# HG changeset patch # User Maxim Dounin # Date 1445630409 -10800 # Node ID f17f83b3d8c9e314c0fc58f871795fdf8c66bffd # Parent 71dfce15bbba54361f1b613787708b2850928d63 Tests: session resumption with SNI. diff --git a/ssl_sni_sessions.t b/ssl_sni_sessions.t new file mode 100644 --- /dev/null +++ b/ssl_sni_sessions.t @@ -0,0 +1,209 @@ +#!/usr/bin/perl + +# (C) Maxim Dounin + +# Tests for SSL session resumption with SNI. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +my $t = Test::Nginx->new()->has(qw/http http_ssl sni rewrite/) + ->has_daemon('openssl') + ->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +http { + %%TEST_GLOBALS_HTTP%% + + ssl_certificate_key localhost.key; + ssl_certificate localhost.crt; + + server { + listen 127.0.0.1:8443 ssl; + server_name default; + + ssl_session_tickets off; + ssl_session_cache shared:cache1:1m; + + location / { + return 200 $ssl_server_name:$ssl_session_reused; + } + } + + server { + listen 127.0.0.1:8443; + server_name nocache; + + ssl_session_tickets off; + ssl_session_cache shared:cache2:1m; + + location / { + return 200 $ssl_server_name:$ssl_session_reused; + } + } + + server { + listen 127.0.0.1:8444 ssl; + server_name default; + + ssl_session_ticket_key ticket1.key; + + location / { + return 200 $ssl_server_name:$ssl_session_reused; + } + } + + server { + listen 127.0.0.1:8444; + server_name tickets; + + ssl_session_ticket_key ticket2.key; + + location / { + return 200 $ssl_server_name:$ssl_session_reused; + } + } +} + +EOF + +eval { require IO::Socket::SSL; die if $IO::Socket::SSL::VERSION < 1.56; }; +plan(skip_all => 'IO::Socket::SSL version >= 1.56 required') if $@; + +eval { + if (IO::Socket::SSL->can('can_client_sni')) { + IO::Socket::SSL->can_client_sni() or die; + } +}; +plan(skip_all => 'IO::Socket::SSL with OpenSSL SNI support required') if $@; + +eval { + my $ctx = Net::SSLeay::CTX_new() or die; + my $ssl = Net::SSLeay::new($ctx) or die; + Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die; +}; +plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@; + +$t->plan(6); + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('localhost') { + system('openssl req -x509 -new ' + . "-config '$d/openssl.conf' -subj '/CN=$name/' " + . "-out '$d/$name.crt' -keyout '$d/$name.key' " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +$t->write_file('ticket1.key', '1' x 48); +$t->write_file('ticket2.key', '2' x 48); + +$t->run(); + +############################################################################### + +my $ctx = IO::Socket::SSL::SSL_Context->new( + SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(), + SSL_session_cache_size => 100 +); + +# check that everything works fine with default server + +like(get('default', 8443, $ctx), qr!default:\.!, 'default server'); +like(get('default', 8443, $ctx), qr!default:r!, 'default server reused'); + +TODO: { +local $TODO = 'not yet' unless $t->has_version('1.9.6'); + +# check that sessions are still properly saved and restored +# when using an SNI-based virtual server with different session cache; +# as session resumption happens before SNI, only default server +# settings are expected to matter + +# this didn't work before nginx 1.9.6 (and caused segfaults if no session +# cache was configured the SNI-based virtual server), because OpenSSL, when +# creating new sessions, uses callbacks from the default server context, but +# provides access to the SNI-selected server context only (ticket #235) + +like(get('nocache', 8443, $ctx), qr!nocache:\.!, 'without cache'); +like(get('nocache', 8443, $ctx), qr!nocache:r!, 'without cache reused'); + +# make sure tickets can be used if an SNI-based virtual server +# uses a different set of session ticket keys explicitly set + +like(get('tickets', 8444, $ctx), qr!tickets:\.!, 'tickets'); +like(get('tickets', 8444, $ctx), qr!tickets:r!, 'tickets reused'); + +} + +############################################################################### + +sub get_ssl_socket { + my ($host, $port, $ctx) = @_; + my $s; + + eval { + local $SIG{ALRM} = sub { die "timeout\n" }; + local $SIG{PIPE} = sub { die "sigpipe\n" }; + alarm(2); + $s = IO::Socket::SSL->new( + Proto => 'tcp', + PeerAddr => '127.0.0.1', + PeerPort => $port, + SSL_hostname => $host, + SSL_session_key => "$host:$port", + SSL_reuse_ctx => $ctx, + SSL_error_trap => sub { die $_[1] } + ); + alarm(0); + }; + alarm(0); + + if ($@) { + log_in("died: $@"); + return undef; + } + + return $s; +} + +sub get { + my ($host, $port, $ctx) = @_; + + return http(< get_ssl_socket($host, $port, $ctx)); +GET / HTTP/1.0 +Host: $host + +EOF +} + +###############################################################################