mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: enforce ALPN overlap when negotiated on both sides
During the TLS handshake if the server doesn't support any of the application protocols requested by the client, send the no_application_protocol alert and abort the handshake on the server side. This enforces the requirements of RFC 7301. Change-Id: Iced2bb5c6efc607497de1c40ee3de9c2b393fa5d Reviewed-on: https://go-review.googlesource.com/c/go/+/289209 Trust: Roland Shoemaker <roland@golang.org> Trust: Katie Hockman <katie@golang.org> Run-TryBot: Roland Shoemaker <roland@golang.org> TryBot-Result: Go Bot <gobot@golang.org> Reviewed-by: Filippo Valsorda <filippo@golang.org>
This commit is contained in:
parent
9c1e414b7a
commit
7d3285645e
9 changed files with 295 additions and 179 deletions
|
@ -1224,6 +1224,56 @@ func TestHandshakeClientALPNMatch(t *testing.T) {
|
|||
runClientTestTLS13(t, test)
|
||||
}
|
||||
|
||||
func TestServerSelectingUnconfiguredApplicationProtocol(t *testing.T) {
|
||||
// This checks that the server can't select an application protocol that the
|
||||
// client didn't offer.
|
||||
|
||||
c, s := localPipe(t)
|
||||
errChan := make(chan error, 1)
|
||||
|
||||
go func() {
|
||||
client := Client(c, &Config{
|
||||
ServerName: "foo",
|
||||
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
||||
NextProtos: []string{"http", "something-else"},
|
||||
})
|
||||
errChan <- client.Handshake()
|
||||
}()
|
||||
|
||||
var header [5]byte
|
||||
if _, err := io.ReadFull(s, header[:]); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
recordLen := int(header[3])<<8 | int(header[4])
|
||||
|
||||
record := make([]byte, recordLen)
|
||||
if _, err := io.ReadFull(s, record); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
serverHello := &serverHelloMsg{
|
||||
vers: VersionTLS12,
|
||||
random: make([]byte, 32),
|
||||
cipherSuite: TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||
alpnProtocol: "how-about-this",
|
||||
}
|
||||
serverHelloBytes := serverHello.marshal()
|
||||
|
||||
s.Write([]byte{
|
||||
byte(recordTypeHandshake),
|
||||
byte(VersionTLS12 >> 8),
|
||||
byte(VersionTLS12 & 0xff),
|
||||
byte(len(serverHelloBytes) >> 8),
|
||||
byte(len(serverHelloBytes)),
|
||||
})
|
||||
s.Write(serverHelloBytes)
|
||||
s.Close()
|
||||
|
||||
if err := <-errChan; !strings.Contains(err.Error(), "server selected unadvertised ALPN protocol") {
|
||||
t.Fatalf("Expected error about unconfigured cipher suite but got %q", err)
|
||||
}
|
||||
}
|
||||
|
||||
// sctsBase64 contains data from `openssl s_client -serverinfo 18 -connect ritter.vg:443`
|
||||
const sctsBase64 = "ABIBaQFnAHUApLkJkLQYWBSHuxOizGdwCjw1mAT5G9+443fNDsgN3BAAAAFHl5nuFgAABAMARjBEAiAcS4JdlW5nW9sElUv2zvQyPoZ6ejKrGGB03gjaBZFMLwIgc1Qbbn+hsH0RvObzhS+XZhr3iuQQJY8S9G85D9KeGPAAdgBo9pj4H2SCvjqM7rkoHUz8cVFdZ5PURNEKZ6y7T0/7xAAAAUeX4bVwAAAEAwBHMEUCIDIhFDgG2HIuADBkGuLobU5a4dlCHoJLliWJ1SYT05z6AiEAjxIoZFFPRNWMGGIjskOTMwXzQ1Wh2e7NxXE1kd1J0QsAdgDuS723dc5guuFCaR+r4Z5mow9+X7By2IMAxHuJeqj9ywAAAUhcZIqHAAAEAwBHMEUCICmJ1rBT09LpkbzxtUC+Hi7nXLR0J+2PmwLp+sJMuqK+AiEAr0NkUnEVKVhAkccIFpYDqHOlZaBsuEhWWrYpg2RtKp0="
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue