270 lines
7.3 KiB
JavaScript
270 lines
7.3 KiB
JavaScript
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
|
|
// Any copyright is dedicated to the Public Domain.
|
|
// http://creativecommons.org/publicdomain/zero/1.0/
|
|
|
|
"use strict";
|
|
|
|
// Allow telemetry probes which may otherwise be disabled for some
|
|
// applications (e.g. Thunderbird).
|
|
Services.prefs.setBoolPref(
|
|
"toolkit.telemetry.testing.overrideProductsCheck",
|
|
true
|
|
);
|
|
|
|
// Get a profile directory and ensure PSM initializes NSS.
|
|
do_get_profile();
|
|
Cc["@mozilla.org/psm;1"].getService(Ci.nsISupports);
|
|
|
|
class InputStreamCallback {
|
|
constructor(output) {
|
|
this.output = output;
|
|
this.stopped = false;
|
|
}
|
|
|
|
onInputStreamReady(stream) {
|
|
info("input stream ready");
|
|
if (this.stopped) {
|
|
info("input stream callback stopped - bailing");
|
|
return;
|
|
}
|
|
let available = 0;
|
|
try {
|
|
available = stream.available();
|
|
} catch (e) {
|
|
// onInputStreamReady may fire when the stream has been closed.
|
|
equal(
|
|
e.result,
|
|
Cr.NS_BASE_STREAM_CLOSED,
|
|
"error should be NS_BASE_STREAM_CLOSED"
|
|
);
|
|
}
|
|
if (available > 0) {
|
|
let request = NetUtil.readInputStreamToString(stream, available, {
|
|
charset: "utf8",
|
|
});
|
|
ok(
|
|
request.startsWith("GET / HTTP/1.1\r\n"),
|
|
"Should get a simple GET / HTTP/1.1 request"
|
|
);
|
|
let response =
|
|
"HTTP/1.1 200 OK\r\n" +
|
|
"Content-Length: 2\r\n" +
|
|
"Content-Type: text/plain\r\n" +
|
|
"\r\nOK";
|
|
let written = this.output.write(response, response.length);
|
|
equal(
|
|
written,
|
|
response.length,
|
|
"should have been able to write entire response"
|
|
);
|
|
}
|
|
this.output.close();
|
|
info("done with input stream ready");
|
|
}
|
|
|
|
stop() {
|
|
this.stopped = true;
|
|
this.output.close();
|
|
}
|
|
}
|
|
|
|
class TLSServerSecurityObserver {
|
|
constructor(input, output) {
|
|
this.input = input;
|
|
this.output = output;
|
|
this.callbacks = [];
|
|
this.stopped = false;
|
|
}
|
|
|
|
onHandshakeDone(socket, status) {
|
|
info("TLS handshake done");
|
|
info(`TLS version used: ${status.tlsVersionUsed}`);
|
|
|
|
if (this.stopped) {
|
|
info("handshake done callback stopped - bailing");
|
|
return;
|
|
}
|
|
|
|
let callback = new InputStreamCallback(this.output);
|
|
this.callbacks.push(callback);
|
|
this.input.asyncWait(callback, 0, 0, Services.tm.currentThread);
|
|
}
|
|
|
|
stop() {
|
|
this.stopped = true;
|
|
this.input.close();
|
|
this.output.close();
|
|
this.callbacks.forEach(callback => {
|
|
callback.stop();
|
|
});
|
|
}
|
|
}
|
|
|
|
class ServerSocketListener {
|
|
constructor() {
|
|
this.securityObservers = [];
|
|
}
|
|
|
|
onSocketAccepted(socket, transport) {
|
|
info("accepted TLS client connection");
|
|
let connectionInfo = transport.securityCallbacks.getInterface(
|
|
Ci.nsITLSServerConnectionInfo
|
|
);
|
|
let input = transport.openInputStream(0, 0, 0);
|
|
let output = transport.openOutputStream(0, 0, 0);
|
|
let securityObserver = new TLSServerSecurityObserver(input, output);
|
|
this.securityObservers.push(securityObserver);
|
|
connectionInfo.setSecurityObserver(securityObserver);
|
|
}
|
|
|
|
// For some reason we get input stream callback events after we've stopped
|
|
// listening, so this ensures we just drop those events.
|
|
onStopListening() {
|
|
info("onStopListening");
|
|
this.securityObservers.forEach(observer => {
|
|
observer.stop();
|
|
});
|
|
}
|
|
}
|
|
|
|
function startServer(
|
|
minServerVersion = Ci.nsITLSClientStatus.TLS_VERSION_1_2,
|
|
maxServerVersion = Ci.nsITLSClientStatus.TLS_VERSION_1_3
|
|
) {
|
|
let tlsServer = Cc["@mozilla.org/network/tls-server-socket;1"].createInstance(
|
|
Ci.nsITLSServerSocket
|
|
);
|
|
tlsServer.init(-1, true, -1);
|
|
tlsServer.serverCert = getTestServerCertificate();
|
|
tlsServer.setVersionRange(minServerVersion, maxServerVersion);
|
|
tlsServer.setSessionTickets(false);
|
|
tlsServer.asyncListen(new ServerSocketListener());
|
|
storeCertOverride(tlsServer.port, tlsServer.serverCert);
|
|
return tlsServer;
|
|
}
|
|
|
|
const hostname = "example.com";
|
|
|
|
function storeCertOverride(port, cert) {
|
|
let certOverrideService = Cc[
|
|
"@mozilla.org/security/certoverride;1"
|
|
].getService(Ci.nsICertOverrideService);
|
|
certOverrideService.rememberValidityOverride(hostname, port, {}, cert, true);
|
|
}
|
|
|
|
function startClient(port, useGREASE, beConservative) {
|
|
HandshakeTelemetryHelpers.resetHistograms();
|
|
let flavors = ["", "_FIRST_TRY"];
|
|
let nonflavors = ["_ECH"];
|
|
|
|
if (useGREASE) {
|
|
Services.prefs.setIntPref("security.tls.ech.grease_probability", 100);
|
|
} else {
|
|
Services.prefs.setIntPref("security.tls.ech.grease_probability", 0);
|
|
}
|
|
|
|
let req = new XMLHttpRequest();
|
|
req.open("GET", `https://${hostname}:${port}`);
|
|
|
|
if (beConservative) {
|
|
// We don't have a way to set DONT_TRY_ECH at the moment.
|
|
let internalChannel = req.channel.QueryInterface(Ci.nsIHttpChannelInternal);
|
|
internalChannel.beConservative = beConservative;
|
|
flavors.push("_CONSERVATIVE");
|
|
} else {
|
|
nonflavors.push("_CONSERVATIVE");
|
|
}
|
|
|
|
//GREASE is only used if enabled and not in conservative mode.
|
|
if (useGREASE && !beConservative) {
|
|
flavors.push("_ECH_GREASE");
|
|
} else {
|
|
nonflavors.push("_ECH_GREASE");
|
|
}
|
|
|
|
return new Promise(resolve => {
|
|
req.onload = () => {
|
|
equal(req.responseText, "OK", "response text should be 'OK'");
|
|
|
|
// Only check telemetry if network process is disabled.
|
|
if (!mozinfo.socketprocess_networking) {
|
|
HandshakeTelemetryHelpers.checkSuccess(flavors);
|
|
HandshakeTelemetryHelpers.checkEmpty(nonflavors);
|
|
}
|
|
|
|
resolve();
|
|
};
|
|
req.onerror = () => {
|
|
ok(false, `should not have gotten an error`);
|
|
resolve();
|
|
};
|
|
|
|
req.send();
|
|
});
|
|
}
|
|
|
|
function setup() {
|
|
Services.prefs.setIntPref("security.tls.version.max", 4);
|
|
Services.prefs.setCharPref("network.dns.localDomains", hostname);
|
|
Services.prefs.setIntPref("network.http.speculative-parallel-limit", 0);
|
|
}
|
|
setup();
|
|
|
|
add_task(async function GreaseYConservativeN() {
|
|
// First run a server that accepts TLS 1.2 and 1.3. A conservative client
|
|
// should succeed in connecting.
|
|
let server = startServer();
|
|
|
|
await startClient(
|
|
server.port,
|
|
true /*be conservative*/,
|
|
false /*should succeed*/
|
|
);
|
|
server.close();
|
|
});
|
|
|
|
add_task(async function GreaseNConservativeY() {
|
|
// First run a server that accepts TLS 1.2 and 1.3. A conservative client
|
|
// should succeed in connecting.
|
|
let server = startServer();
|
|
|
|
await startClient(
|
|
server.port,
|
|
false /*be conservative*/,
|
|
true /*should succeed*/
|
|
);
|
|
server.close();
|
|
});
|
|
|
|
add_task(async function GreaseYConservativeY() {
|
|
// First run a server that accepts TLS 1.2 and 1.3. A conservative client
|
|
// should succeed in connecting.
|
|
let server = startServer();
|
|
|
|
await startClient(
|
|
server.port,
|
|
true /*be conservative*/,
|
|
true /*should succeed*/
|
|
);
|
|
server.close();
|
|
});
|
|
|
|
add_task(async function GreaseNConservativeN() {
|
|
// First run a server that accepts TLS 1.2 and 1.3. A conservative client
|
|
// should succeed in connecting.
|
|
let server = startServer();
|
|
|
|
await startClient(
|
|
server.port,
|
|
false /*be conservative*/,
|
|
false /*should succeed*/
|
|
);
|
|
server.close();
|
|
});
|
|
|
|
registerCleanupFunction(function () {
|
|
Services.prefs.clearUserPref("security.tls.version.max");
|
|
Services.prefs.clearUserPref("network.dns.localDomains");
|
|
Services.prefs.clearUserPref("security.tls.ech.grease_probability");
|
|
Services.prefs.clearUserPref("network.http.speculative-parallel-limit");
|
|
});
|