security_SUITE.erl 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. %% Copyright (c) 2018, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. -module(security_SUITE).
  15. -compile(export_all).
  16. -compile(nowarn_export_all).
  17. -import(ct_helper, [config/2]).
  18. -import(ct_helper, [doc/1]).
  19. -import(cowboy_test, [gun_open/1]).
  20. -import(cowboy_test, [raw_open/1]).
  21. -import(cowboy_test, [raw_send/2]).
  22. -import(cowboy_test, [raw_recv_head/1]).
  23. -import(cowboy_test, [raw_recv/3]).
  24. %% ct.
  25. all() ->
  26. cowboy_test:common_all().
  27. groups() ->
  28. Tests = [nc_rand, nc_zero],
  29. H1Tests = [slowloris, slowloris_chunks],
  30. H2CTests = [
  31. http2_data_dribble,
  32. http2_empty_frame_flooding_data,
  33. http2_empty_frame_flooding_headers_continuation,
  34. http2_empty_frame_flooding_push_promise,
  35. http2_ping_flood,
  36. http2_reset_flood,
  37. http2_settings_flood,
  38. http2_zero_length_header_leak
  39. ],
  40. [
  41. {http, [parallel], Tests ++ H1Tests},
  42. {https, [parallel], Tests ++ H1Tests},
  43. {h2, [parallel], Tests},
  44. {h2c, [parallel], Tests ++ H2CTests},
  45. {http_compress, [parallel], Tests ++ H1Tests},
  46. {https_compress, [parallel], Tests ++ H1Tests},
  47. {h2_compress, [parallel], Tests},
  48. {h2c_compress, [parallel], Tests ++ H2CTests}
  49. ].
  50. init_per_suite(Config) ->
  51. ct_helper:create_static_dir(config(priv_dir, Config) ++ "/static"),
  52. Config.
  53. end_per_suite(Config) ->
  54. ct_helper:delete_static_dir(config(priv_dir, Config) ++ "/static").
  55. init_per_group(Name, Config) ->
  56. cowboy_test:init_common_groups(Name, Config, ?MODULE).
  57. end_per_group(Name, _) ->
  58. cowboy:stop_listener(Name).
  59. %% Routes.
  60. init_dispatch(_) ->
  61. cowboy_router:compile([{"localhost", [
  62. {"/", hello_h, []},
  63. {"/echo/:key", echo_h, []},
  64. {"/long_polling", long_polling_h, []},
  65. {"/resp/:key[/:arg]", resp_h, []}
  66. ]}]).
  67. %% Tests.
  68. http2_data_dribble(Config) ->
  69. doc("Request a very large response then update the window 1 byte at a time. (CVE-2019-9511)"),
  70. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  71. %% Send a GET request for a very large response.
  72. {HeadersBlock, _} = cow_hpack:encode([
  73. {<<":method">>, <<"GET">>},
  74. {<<":scheme">>, <<"http">>},
  75. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  76. {<<":path">>, <<"/resp/stream_body/loop">>}
  77. ]),
  78. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  79. %% Receive a response with a few DATA frames draining the window.
  80. {ok, <<SkipLen:24, 1:8, _:8, 1:32>>} = gen_tcp:recv(Socket, 9, 1000),
  81. {ok, _} = gen_tcp:recv(Socket, SkipLen, 1000),
  82. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  83. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  84. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  85. {ok, <<16383:24, 0:8, 0:8, 1:32, _:16383/unit:8>>} = gen_tcp:recv(Socket, 9 + 16383, 1000),
  86. %% Send WINDOW_UPDATE frames with a value of 1. The server should
  87. %% not attempt to send data until the window is over a configurable threshold.
  88. ok = gen_tcp:send(Socket, [
  89. cow_http2:window_update(1),
  90. cow_http2:window_update(1, 1)
  91. ]),
  92. {error, timeout} = gen_tcp:recv(Socket, 0, 1000),
  93. ok.
  94. http2_empty_frame_flooding_data(Config) ->
  95. doc("Confirm that Cowboy detects empty DATA frame flooding. (CVE-2019-9518)"),
  96. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  97. %% Send a POST request followed by many empty DATA frames.
  98. {HeadersBlock, _} = cow_hpack:encode([
  99. {<<":method">>, <<"POST">>},
  100. {<<":scheme">>, <<"http">>},
  101. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  102. {<<":path">>, <<"/echo/read_body">>}
  103. ]),
  104. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  105. _ = [gen_tcp:send(Socket, cow_http2:data(1, nofin, <<>>)) || _ <- lists:seq(1, 20000)],
  106. %% When Cowboy detects a flood it must close the connection.
  107. %% We skip WINDOW_UPDATE frames sent when Cowboy starts to read the body.
  108. case gen_tcp:recv(Socket, 43, 6000) of
  109. {ok, <<_:26/unit:8, _:24, 7:8, _:72, 11:32>>} ->
  110. ok;
  111. %% We also accept the connection being closed immediately,
  112. %% which may happen because we send the GOAWAY right before closing.
  113. {error, closed} ->
  114. ok
  115. end.
  116. http2_empty_frame_flooding_headers_continuation(Config) ->
  117. doc("Confirm that Cowboy detects empty HEADERS/CONTINUATION frame flooding. (CVE-2019-9518)"),
  118. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  119. %% Send many empty HEADERS/CONTINUATION frames before the headers.
  120. ok = gen_tcp:send(Socket, <<0:24, 1:8, 0:9, 1:31>>),
  121. _ = [gen_tcp:send(Socket, <<0:24, 9:8, 0:9, 1:31>>) || _ <- lists:seq(1, 20000)],
  122. {HeadersBlock, _} = cow_hpack:encode([
  123. {<<":method">>, <<"POST">>},
  124. {<<":scheme">>, <<"http">>},
  125. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  126. {<<":path">>, <<"/">>}
  127. ]),
  128. Len = iolist_size(HeadersBlock),
  129. _ = gen_tcp:send(Socket, [<<Len:24, 9:8, 0:5, 1:1, 0:1, 1:1, 0:1, 1:31>>, HeadersBlock]),
  130. %% When Cowboy detects a flood it must close the connection.
  131. case gen_tcp:recv(Socket, 17, 6000) of
  132. {ok, <<_:24, 7:8, _:72, 11:32>>} ->
  133. ok;
  134. %% We also accept the connection being closed immediately,
  135. %% which may happen because we send the GOAWAY right before closing.
  136. {error, closed} ->
  137. ok
  138. end.
  139. http2_empty_frame_flooding_push_promise(Config) ->
  140. doc("Confirm that Cowboy detects empty PUSH_PROMISE frame flooding. (CVE-2019-9518)"),
  141. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  142. %% Send a HEADERS frame to which we will attach a PUSH_PROMISE.
  143. %% We use nofin in order to keep the stream alive.
  144. {HeadersBlock, _} = cow_hpack:encode([
  145. {<<":method">>, <<"GET">>},
  146. {<<":scheme">>, <<"http">>},
  147. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  148. {<<":path">>, <<"/long_polling">>}
  149. ]),
  150. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  151. %% Send nofin PUSH_PROMISE frame without any data.
  152. ok = gen_tcp:send(Socket, <<4:24, 5:8, 0:8, 0:1, 1:31, 0:1, 3:31>>),
  153. %% Receive a PROTOCOL_ERROR connection error.
  154. %%
  155. %% Cowboy rejects all PUSH_PROMISE frames therefore no flooding
  156. %% can take place.
  157. {ok, <<_:24, 7:8, _:72, 1:32>>} = gen_tcp:recv(Socket, 17, 6000),
  158. ok.
  159. %% @todo http2_internal_data_buffering(Config) -> I do not know how to test this.
  160. % doc("Request many very large responses, with a larger than necessary window size, "
  161. % "but do not attempt to read from the socket. (CVE-2019-9517)"),
  162. http2_ping_flood(Config) ->
  163. doc("Confirm that Cowboy detects PING floods. (CVE-2019-9512)"),
  164. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  165. %% Flood the server with PING frames.
  166. _ = [gen_tcp:send(Socket, cow_http2:ping(0)) || _ <- lists:seq(1, 20000)],
  167. %% Receive a number of PING ACK frames in return, following by the closing of the connection.
  168. try
  169. [case gen_tcp:recv(Socket, 17, 6000) of
  170. {ok, <<8:24, 6:8, _:7, 1:1, _:32, 0:64>>} -> ok;
  171. {ok, <<_:24, 7:8, _:72, 11:32>>} -> throw(goaway);
  172. %% We also accept the connection being closed immediately,
  173. %% which may happen because we send the GOAWAY right before closing.
  174. {error, closed} -> throw(goaway)
  175. end || _ <- lists:seq(1, 20000)],
  176. error(flood_successful)
  177. catch throw:goaway ->
  178. ok
  179. end.
  180. http2_reset_flood(Config) ->
  181. doc("Confirm that Cowboy detects reset floods. (CVE-2019-9514)"),
  182. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  183. %% Flood the server with HEADERS frames without a :method pseudo-header.
  184. {HeadersBlock, _} = cow_hpack:encode([
  185. {<<":scheme">>, <<"http">>},
  186. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  187. {<<":path">>, <<"/">>}
  188. ]),
  189. _ = [gen_tcp:send(Socket, cow_http2:headers(ID, fin, HeadersBlock)) || ID <- lists:seq(1, 100, 2)],
  190. %% Receive a number of RST_STREAM frames in return, following by the closing of the connection.
  191. try
  192. [case gen_tcp:recv(Socket, 13, 6000) of
  193. {ok, <<_:24, 3:8, _:8, ID:32, 1:32>>} -> ok;
  194. {ok, <<_:24, 7:8, _:72>>} ->
  195. {ok, <<11:32>>} = gen_tcp:recv(Socket, 4, 1000),
  196. throw(goaway);
  197. %% We also accept the connection being closed immediately,
  198. %% which may happen because we send the GOAWAY right before closing.
  199. {error, closed} ->
  200. throw(goaway)
  201. end || ID <- lists:seq(1, 100, 2)],
  202. error(flood_successful)
  203. catch throw:goaway ->
  204. ok
  205. end.
  206. %% @todo If we ever implement the PRIORITY mechanism, this test should
  207. %% be implemented as well. CVE-2019-9513 https://www.kb.cert.org/vuls/id/605641/
  208. %% http2_resource_loop
  209. http2_settings_flood(Config) ->
  210. doc("Confirm that Cowboy detects SETTINGS floods. (CVE-2019-9515)"),
  211. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  212. %% Flood the server with empty SETTINGS frames.
  213. _ = [gen_tcp:send(Socket, cow_http2:settings(#{})) || _ <- lists:seq(1, 20000)],
  214. %% Receive a number of SETTINGS ACK frames in return, following by the closing of the connection.
  215. try
  216. [case gen_tcp:recv(Socket, 9, 6000) of
  217. {ok, <<0:24, 4:8, 0:7, 1:1, 0:32>>} -> ok;
  218. {ok, <<_:24, 7:8, _:40>>} ->
  219. {ok, <<_:32, 11:32>>} = gen_tcp:recv(Socket, 8, 1000),
  220. throw(goaway);
  221. %% We also accept the connection being closed immediately,
  222. %% which may happen because we send the GOAWAY right before closing.
  223. {error, closed} ->
  224. throw(goaway)
  225. end || _ <- lists:seq(1, 20000)],
  226. error(flood_successful)
  227. catch throw:goaway ->
  228. ok
  229. end.
  230. http2_zero_length_header_leak(Config) ->
  231. doc("Confirm that Cowboy rejects HEADERS frame with a 0-length header name. (CVE-2019-9516)"),
  232. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  233. %% Send a GET request with a 0-length header name.
  234. {HeadersBlock, _} = cow_hpack:encode([
  235. {<<":method">>, <<"GET">>},
  236. {<<":scheme">>, <<"http">>},
  237. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  238. {<<":path">>, <<"/">>},
  239. {<<>>, <<"CVE-2019-9516">>}
  240. ]),
  241. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  242. %% Receive a PROTOCOL_ERROR stream error.
  243. {ok, <<_:24, 3:8, _:8, 1:32, 1:32>>} = gen_tcp:recv(Socket, 13, 6000),
  244. ok.
  245. nc_rand(Config) ->
  246. doc("Throw random garbage at the server, then check if it's still up."),
  247. do_nc(Config, "/dev/urandom").
  248. nc_zero(Config) ->
  249. doc("Throw zeroes at the server, then check if it's still up."),
  250. do_nc(Config, "/dev/zero").
  251. do_nc(Config, Input) ->
  252. Cat = os:find_executable("cat"),
  253. Nc = os:find_executable("nc"),
  254. case {Cat, Nc} of
  255. {false, _} ->
  256. {skip, "The cat executable was not found."};
  257. {_, false} ->
  258. {skip, "The nc executable was not found."};
  259. _ ->
  260. StrPort = integer_to_list(config(port, Config)),
  261. _ = [
  262. os:cmd("cat " ++ Input ++ " | nc localhost " ++ StrPort)
  263. || _ <- lists:seq(1, 100)],
  264. ConnPid = gun_open(Config),
  265. Ref = gun:get(ConnPid, "/"),
  266. {response, _, 200, _} = gun:await(ConnPid, Ref),
  267. ok
  268. end.
  269. slowloris(Config) ->
  270. doc("Send request headers one byte at a time. "
  271. "Confirm that the connection gets closed."),
  272. Client = raw_open(Config),
  273. try
  274. [begin
  275. ok = raw_send(Client, [C]),
  276. timer:sleep(250)
  277. end || C <- "GET / HTTP/1.1\r\nHost: localhost\r\n"
  278. "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US)\r\n"
  279. "Cookie: name=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\r\n\r\n"],
  280. error(failure)
  281. catch error:{badmatch, _} ->
  282. ok
  283. end.
  284. slowloris_chunks(Config) ->
  285. doc("Send request headers one line at a time. "
  286. "Confirm that the connection gets closed."),
  287. Client = raw_open(Config),
  288. ok = raw_send(Client, "GET / HTTP/1.1\r\n"),
  289. timer:sleep(300),
  290. ok = raw_send(Client, "Host: localhost\r\n"),
  291. timer:sleep(300),
  292. Data = raw_recv_head(Client),
  293. {'HTTP/1.1', 408, _, Rest} = cow_http:parse_status_line(Data),
  294. {Headers, _} = cow_http:parse_headers(Rest),
  295. {_, <<"close">>} = lists:keyfind(<<"connection">>, 1, Headers),
  296. {error, closed} = raw_recv(Client, 0, 1000).