summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-08-22 10:08:41 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-09-14 11:50:49 +0200
commitee1a44378f4b6439eeeb40c600ce4a27c11928fd (patch)
tree73642e9b33ba8638c22df9e307c5c535b5e6ac47
parent41e436db729e8001b5d47bbdc52a816822dddbc6 (diff)
downloadgnutls-ee1a44378f4b6439eeeb40c600ce4a27c11928fd.tar.gz
dtls: recover when a NewSessionTicket message is lost
When the server's NewSessionTicket gets lost while the ChangeCipherSpec goes through, the client did not request retransmission by retransmitting his last flight, and the handshake was blocked. This commit addresses the issue and adds a reproducer. Resolves #543 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--lib/ext/session_ticket.c22
-rw-r--r--tests/Makefile.am2
-rw-r--r--tests/dtls-session-ticket-lost.c247
3 files changed, 264 insertions, 7 deletions
diff --git a/lib/ext/session_ticket.c b/lib/ext/session_ticket.c
index 777bac155f..d2a15e5eb3 100644
--- a/lib/ext/session_ticket.c
+++ b/lib/ext/session_ticket.c
@@ -737,12 +737,22 @@ int _gnutls_recv_new_session_ticket(gnutls_session_t session)
/* This is the last flight and peer cannot be sure
* we have received it unless we notify him. So we
* wait for a message and retransmit if needed. */
- if (IS_DTLS(session) && !_dtls_is_async(session) &&
- (gnutls_record_check_pending(session) +
- record_check_unprocessed(session)) == 0) {
- ret = _dtls_wait_and_retransmit(session);
- if (ret < 0)
- return gnutls_assert_val(ret);
+ if (IS_DTLS(session) && !_dtls_is_async(session)) {
+ unsigned have;
+ mbuffer_st *bufel = NULL;
+
+ have = gnutls_record_check_pending(session) +
+ record_check_unprocessed(session);
+
+ if (have != 0) {
+ bufel = _mbuffer_head_get_first(&session->internals.record_buffer, NULL);
+ }
+
+ if (have == 0 || (bufel && bufel->type != GNUTLS_HANDSHAKE)) {
+ ret = _dtls_wait_and_retransmit(session);
+ if (ret < 0)
+ return gnutls_assert_val(ret);
+ }
}
ret = _gnutls_recv_handshake(session,
diff --git a/tests/Makefile.am b/tests/Makefile.am
index 295cfcd354..90e0fd71a1 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -184,7 +184,7 @@ ctests += mini-record-2 simple gnutls_hmac_fast set_pkcs12_cred cert certuniquei
set_x509_key_file_der set_x509_pkcs12_key crt_apis tls12-cert-key-exchange \
tls11-cert-key-exchange tls10-cert-key-exchange ssl30-cert-key-exchange \
dtls12-cert-key-exchange dtls10-cert-key-exchange x509-cert-callback-legacy \
- keylog-env ssl2-hello tlsfeature-ext dtls-rehandshake-cert-2 \
+ keylog-env ssl2-hello tlsfeature-ext dtls-rehandshake-cert-2 dtls-session-ticket-lost \
tlsfeature-crt dtls-rehandshake-cert-3 resume-with-false-start \
set_x509_key_file_ocsp client-fastopen rng-sigint srp rng-pthread \
safe-renegotiation/srn0 safe-renegotiation/srn1 safe-renegotiation/srn2 \
diff --git a/tests/dtls-session-ticket-lost.c b/tests/dtls-session-ticket-lost.c
new file mode 100644
index 0000000000..78629f716b
--- /dev/null
+++ b/tests/dtls-session-ticket-lost.c
@@ -0,0 +1,247 @@
+/*
+ * Copyright (C) 2018 Red Hat, Inc
+ *
+ * Author: Nikos Mavrogiannopoulos
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdio.h>
+#include <stdlib.h>
+
+#if defined(_WIN32)
+
+int main()
+{
+ exit(77);
+}
+
+#else
+
+#include <string.h>
+#include <sys/types.h>
+#include <netinet/in.h>
+#include <sys/socket.h>
+#include <sys/wait.h>
+#include <arpa/inet.h>
+#include <unistd.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/dtls.h>
+#include <signal.h>
+#include <assert.h>
+
+#include "cert-common.h"
+#include "utils.h"
+
+/* This program is a reproducer for issue #543; the timeout
+ * of DTLS handshake when a NewSessionTicket is lost.
+ */
+
+static void server_log_func(int level, const char *str)
+{
+ fprintf(stderr, "server|<%d>| %s", level, str);
+}
+
+static void client_log_func(int level, const char *str)
+{
+ fprintf(stderr, "client|<%d>| %s", level, str);
+}
+
+#define MAX_BUF 1024
+
+static void client(int fd, const char *prio)
+{
+ int ret;
+ gnutls_certificate_credentials_t x509_cred;
+ gnutls_session_t session;
+
+ if (debug) {
+ gnutls_global_set_log_function(client_log_func);
+ gnutls_global_set_log_level(6);
+ }
+
+ gnutls_certificate_allocate_credentials(&x509_cred);
+
+ assert(gnutls_init(&session, GNUTLS_CLIENT|GNUTLS_DATAGRAM)>=0);
+
+ assert(gnutls_priority_set_direct(session, prio, NULL)>=0);
+
+ gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
+
+ gnutls_transport_set_int(session, fd);
+
+ do {
+ ret = gnutls_handshake(session);
+ }
+ while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
+
+ if (ret < 0) {
+ fail("client: Handshake failed: %s\n", gnutls_strerror(ret));
+ } else {
+ if (debug)
+ success("client: Handshake was completed\n");
+ }
+
+ gnutls_record_set_timeout(session, 30*1000);
+
+ do {
+ ret = gnutls_bye(session, GNUTLS_SHUT_WR);
+ } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
+
+ close(fd);
+
+ gnutls_deinit(session);
+
+ gnutls_certificate_free_credentials(x509_cred);
+}
+
+
+static ssize_t
+server_push(gnutls_transport_ptr_t tr, const void *data, size_t len)
+{
+ const uint8_t *d = data;
+ static int dropped = 0;
+
+ if (d[13] == GNUTLS_HANDSHAKE_NEW_SESSION_TICKET) {
+ if (dropped == 0) {
+ success("dropping message: %s\n", gnutls_handshake_description_get_name(d[13]));
+ dropped = 1;
+ return len;
+ }
+ }
+
+ return send((long)tr, data, len, 0);
+}
+
+static void server(int fd, const char *prio)
+{
+ int ret;
+ char buffer[MAX_BUF + 1];
+ gnutls_session_t session;
+ gnutls_certificate_credentials_t x509_cred;
+ gnutls_datum_t skey;
+
+ memset(buffer, 0, sizeof(buffer));
+
+ if (debug) {
+ gnutls_global_set_log_function(server_log_func);
+ gnutls_global_set_log_level(6);
+ }
+
+ assert(gnutls_certificate_allocate_credentials(&x509_cred)>=0);
+ assert(gnutls_certificate_set_x509_key_mem(x509_cred, &server_cert,
+ &server_key,
+ GNUTLS_X509_FMT_PEM)>=0);
+
+ assert(gnutls_init(&session, GNUTLS_SERVER|GNUTLS_DATAGRAM)>=0);
+
+ assert(gnutls_session_ticket_key_generate(&skey)>=0);
+ assert(gnutls_session_ticket_enable_server(session, &skey) >= 0);
+
+ gnutls_transport_set_push_function(session, server_push);
+
+ assert(gnutls_priority_set_direct(session, prio, NULL)>=0);
+
+ gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred);
+
+ gnutls_transport_set_int(session, fd);
+
+ do {
+ ret = gnutls_handshake(session);
+ } while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
+ if (ret < 0) {
+ /* failure is expected here */
+ goto end;
+ }
+
+ if (debug) {
+ success("server: Handshake was completed\n");
+ }
+
+ gnutls_record_set_timeout(session, 30*1000);
+
+ success("waiting for EOF\n");
+ do {
+ ret = gnutls_record_recv(session, buffer, sizeof(buffer));
+ } while(ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
+ if (ret != 0)
+ fail("error waiting for EOF: %s\n", gnutls_strerror(ret));
+
+ end:
+ close(fd);
+ gnutls_deinit(session);
+ gnutls_free(skey.data);
+
+ gnutls_certificate_free_credentials(x509_cred);
+
+ if (debug)
+ success("server: finished\n");
+}
+
+static void ch_handler(int sig)
+{
+ return;
+}
+
+static
+void start(const char *prio)
+{
+ int fd[2];
+ int ret, status = 0;
+ pid_t child;
+
+ success("trying %s\n", prio);
+ signal(SIGCHLD, ch_handler);
+ signal(SIGPIPE, SIG_IGN);
+
+ ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
+ if (ret < 0) {
+ perror("socketpair");
+ exit(1);
+ }
+
+ child = fork();
+ if (child < 0) {
+ perror("fork");
+ fail("fork");
+ exit(1);
+ }
+
+ if (child) {
+ /* parent */
+ close(fd[1]);
+ client(fd[0], prio);
+ waitpid(child, &status, 0);
+ check_wait_status(status);
+ } else {
+ close(fd[0]);
+ server(fd[1], prio);
+ exit(0);
+ }
+
+ return;
+}
+
+void doit(void)
+{
+ start("NORMAL:-VERS-ALL:+VERS-DTLS1.2");
+}
+
+#endif /* _WIN32 */