changeset 751:f17f83b3d8c9

Tests: session resumption with SNI.
author Maxim Dounin <mdounin@mdounin.ru>
date Fri, 23 Oct 2015 23:00:09 +0300
parents 71dfce15bbba
children 80e17d44088c
files ssl_sni_sessions.t
diffstat 1 files changed, 209 insertions(+), 0 deletions(-) [+]
line wrap: on
line diff
new file mode 100644
--- /dev/null
+++ b/ssl_sni_sessions.t
@@ -0,0 +1,209 @@
+#!/usr/bin/perl
+
+# (C) Maxim Dounin
+
+# Tests for SSL session resumption with SNI.
+
+###############################################################################
+
+use warnings;
+use strict;
+
+use Test::More;
+
+BEGIN { use FindBin; chdir($FindBin::Bin); }
+
+use lib 'lib';
+use Test::Nginx;
+
+###############################################################################
+
+select STDERR; $| = 1;
+select STDOUT; $| = 1;
+
+my $t = Test::Nginx->new()->has(qw/http http_ssl sni rewrite/)
+	->has_daemon('openssl')
+	->write_file_expand('nginx.conf', <<'EOF');
+
+%%TEST_GLOBALS%%
+
+daemon off;
+
+events {
+}
+
+http {
+    %%TEST_GLOBALS_HTTP%%
+
+    ssl_certificate_key localhost.key;
+    ssl_certificate localhost.crt;
+
+    server {
+        listen       127.0.0.1:8443 ssl;
+        server_name  default;
+
+        ssl_session_tickets off;
+        ssl_session_cache shared:cache1:1m;
+
+        location / {
+            return 200 $ssl_server_name:$ssl_session_reused;
+        }
+    }
+
+    server {
+        listen       127.0.0.1:8443;
+        server_name  nocache;
+
+        ssl_session_tickets off;
+        ssl_session_cache shared:cache2:1m;
+
+        location / {
+            return 200 $ssl_server_name:$ssl_session_reused;
+        }
+    }
+
+    server {
+        listen       127.0.0.1:8444 ssl;
+        server_name  default;
+
+        ssl_session_ticket_key ticket1.key;
+
+        location / {
+            return 200 $ssl_server_name:$ssl_session_reused;
+        }
+    }
+
+    server {
+        listen       127.0.0.1:8444;
+        server_name  tickets;
+
+        ssl_session_ticket_key ticket2.key;
+
+        location / {
+            return 200 $ssl_server_name:$ssl_session_reused;
+        }
+    }
+}
+
+EOF
+
+eval { require IO::Socket::SSL; die if $IO::Socket::SSL::VERSION < 1.56; };
+plan(skip_all => 'IO::Socket::SSL version >= 1.56 required') if $@;
+
+eval {
+	if (IO::Socket::SSL->can('can_client_sni')) {
+		IO::Socket::SSL->can_client_sni() or die;
+	}
+};
+plan(skip_all => 'IO::Socket::SSL with OpenSSL SNI support required') if $@;
+
+eval {
+	my $ctx = Net::SSLeay::CTX_new() or die;
+	my $ssl = Net::SSLeay::new($ctx) or die;
+	Net::SSLeay::set_tlsext_host_name($ssl, 'example.org') == 1 or die;
+};
+plan(skip_all => 'Net::SSLeay with OpenSSL SNI support required') if $@;
+
+$t->plan(6);
+
+$t->write_file('openssl.conf', <<EOF);
+[ req ]
+default_bits = 2048
+encrypt_key = no
+distinguished_name = req_distinguished_name
+[ req_distinguished_name ]
+EOF
+
+my $d = $t->testdir();
+
+foreach my $name ('localhost') {
+	system('openssl req -x509 -new '
+		. "-config '$d/openssl.conf' -subj '/CN=$name/' "
+		. "-out '$d/$name.crt' -keyout '$d/$name.key' "
+		. ">>$d/openssl.out 2>&1") == 0
+		or die "Can't create certificate for $name: $!\n";
+}
+
+$t->write_file('ticket1.key', '1' x 48);
+$t->write_file('ticket2.key', '2' x 48);
+
+$t->run();
+
+###############################################################################
+
+my $ctx = IO::Socket::SSL::SSL_Context->new(
+	SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(),
+	SSL_session_cache_size => 100
+);
+
+# check that everything works fine with default server
+
+like(get('default', 8443, $ctx), qr!default:\.!, 'default server');
+like(get('default', 8443, $ctx), qr!default:r!, 'default server reused');
+
+TODO: {
+local $TODO = 'not yet' unless $t->has_version('1.9.6');
+
+# check that sessions are still properly saved and restored
+# when using an SNI-based virtual server with different session cache;
+# as session resumption happens before SNI, only default server
+# settings are expected to matter
+
+# this didn't work before nginx 1.9.6 (and caused segfaults if no session
+# cache was configured the SNI-based virtual server), because OpenSSL, when
+# creating new sessions, uses callbacks from the default server context, but
+# provides access to the SNI-selected server context only (ticket #235)
+
+like(get('nocache', 8443, $ctx), qr!nocache:\.!, 'without cache');
+like(get('nocache', 8443, $ctx), qr!nocache:r!, 'without cache reused');
+
+# make sure tickets can be used if an SNI-based virtual server
+# uses a different set of session ticket keys explicitly set
+
+like(get('tickets', 8444, $ctx), qr!tickets:\.!, 'tickets');
+like(get('tickets', 8444, $ctx), qr!tickets:r!, 'tickets reused');
+
+}
+
+###############################################################################
+
+sub get_ssl_socket {
+	my ($host, $port, $ctx) = @_;
+	my $s;
+
+	eval {
+		local $SIG{ALRM} = sub { die "timeout\n" };
+		local $SIG{PIPE} = sub { die "sigpipe\n" };
+		alarm(2);
+		$s = IO::Socket::SSL->new(
+			Proto => 'tcp',
+			PeerAddr => '127.0.0.1',
+			PeerPort => $port,
+			SSL_hostname => $host,
+			SSL_session_key => "$host:$port",
+			SSL_reuse_ctx => $ctx,
+			SSL_error_trap => sub { die $_[1] }
+		);
+		alarm(0);
+	};
+	alarm(0);
+
+	if ($@) {
+		log_in("died: $@");
+		return undef;
+	}
+
+	return $s;
+}
+
+sub get {
+	my ($host, $port, $ctx) = @_;
+
+	return http(<<EOF, socket => get_ssl_socket($host, $port, $ctx));
+GET / HTTP/1.0
+Host: $host
+
+EOF
+}
+
+###############################################################################