| // Copyright Joyent, Inc. and other Node contributors. |
| // |
| // Permission is hereby granted, free of charge, to any person obtaining a |
| // copy of this software and associated documentation files (the |
| // "Software"), to deal in the Software without restriction, including |
| // without limitation the rights to use, copy, modify, merge, publish, |
| // distribute, sublicense, and/or sell copies of the Software, and to permit |
| // persons to whom the Software is furnished to do so, subject to the |
| // following conditions: |
| // |
| // The above copyright notice and this permission notice shall be included |
| // in all copies or substantial portions of the Software. |
| // |
| // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
| // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
| // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN |
| // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, |
| // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR |
| // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE |
| // USE OR OTHER DEALINGS IN THE SOFTWARE. |
| |
| 'use strict'; |
| const common = require('../common'); |
| if (!common.hasCrypto) |
| common.skip('missing crypto'); |
| |
| if (!common.opensslCli) |
| common.skip('node compiled without OpenSSL CLI.'); |
| |
| const assert = require('assert'); |
| const tls = require('tls'); |
| const https = require('https'); |
| const fixtures = require('../common/fixtures'); |
| |
| // Renegotiation as a protocol feature was dropped after TLS1.2. |
| tls.DEFAULT_MAX_VERSION = 'TLSv1.2'; |
| |
| // Renegotiation limits to test |
| const LIMITS = [0, 1, 2, 3, 5, 10, 16]; |
| |
| { |
| let n = 0; |
| function next() { |
| if (n >= LIMITS.length) return; |
| tls.CLIENT_RENEG_LIMIT = LIMITS[n++]; |
| test(next); |
| } |
| next(); |
| } |
| |
| function test(next) { |
| const options = { |
| cert: fixtures.readKey('rsa_cert.crt'), |
| key: fixtures.readKey('rsa_private.pem'), |
| }; |
| |
| const server = https.createServer(options, (req, res) => { |
| const conn = req.connection; |
| conn.on('error', (err) => { |
| console.error(`Caught exception: ${err}`); |
| assert.match(err.message, /TLS session renegotiation attack/); |
| conn.destroy(); |
| }); |
| res.end('ok'); |
| }); |
| |
| server.listen(0, () => { |
| const agent = https.Agent({ |
| keepAlive: true, |
| }); |
| |
| let client; |
| let renegs = 0; |
| |
| const options = { |
| rejectUnauthorized: false, |
| agent, |
| }; |
| |
| const { port } = server.address(); |
| |
| https.get(`https://localhost:${port}/`, options, (res) => { |
| client = res.socket; |
| |
| client.on('close', (hadErr) => { |
| assert.strictEqual(hadErr, false); |
| assert.strictEqual(renegs, tls.CLIENT_RENEG_LIMIT + 1); |
| server.close(); |
| process.nextTick(next); |
| }); |
| |
| client.on('error', (err) => { |
| console.log('CLIENT ERR', err); |
| throw err; |
| }); |
| |
| spam(); |
| |
| // Simulate renegotiation attack |
| function spam() { |
| client.renegotiate({}, (err) => { |
| assert.ifError(err); |
| assert.ok(renegs <= tls.CLIENT_RENEG_LIMIT); |
| setImmediate(spam); |
| }); |
| renegs++; |
| } |
| }); |
| |
| }); |
| } |