypto/tls"
  6. "errors"
  7. "net"
  8. "os"
  9. "testing"
  10. "time"
  11. "github.com/sagernet/sing-box/option"
  12. "github.com/sagernet/sing/common/json/badoption"
  13. "github.com/sagernet/sing/common/logger"
  14. )
  15. const appleTLSTestTimeout = 5 * time.Second
  16. const (
  17. appleTLSSuccessHandshakeLoops = 20
  18. appleTLSFailureRecoveryLoops = 10
  19. )
  20. type appleTLSServerResult struct {
  21. state stdtls.ConnectionState
  22. err error
  23. }
  24. func TestAppleClientHandshakeAppliesALPNAndVersion(t *testing.T) {
  25. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  26. for index := 0; index < appleTLSSuccessHandshakeLoops; index++ {
  27. serverResult, serverAddress := startAppleTLSTestServer(t, &stdtls.Config{
  28. Certificates: []stdtls.Certificate{serverCertificate},
  29. MinVersion: stdtls.VersionTLS12,
  30. MaxVersion: stdtls.VersionTLS12,
  31. NextProtos: []string{"h2"},
  32. })
  33. clientConn, err := newAppleTestClientConn(t, serverAddress, option.OutboundTLSOptions{
  34. Enabled: true,
  35. Engine: "apple",
  36. ServerName: "localhost",
  37. MinVersion: "1.2",
  38. MaxVersion: "1.2",
  39. ALPN: badoption.Listable[string]{"h2"},
  40. Certificate: badoption.Listable[string]{serverCertificatePEM},
  41. })
  42. if err != nil {
  43. t.Fatalf("iteration %d: %v", index, err)
  44. }
  45. clientState := clientConn.ConnectionState()
  46. if clientState.Version != stdtls.VersionTLS12 {
  47. _ = clientConn.Close()
  48. t.Fatalf("iteration %d: unexpected negotiated version: %x", index, clientState.Version)
  49. }
  50. if clientState.NegotiatedProtocol != "h2" {
  51. _ = clientConn.Close()
  52. t.Fatalf("iteration %d: unexpected negotiated protocol: %q", index, clientState.NegotiatedProtocol)
  53. }
  54. _ = clientConn.Close()
  55. result := <-serverResult
  56. if result.err != nil {
  57. t.Fatalf("iteration %d: %v", index, result.err)
  58. }
  59. if result.state.Version != stdtls.VersionTLS12 {
  60. t.Fatalf("iteration %d: server negotiated unexpected version: %x", index, result.state.Version)
  61. }
  62. if result.state.NegotiatedProtocol != "h2" {
  63. t.Fatalf("iteration %d: server negotiated unexpected protocol: %q", index, result.state.NegotiatedProtocol)
  64. }
  65. }
  66. }
  67. func TestAppleClientHandshakeRejectsVersionMismatch(t *testing.T) {
  68. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  69. serverResult, serverAddress := startAppleTLSTestServer(t, &stdtls.Config{
  70. Certificates: []stdtls.Certificate{serverCertificate},
  71. MinVersion: stdtls.VersionTLS13,
  72. MaxVersion: stdtls.VersionTLS13,
  73. })
  74. clientConn, err := newAppleTestClientConn(t, serverAddress, option.OutboundTLSOptions{
  75. Enabled: true,
  76. Engine: "apple",
  77. ServerName: "localhost",
  78. MaxVersion: "1.2",
  79. Certificate: badoption.Listable[string]{serverCertificatePEM},
  80. })
  81. if err == nil {
  82. clientConn.Close()
  83. t.Fatal("expected version mismatch handshake to fail")
  84. }
  85. if result := <-serverResult; result.err == nil {
  86. t.Fatal("expected server handshake to fail on version mismatch")
  87. }
  88. }
  89. func TestAppleClientHandshakeRejectsServerNameMismatch(t *testing.T) {
  90. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  91. serverResult, serverAddress := startAppleTLSTestServer(t, &stdtls.Config{
  92. Certificates: []stdtls.Certificate{serverCertificate},
  93. })
  94. clientConn, err := newAppleTestClientConn(t, serverAddress, option.OutboundTLSOptions{
  95. Enabled: true,
  96. Engine: "apple",
  97. ServerName: "example.com",
  98. Certificate: badoption.Listable[string]{serverCertificatePEM},
  99. })
  100. if err == nil {
  101. clientConn.Close()
  102. t.Fatal("expected server name mismatch handshake to fail")
  103. }
  104. if result := <-serverResult; result.err == nil {
  105. t.Fatal("expected server handshake to fail on server name mismatch")
  106. }
  107. }
  108. func TestAppleClientHandshakeRecoversAfterFailure(t *testing.T) {
  109. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  110. testCases := []struct {
  111. name string
  112. serverConfig *stdtls.Config
  113. clientOptions option.OutboundTLSOptions
  114. }{
  115. {
  116. name: "version mismatch",
  117. serverConfig: &stdtls.Config{
  118. Certificates: []stdtls.Certificate{serverCertificate},
  119. MinVersion: stdtls.VersionTLS13,
  120. MaxVersion: stdtls.VersionTLS13,
  121. },
  122. clientOptions: option.OutboundTLSOptions{
  123. Enabled: true,
  124. Engine: "apple",
  125. ServerName: "localhost",
  126. MaxVersion: "1.2",
  127. Certificate: badoption.Listable[string]{serverCertificatePEM},
  128. },
  129. },
  130. {
  131. name: "server name mismatch",
  132. serverConfig: &stdtls.Config{
  133. Certificates: []stdtls.Certificate{serverCertificate},
  134. },
  135. clientOptions: option.OutboundTLSOptions{
  136. Enabled: true,
  137. Engine: "apple",
  138. ServerName: "example.com",
  139. Certificate: badoption.Listable[string]{serverCertificatePEM},
  140. },
  141. },
  142. }
  143. successClientOptions := option.OutboundTLSOptions{
  144. Enabled: true,
  145. Engine: "apple",
  146. ServerName: "localhost",
  147. MinVersion: "1.2",
  148. MaxVersion: "1.2",
  149. ALPN: badoption.Listable[string]{"h2"},
  150. Certificate: badoption.Listable[string]{serverCertificatePEM},
  151. }
  152. for _, testCase := range testCases {
  153. t.Run(testCase.name, func(t *testing.T) {
  154. for index := 0; index < appleTLSFailureRecoveryLoops; index++ {
  155. failedResult, failedAddress := startAppleTLSTestServer(t, testCase.serverConfig)
  156. failedConn, err := newAppleTestClientConn(t, failedAddress, testCase.clientOptions)
  157. if err == nil {
  158. _ = failedConn.Close()
  159. t.Fatalf("iteration %d: expected handshake failure", index)
  160. }
  161. if result := <-failedResult; result.err == nil {
  162. t.Fatalf("iteration %d: expected server handshake failure", index)
  163. }
  164. successResult, successAddress := startAppleTLSTestServer(t, &stdtls.Config{
  165. Certificates: []stdtls.Certificate{serverCertificate},
  166. MinVersion: stdtls.VersionTLS12,
  167. MaxVersion: stdtls.VersionTLS12,
  168. NextProtos: []string{"h2"},
  169. })
  170. successConn, err := newAppleTestClientConn(t, successAddress, successClientOptions)
  171. if err != nil {
  172. t.Fatalf("iteration %d: follow-up handshake failed: %v", index, err)
  173. }
  174. clientState := successConn.ConnectionState()
  175. if clientState.NegotiatedProtocol != "h2" {
  176. _ = successConn.Close()
  177. t.Fatalf("iteration %d: unexpected negotiated protocol after failure: %q", index, clientState.NegotiatedProtocol)
  178. }
  179. _ = successConn.Close()
  180. result := <-successResult
  181. if result.err != nil {
  182. t.Fatalf("iteration %d: follow-up server handshake failed: %v", index, result.err)
  183. }
  184. if result.state.NegotiatedProtocol != "h2" {
  185. t.Fatalf("iteration %d: follow-up server negotiated unexpected protocol: %q", index, result.state.NegotiatedProtocol)
  186. }
  187. }
  188. })
  189. }
  190. }
  191. func TestAppleClientReadDeadline(t *testing.T) {
  192. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  193. serverDone, serverAddress := startAppleTLSSilentServer(t, &stdtls.Config{
  194. Certificates: []stdtls.Certificate{serverCertificate},
  195. MinVersion: stdtls.VersionTLS12,
  196. MaxVersion: stdtls.VersionTLS12,
  197. })
  198. clientConn, err := newAppleTestClientConn(t, serverAddress, option.OutboundTLSOptions{
  199. Enabled: true,
  200. Engine: "apple",
  201. ServerName: "localhost",
  202. MinVersion: "1.2",
  203. MaxVersion: "1.2",
  204. Certificate: badoption.Listable[string]{serverCertificatePEM},
  205. })
  206. if err != nil {
  207. t.Fatal(err)
  208. }
  209. defer clientConn.Close()
  210. defer close(serverDone)
  211. err = clientConn.SetReadDeadline(time.Now().Add(200 * time.Millisecond))
  212. if err != nil {
  213. t.Fatalf("SetReadDeadline: %v", err)
  214. }
  215. readDone := make(chan error, 1)
  216. buffer := make([]byte, 64)
  217. go func() {
  218. _, readErr := clientConn.Read(buffer)
  219. readDone <- readErr
  220. }()
  221. select {
  222. case readErr := <-readDone:
  223. if !errors.Is(readErr, os.ErrDeadlineExceeded) {
  224. t.Fatalf("expected os.ErrDeadlineExceeded, got %v", readErr)
  225. }
  226. case <-time.After(2 * time.Second):
  227. t.Fatal("Read did not return within 2s after deadline")
  228. }
  229. _, err = clientConn.Read(buffer)
  230. if !errors.Is(err, os.ErrDeadlineExceeded) {
  231. t.Fatalf("sticky deadline: expected os.ErrDeadlineExceeded, got %v", err)
  232. }
  233. }
  234. func TestAppleClientSetDeadlineClearsPreExpiredSticky(t *testing.T) {
  235. serverCertificate, serverCertificatePEM := newAppleTestCertificate(t, "localhost")
  236. serverDone, serverAddress := startAppleTLSSilentServer(t, &stdtls.Config{
  237. Certificates: []stdtls.Certificate{serverCertificate},
  238. MinVersion: stdtls.VersionTLS12,
  239. MaxVersion: stdtls.VersionTLS12,
  240. })
  241. clientConn, err := newAppleTestClientConn(t, serverAddress, option.OutboundTLSOptions{
  242. Enabled: true,
  243. Engine: "apple",
  244. ServerName: "localhost",
  245. MinVersion: "1.2",
  246. MaxVersion: "1.2",
  247. Certificate: badoption.Listable[string]{serverCertificatePEM},
  248. })
  249. if err != nil {
  250. t.Fatal(err)
  251. }
  252. defer clientConn.Close()
  253. defer close(serverDone)
  254. err = clientConn.SetReadDeadline(time.Now().Add(-time.Second))
  255. if err != nil {
  256. t.Fatalf("SetReadDeadline past: %v", err)
  257. }
  258. // Pre-expired deadline trips sticky flag without cancelling nw_connection
  259. // (prepareReadTimeout short-circuits before the C read is issued).
  260. buffer := make([]byte, 64)
  261. _, err = clientConn.Read(buffer)
  262. if !errors.Is(err, os.ErrDeadlineExceeded) {
  263. t.Fatalf("pre-expired: expected os.ErrDeadlineExceeded, got %v", err)
  264. }
  265. err = clientConn.SetReadDeadline(time.Time{})
  266. if err != nil {
  267. t.Fatalf("SetReadDeadline zero: %v", err)
  268. }
  269. newDeadline := 300 * time.Millisecond
  270. err = clientConn.SetReadDeadline(time.Now().Add(newDeadline))
  271. if err != nil {
  272. t.Fatalf("SetReadDeadline future: %v", err)
  273. }
  274. readStart := time.Now()
  275. _, err = clientConn.Read(buffer)
  276. readElapsed := time.Since(readStart)
  277. if !errors.Is(err, os.ErrDeadlineExceeded) {
  278. t.Fatalf("after clear: expected os.ErrDeadlineExceeded, got %v", err)
  279. }
  280. if readElapsed < newDeadline-50*time.Millisecond {
  281. t.Fatalf("sticky flag was not cleared: Read returned after %v, expected ~%v", readElapsed, newDeadline)
  282. }
  283. }
  284. func startAppleTLSSilentServer(t *testing.T, tlsConfig *stdtls.Config) (chan<- struct{}, string) {
  285. t.Helper()
  286. listener, err := net.Listen("tcp", "127.0.0.1:0")
  287. if err != nil {
  288. t.Fatal(err)
  289. }
  290. t.Cleanup(func() {
  291. listener.Close()
  292. })
  293. if tcpListener, isTCP := listener.(*net.TCPListener); isTCP {
  294. err = tcpListener.SetDeadline(time.Now().Add(appleTLSTestTimeout))
  295. if err != nil {
  296. t.Fatal(err)
  297. }
  298. }
  299. done := make(chan struct{})
  300. go func() {
  301. conn, acceptErr := listener.Accept()
  302. if acceptErr != nil {
  303. return
  304. }
  305. defer conn.Close()
  306. handshakeErr := conn.SetDeadline(time.Now().Add(appleTLSTestTimeout))
  307. if handshakeErr != nil {
  308. return
  309. }
  310. tlsConn := stdtls.Server(conn, tlsConfig)
  311. defer tlsConn.Close()
  312. handshakeErr = tlsConn.Handshake()
  313. if handshakeErr != nil {
  314. return
  315. }
  316. handshakeErr = conn.SetDeadline(time.Time{})
  317. if handshakeErr != nil {
  318. return
  319. }
  320. <-done
  321. }()
  322. return done, listener.Addr().String()
  323. }
  324. func newAppleTestCertificate(t *testing.T, serverName string) (stdtls.Certificate, string) {
  325. t.Helper()
  326. privateKeyPEM, certificatePEM, err := GenerateCertificate(nil, nil, time.Now, serverName, time.Now().Add(time.Hour))
  327. if err != nil {
  328. t.Fatal(err)
  329. }
  330. certificate, err := stdtls.X509KeyPair(certificatePEM, privateKeyPEM)
  331. if err != nil {
  332. t.Fatal(err)
  333. }
  334. return certificate, string(certificatePEM)
  335. }
  336. func startAppleTLSTestServer(t *testing.T, tlsConfig *stdtls.Config) (<-chan appleTLSServerResult, string) {
  337. t.Helper()
  338. listener, err := net.Listen("tcp", "127.0.0.1:0")
  339. if err != nil {
  340. t.Fatal(err)
  341. }
  342. t.Cleanup(func() {
  343. listener.Close()
  344. })
  345. if tcpListener, isTCP := listener.(*net.TCPListener); isTCP {
  346. err = tcpListener.SetDeadline(time.Now().Add(appleTLSTestTimeout))
  347. if err != nil {
  348. t.Fatal(err)
  349. }
  350. }
  351. result := make(chan appleTLSServerResult, 1)
  352. go func() {
  353. defer close(result)
  354. conn, err := listener.Accept()
  355. if err != nil {
  356. result <- appleTLSServerResult{err: err}
  357. return
  358. }
  359. defer conn.Close()
  360. err = conn.SetDeadline(time.Now().Add(appleTLSTestTimeout))
  361. if err != nil {
  362. result <- appleTLSServerResult{err: err}
  363. return
  364. }
  365. tlsConn := stdtls.Server(conn, tlsConfig)
  366. defer tlsConn.Close()
  367. err = tlsConn.Handshake()
  368. if err != nil {
  369. result <- appleTLSServerResult{err: err}
  370. return
  371. }
  372. result <- appleTLSServerResult{state: tlsConn.ConnectionState()}
  373. }()
  374. return result, listener.Addr().String()
  375. }
  376. func newAppleTestClientConn(t *testing.T, serverAddress string, options option.OutboundTLSOptions) (Conn, error) {
  377. t.Helper()
  378. ctx, cancel := context.WithTimeout(context.Background(), appleTLSTestTimeout)
  379. t.Cleanup(cancel)
  380. clientConfig, err := NewClientWithOptions(ClientOptions{
  381. Context: ctx,
  382. Logger: logger.NOP(),
  383. ServerAddress: "",
  384. Options: options,
  385. })
  386. if err != nil {
  387. return nil, err
  388. }
  389. conn, err := net.DialTimeout("tcp", serverAddress, appleTLSTestTimeout)
  390. if err != nil {
  391. return nil, err
  392. }
  393. tlsConn, err := ClientHandshake(ctx, conn, clientConfig)
  394. if err != nil {
  395. conn.Close()
  396. return nil, err
  397. }
  398. return tlsConn, nil
  399. }