123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305 |
- package nebula
- import (
- "context"
- "crypto/ed25519"
- "crypto/rand"
- "net"
- "testing"
- "time"
- "github.com/flynn/noise"
- "github.com/slackhq/nebula/cert"
- "github.com/slackhq/nebula/config"
- "github.com/slackhq/nebula/iputil"
- "github.com/slackhq/nebula/test"
- "github.com/slackhq/nebula/udp"
- "github.com/stretchr/testify/assert"
- )
- var vpnIp iputil.VpnIp
- func newTestLighthouse() *LightHouse {
- lh := &LightHouse{
- l: test.NewLogger(),
- addrMap: map[iputil.VpnIp]*RemoteList{},
- queryChan: make(chan iputil.VpnIp, 10),
- }
- lighthouses := map[iputil.VpnIp]struct{}{}
- staticList := map[iputil.VpnIp]struct{}{}
- lh.lighthouses.Store(&lighthouses)
- lh.staticList.Store(&staticList)
- return lh
- }
- func Test_NewConnectionManagerTest(t *testing.T) {
- l := test.NewLogger()
- //_, tuncidr, _ := net.ParseCIDR("1.1.1.1/24")
- _, vpncidr, _ := net.ParseCIDR("172.1.1.1/24")
- _, localrange, _ := net.ParseCIDR("10.1.1.1/24")
- vpnIp = iputil.Ip2VpnIp(net.ParseIP("172.1.1.2"))
- preferredRanges := []*net.IPNet{localrange}
- // Very incomplete mock objects
- hostMap := newHostMap(l, vpncidr)
- hostMap.preferredRanges.Store(&preferredRanges)
- cs := &CertState{
- RawCertificate: []byte{},
- PrivateKey: []byte{},
- Certificate: &cert.NebulaCertificate{},
- RawCertificateNoKey: []byte{},
- }
- lh := newTestLighthouse()
- ifce := &Interface{
- hostMap: hostMap,
- inside: &test.NoopTun{},
- outside: &udp.NoopConn{},
- firewall: &Firewall{},
- lightHouse: lh,
- pki: &PKI{},
- handshakeManager: NewHandshakeManager(l, hostMap, lh, &udp.NoopConn{}, defaultHandshakeConfig),
- l: l,
- }
- ifce.pki.cs.Store(cs)
- // Create manager
- ctx, cancel := context.WithCancel(context.Background())
- defer cancel()
- punchy := NewPunchyFromConfig(l, config.NewC(l))
- nc := newConnectionManager(ctx, l, ifce, 5, 10, punchy)
- p := []byte("")
- nb := make([]byte, 12, 12)
- out := make([]byte, mtu)
- // Add an ip we have established a connection w/ to hostmap
- hostinfo := &HostInfo{
- vpnIp: vpnIp,
- localIndexId: 1099,
- remoteIndexId: 9901,
- }
- hostinfo.ConnectionState = &ConnectionState{
- myCert: &cert.NebulaCertificate{},
- H: &noise.HandshakeState{},
- }
- nc.hostMap.unlockedAddHostInfo(hostinfo, ifce)
- // We saw traffic out to vpnIp
- nc.Out(hostinfo.localIndexId)
- nc.In(hostinfo.localIndexId)
- assert.NotContains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- assert.Contains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- assert.Contains(t, nc.out, hostinfo.localIndexId)
- // Do a traffic check tick, should not be pending deletion but should not have any in/out packets recorded
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.NotContains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.out, hostinfo.localIndexId)
- assert.NotContains(t, nc.in, hostinfo.localIndexId)
- // Do another traffic check tick, this host should be pending deletion now
- nc.Out(hostinfo.localIndexId)
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.Contains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.out, hostinfo.localIndexId)
- assert.NotContains(t, nc.in, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- // Do a final traffic check tick, the host should now be removed
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.NotContains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- assert.NotContains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- }
- func Test_NewConnectionManagerTest2(t *testing.T) {
- l := test.NewLogger()
- //_, tuncidr, _ := net.ParseCIDR("1.1.1.1/24")
- _, vpncidr, _ := net.ParseCIDR("172.1.1.1/24")
- _, localrange, _ := net.ParseCIDR("10.1.1.1/24")
- preferredRanges := []*net.IPNet{localrange}
- // Very incomplete mock objects
- hostMap := newHostMap(l, vpncidr)
- hostMap.preferredRanges.Store(&preferredRanges)
- cs := &CertState{
- RawCertificate: []byte{},
- PrivateKey: []byte{},
- Certificate: &cert.NebulaCertificate{},
- RawCertificateNoKey: []byte{},
- }
- lh := newTestLighthouse()
- ifce := &Interface{
- hostMap: hostMap,
- inside: &test.NoopTun{},
- outside: &udp.NoopConn{},
- firewall: &Firewall{},
- lightHouse: lh,
- pki: &PKI{},
- handshakeManager: NewHandshakeManager(l, hostMap, lh, &udp.NoopConn{}, defaultHandshakeConfig),
- l: l,
- }
- ifce.pki.cs.Store(cs)
- // Create manager
- ctx, cancel := context.WithCancel(context.Background())
- defer cancel()
- punchy := NewPunchyFromConfig(l, config.NewC(l))
- nc := newConnectionManager(ctx, l, ifce, 5, 10, punchy)
- p := []byte("")
- nb := make([]byte, 12, 12)
- out := make([]byte, mtu)
- // Add an ip we have established a connection w/ to hostmap
- hostinfo := &HostInfo{
- vpnIp: vpnIp,
- localIndexId: 1099,
- remoteIndexId: 9901,
- }
- hostinfo.ConnectionState = &ConnectionState{
- myCert: &cert.NebulaCertificate{},
- H: &noise.HandshakeState{},
- }
- nc.hostMap.unlockedAddHostInfo(hostinfo, ifce)
- // We saw traffic out to vpnIp
- nc.Out(hostinfo.localIndexId)
- nc.In(hostinfo.localIndexId)
- assert.NotContains(t, nc.pendingDeletion, hostinfo.vpnIp)
- assert.Contains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- assert.Contains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- // Do a traffic check tick, should not be pending deletion but should not have any in/out packets recorded
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.NotContains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.out, hostinfo.localIndexId)
- assert.NotContains(t, nc.in, hostinfo.localIndexId)
- // Do another traffic check tick, this host should be pending deletion now
- nc.Out(hostinfo.localIndexId)
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.Contains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.out, hostinfo.localIndexId)
- assert.NotContains(t, nc.in, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- // We saw traffic, should no longer be pending deletion
- nc.In(hostinfo.localIndexId)
- nc.doTrafficCheck(hostinfo.localIndexId, p, nb, out, time.Now())
- assert.NotContains(t, nc.pendingDeletion, hostinfo.localIndexId)
- assert.NotContains(t, nc.out, hostinfo.localIndexId)
- assert.NotContains(t, nc.in, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Indexes, hostinfo.localIndexId)
- assert.Contains(t, nc.hostMap.Hosts, hostinfo.vpnIp)
- }
- // Check if we can disconnect the peer.
- // Validate if the peer's certificate is invalid (expired, etc.)
- // Disconnect only if disconnectInvalid: true is set.
- func Test_NewConnectionManagerTest_DisconnectInvalid(t *testing.T) {
- now := time.Now()
- l := test.NewLogger()
- ipNet := net.IPNet{
- IP: net.IPv4(172, 1, 1, 2),
- Mask: net.IPMask{255, 255, 255, 0},
- }
- _, vpncidr, _ := net.ParseCIDR("172.1.1.1/24")
- _, localrange, _ := net.ParseCIDR("10.1.1.1/24")
- preferredRanges := []*net.IPNet{localrange}
- hostMap := newHostMap(l, vpncidr)
- hostMap.preferredRanges.Store(&preferredRanges)
- // Generate keys for CA and peer's cert.
- pubCA, privCA, _ := ed25519.GenerateKey(rand.Reader)
- caCert := cert.NebulaCertificate{
- Details: cert.NebulaCertificateDetails{
- Name: "ca",
- NotBefore: now,
- NotAfter: now.Add(1 * time.Hour),
- IsCA: true,
- PublicKey: pubCA,
- },
- }
- assert.NoError(t, caCert.Sign(cert.Curve_CURVE25519, privCA))
- ncp := &cert.NebulaCAPool{
- CAs: cert.NewCAPool().CAs,
- }
- ncp.CAs["ca"] = &caCert
- pubCrt, _, _ := ed25519.GenerateKey(rand.Reader)
- peerCert := cert.NebulaCertificate{
- Details: cert.NebulaCertificateDetails{
- Name: "host",
- Ips: []*net.IPNet{&ipNet},
- Subnets: []*net.IPNet{},
- NotBefore: now,
- NotAfter: now.Add(60 * time.Second),
- PublicKey: pubCrt,
- IsCA: false,
- Issuer: "ca",
- },
- }
- assert.NoError(t, peerCert.Sign(cert.Curve_CURVE25519, privCA))
- cs := &CertState{
- RawCertificate: []byte{},
- PrivateKey: []byte{},
- Certificate: &cert.NebulaCertificate{},
- RawCertificateNoKey: []byte{},
- }
- lh := newTestLighthouse()
- ifce := &Interface{
- hostMap: hostMap,
- inside: &test.NoopTun{},
- outside: &udp.NoopConn{},
- firewall: &Firewall{},
- lightHouse: lh,
- handshakeManager: NewHandshakeManager(l, hostMap, lh, &udp.NoopConn{}, defaultHandshakeConfig),
- l: l,
- pki: &PKI{},
- }
- ifce.pki.cs.Store(cs)
- ifce.pki.caPool.Store(ncp)
- ifce.disconnectInvalid.Store(true)
- // Create manager
- ctx, cancel := context.WithCancel(context.Background())
- defer cancel()
- punchy := NewPunchyFromConfig(l, config.NewC(l))
- nc := newConnectionManager(ctx, l, ifce, 5, 10, punchy)
- ifce.connectionManager = nc
- hostinfo := &HostInfo{
- vpnIp: vpnIp,
- ConnectionState: &ConnectionState{
- myCert: &cert.NebulaCertificate{},
- peerCert: &peerCert,
- H: &noise.HandshakeState{},
- },
- }
- nc.hostMap.unlockedAddHostInfo(hostinfo, ifce)
- // Move ahead 45s.
- // Check if to disconnect with invalid certificate.
- // Should be alive.
- nextTick := now.Add(45 * time.Second)
- invalid := nc.isInvalidCertificate(nextTick, hostinfo)
- assert.False(t, invalid)
- // Move ahead 61s.
- // Check if to disconnect with invalid certificate.
- // Should be disconnected.
- nextTick = now.Add(61 * time.Second)
- invalid = nc.isInvalidCertificate(nextTick, hostinfo)
- assert.True(t, invalid)
- }
|