479 lines
14 KiB
JavaScript
479 lines
14 KiB
JavaScript
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
"use strict";
|
|
|
|
// Checks various aspects of the OCSP cache, mainly to to ensure we do not fetch
|
|
// responses more than necessary.
|
|
|
|
var gFetchCount = 0;
|
|
var gGoodOCSPResponse = null;
|
|
var gResponsePattern = [];
|
|
|
|
function respondWithGoodOCSP(request, response) {
|
|
info("returning 200 OK");
|
|
response.setStatusLine(request.httpVersion, 200, "OK");
|
|
response.setHeader("Content-Type", "application/ocsp-response");
|
|
response.write(gGoodOCSPResponse);
|
|
}
|
|
|
|
function respondWithSHA1OCSP(request, response) {
|
|
info("returning 200 OK with sha-1 delegated response");
|
|
response.setStatusLine(request.httpVersion, 200, "OK");
|
|
response.setHeader("Content-Type", "application/ocsp-response");
|
|
|
|
let args = [["good-delegated", "default-ee", "delegatedSHA1Signer", 0]];
|
|
let responses = generateOCSPResponses(args, "ocsp_certs");
|
|
response.write(responses[0]);
|
|
}
|
|
|
|
function respondWithError(request, response) {
|
|
info("returning 500 Internal Server Error");
|
|
response.setStatusLine(request.httpVersion, 500, "Internal Server Error");
|
|
let body = "Refusing to return a response";
|
|
response.bodyOutputStream.write(body, body.length);
|
|
}
|
|
|
|
function generateGoodOCSPResponse(thisUpdateSkew) {
|
|
let args = [["good", "default-ee", "unused", thisUpdateSkew]];
|
|
let responses = generateOCSPResponses(args, "ocsp_certs");
|
|
return responses[0];
|
|
}
|
|
|
|
function add_ocsp_test(
|
|
aHost,
|
|
aExpectedResult,
|
|
aResponses,
|
|
aMessage,
|
|
aOriginAttributes
|
|
) {
|
|
add_connection_test(
|
|
aHost,
|
|
aExpectedResult,
|
|
function () {
|
|
clearSessionCache();
|
|
gFetchCount = 0;
|
|
gResponsePattern = aResponses;
|
|
},
|
|
function () {
|
|
// check the number of requests matches the size of aResponses
|
|
equal(gFetchCount, aResponses.length, aMessage);
|
|
},
|
|
null,
|
|
aOriginAttributes
|
|
);
|
|
}
|
|
|
|
function run_test() {
|
|
do_get_profile();
|
|
Services.prefs.setBoolPref("security.ssl.enable_ocsp_stapling", true);
|
|
Services.prefs.setIntPref("security.OCSP.enabled", 1);
|
|
add_tls_server_setup("OCSPStaplingServer", "ocsp_certs");
|
|
|
|
let ocspResponder = new HttpServer();
|
|
ocspResponder.registerPrefixHandler("/", function (request, response) {
|
|
info("gFetchCount: " + gFetchCount);
|
|
let responseFunction = gResponsePattern[gFetchCount];
|
|
Assert.notEqual(undefined, responseFunction);
|
|
|
|
++gFetchCount;
|
|
responseFunction(request, response);
|
|
});
|
|
ocspResponder.start(8888);
|
|
|
|
add_tests();
|
|
|
|
add_test(function () {
|
|
ocspResponder.stop(run_next_test);
|
|
});
|
|
run_next_test();
|
|
}
|
|
|
|
function add_tests() {
|
|
// Test that verifying a certificate with a "short lifetime" doesn't result
|
|
// in OCSP fetching. Due to longevity requirements in our testing
|
|
// infrastructure, the certificate we encounter is valid for a very long
|
|
// time, so we have to define a "short lifetime" as something very long.
|
|
add_test(function () {
|
|
Services.prefs.setIntPref(
|
|
"security.pki.cert_short_lifetime_in_days",
|
|
12000
|
|
);
|
|
run_next_test();
|
|
});
|
|
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"expected zero OCSP requests for a short-lived certificate"
|
|
);
|
|
|
|
add_test(function () {
|
|
Services.prefs.setIntPref("security.pki.cert_short_lifetime_in_days", 100);
|
|
run_next_test();
|
|
});
|
|
|
|
// If a "short lifetime" is something more reasonable, ensure that we do OCSP
|
|
// fetching for this long-lived certificate.
|
|
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithError],
|
|
"expected one OCSP request for a long-lived certificate"
|
|
);
|
|
add_test(function () {
|
|
Services.prefs.clearUserPref("security.pki.cert_short_lifetime_in_days");
|
|
run_next_test();
|
|
});
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// This test assumes that OCSPStaplingServer uses the same cert for
|
|
// ocsp-stapling-unknown.example.com and ocsp-stapling-none.example.com.
|
|
|
|
// Get an Unknown response for the *.example.com cert and put it in the
|
|
// OCSP cache.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-unknown.example.com",
|
|
SEC_ERROR_OCSP_UNKNOWN_CERT,
|
|
[],
|
|
"Stapled Unknown response -> a fetch should not have been attempted"
|
|
);
|
|
|
|
// A failure to retrieve an OCSP response must result in the cached Unknown
|
|
// response being recognized and honored.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
SEC_ERROR_OCSP_UNKNOWN_CERT,
|
|
[respondWithError, respondWithError],
|
|
"No stapled response -> a fetch should have been attempted"
|
|
);
|
|
|
|
// A valid Good response from the OCSP responder must override the cached
|
|
// Unknown response.
|
|
//
|
|
// Note that We need to make sure that the Unknown response and the Good
|
|
// response have different thisUpdate timestamps; otherwise, the Good
|
|
// response will be seen as "not newer" and it won't replace the existing
|
|
// entry.
|
|
add_test(function () {
|
|
gGoodOCSPResponse = generateGoodOCSPResponse(1200);
|
|
run_next_test();
|
|
});
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"Cached Unknown response, no stapled response -> a fetch" +
|
|
" should have been attempted"
|
|
);
|
|
|
|
// The Good response retrieved from the previous fetch must have replaced
|
|
// the Unknown response in the cache, resulting in the catched Good response
|
|
// being returned and no fetch.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Cached Good response -> a fetch should not have been attempted"
|
|
);
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// A failure to retrieve an OCSP response will result in an error entry being
|
|
// added to the cache.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithError],
|
|
"No stapled response -> a fetch should have been attempted"
|
|
);
|
|
|
|
// The error entry will prevent a fetch from happening for a while.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure -> a fetch should not have been attempted"
|
|
);
|
|
|
|
// The error entry must not prevent a stapled OCSP response from being
|
|
// honored.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-revoked.example.com",
|
|
SEC_ERROR_REVOKED_CERTIFICATE,
|
|
[],
|
|
"Stapled Revoked response -> a fetch should not have been attempted"
|
|
);
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Ensure OCSP responses from signers with SHA1 certificates are OK. This
|
|
// is included in the OCSP caching tests since there were OCSP cache-related
|
|
// regressions when sha-1 telemetry probes were added.
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
// set security.OCSP.require so that checking the OCSP signature fails
|
|
Services.prefs.setBoolPref("security.OCSP.require", true);
|
|
run_next_test();
|
|
});
|
|
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
SEC_ERROR_OCSP_INVALID_SIGNING_CERT,
|
|
[respondWithSHA1OCSP],
|
|
"OCSP signing cert was issued with sha1 - should fail"
|
|
);
|
|
|
|
add_test(function () {
|
|
Services.prefs.setBoolPref("security.OCSP.require", false);
|
|
run_next_test();
|
|
});
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// This test makes sure that OCSP cache are isolated by firstPartyDomain.
|
|
|
|
let gObservedCnt = 0;
|
|
let protocolProxyService = Cc[
|
|
"@mozilla.org/network/protocol-proxy-service;1"
|
|
].getService(Ci.nsIProtocolProxyService);
|
|
|
|
// Observe all channels and make sure the firstPartyDomain in their loadInfo's
|
|
// origin attributes are aFirstPartyDomain.
|
|
function startObservingChannels(aFirstPartyDomain) {
|
|
// We use a dummy proxy filter to catch all channels, even those that do not
|
|
// generate an "http-on-modify-request" notification.
|
|
let proxyFilter = {
|
|
applyFilter(aChannel, aProxy, aCallback) {
|
|
// We have the channel; provide it to the callback.
|
|
if (aChannel.originalURI.spec == "http://localhost:8888/") {
|
|
gObservedCnt++;
|
|
equal(
|
|
aChannel.loadInfo.originAttributes.firstPartyDomain,
|
|
aFirstPartyDomain,
|
|
"firstPartyDomain should match"
|
|
);
|
|
}
|
|
// Pass on aProxy unmodified.
|
|
aCallback.onProxyFilterResult(aProxy);
|
|
},
|
|
};
|
|
protocolProxyService.registerChannelFilter(proxyFilter, 0);
|
|
// Return the stop() function:
|
|
return () => protocolProxyService.unregisterChannelFilter(proxyFilter);
|
|
}
|
|
|
|
let stopObservingChannels;
|
|
add_test(function () {
|
|
stopObservingChannels = startObservingChannels("foo.com");
|
|
run_next_test();
|
|
});
|
|
|
|
// A good OCSP response will be cached.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"No stapled response (firstPartyDomain = foo.com) -> a fetch " +
|
|
"should have been attempted",
|
|
{ firstPartyDomain: "foo.com" }
|
|
);
|
|
|
|
// The cache will prevent a fetch from happening.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure (firstPartyDomain = foo.com) -> a " +
|
|
"fetch should not have been attempted",
|
|
{ firstPartyDomain: "foo.com" }
|
|
);
|
|
|
|
add_test(function () {
|
|
stopObservingChannels();
|
|
equal(gObservedCnt, 1, "should have observed only 1 OCSP requests");
|
|
gObservedCnt = 0;
|
|
run_next_test();
|
|
});
|
|
|
|
add_test(function () {
|
|
stopObservingChannels = startObservingChannels("bar.com");
|
|
run_next_test();
|
|
});
|
|
|
|
// But using a different firstPartyDomain should result in a fetch.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"No stapled response (firstPartyDomain = bar.com) -> a fetch " +
|
|
"should have been attempted",
|
|
{ firstPartyDomain: "bar.com" }
|
|
);
|
|
|
|
add_test(function () {
|
|
stopObservingChannels();
|
|
equal(gObservedCnt, 1, "should have observed only 1 OCSP requests");
|
|
gObservedCnt = 0;
|
|
run_next_test();
|
|
});
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// Test that the OCSP cache is not isolated by userContextId.
|
|
|
|
// A good OCSP response will be cached.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"No stapled response (userContextId = 1) -> a fetch " +
|
|
"should have been attempted",
|
|
{ userContextId: 1 }
|
|
);
|
|
|
|
// The cache will prevent a fetch from happening.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure (userContextId = 1) -> a " +
|
|
"fetch should not have been attempted",
|
|
{ userContextId: 1 }
|
|
);
|
|
|
|
// Fetching is prevented even if in a different userContextId.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure (userContextId = 2) -> a " +
|
|
"fetch should not have been attempted",
|
|
{ userContextId: 2 }
|
|
);
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// This test makes sure that OCSP cache are isolated by partitionKey.
|
|
|
|
add_test(function () {
|
|
Services.prefs.setBoolPref(
|
|
"privacy.partition.network_state.ocsp_cache",
|
|
true
|
|
);
|
|
run_next_test();
|
|
});
|
|
|
|
// A good OCSP response will be cached.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"No stapled response (partitionKey = (https,foo.com)) -> a fetch " +
|
|
"should have been attempted",
|
|
{ partitionKey: "(https,foo.com)" }
|
|
);
|
|
|
|
// The cache will prevent a fetch from happening.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure (partitionKey = (https,foo.com)) -> a " +
|
|
"fetch should not have been attempted",
|
|
{ partitionKey: "(https,foo.com)" }
|
|
);
|
|
|
|
// Using a different partitionKey should result in a fetch.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"Noted OCSP server failure (partitionKey = (https,bar.com)) -> a " +
|
|
"fetch should have been attempted",
|
|
{ partitionKey: "(https,bar.com)" }
|
|
);
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
Services.prefs.clearUserPref("privacy.partition.network_state.ocsp_cache");
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
|
|
// This test makes sure that OCSP cache are isolated by partitionKey in
|
|
// private mode.
|
|
|
|
// A good OCSP response will be cached.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"No stapled response (partitionKey = (https,foo.com)) -> a fetch " +
|
|
"should have been attempted",
|
|
{ partitionKey: "(https,foo.com)", privateBrowsingId: 1 }
|
|
);
|
|
|
|
// The cache will prevent a fetch from happening.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[],
|
|
"Noted OCSP server failure (partitionKey = (https,foo.com)) -> a " +
|
|
"fetch should not have been attempted",
|
|
{ partitionKey: "(https,foo.com)", privateBrowsingId: 1 }
|
|
);
|
|
|
|
// Using a different partitionKey should result in a fetch.
|
|
add_ocsp_test(
|
|
"ocsp-stapling-none.example.com",
|
|
PRErrorCodeSuccess,
|
|
[respondWithGoodOCSP],
|
|
"Noted OCSP server failure (partitionKey = (https,bar.com)) -> a " +
|
|
"fetch should have been attempted",
|
|
{ partitionKey: "(https,bar.com)", privateBrowsingId: 1 }
|
|
);
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reset state
|
|
add_test(function () {
|
|
clearOCSPCache();
|
|
run_next_test();
|
|
});
|
|
}
|