security_SUITE.erl 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. %% Copyright (c) 2018, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. -module(security_SUITE).
  15. -compile(export_all).
  16. -compile(nowarn_export_all).
  17. -import(ct_helper, [config/2]).
  18. -import(ct_helper, [doc/1]).
  19. -import(cowboy_test, [gun_open/1]).
  20. -import(cowboy_test, [raw_open/1]).
  21. -import(cowboy_test, [raw_send/2]).
  22. -import(cowboy_test, [raw_recv_head/1]).
  23. -import(cowboy_test, [raw_recv/3]).
  24. %% ct.
  25. all() ->
  26. cowboy_test:common_all().
  27. groups() ->
  28. Tests = [nc_rand, nc_zero],
  29. H1Tests = [slowloris, slowloris_chunks],
  30. H2CTests = [
  31. http2_data_dribble,
  32. http2_empty_frame_flooding_data,
  33. http2_empty_frame_flooding_headers_continuation,
  34. http2_empty_frame_flooding_push_promise,
  35. http2_ping_flood,
  36. http2_reset_flood,
  37. http2_settings_flood,
  38. http2_zero_length_header_leak
  39. ],
  40. [
  41. {http, [parallel], Tests ++ H1Tests},
  42. {https, [parallel], Tests ++ H1Tests},
  43. {h2, [parallel], Tests},
  44. {h2c, [parallel], Tests ++ H2CTests},
  45. {http_compress, [parallel], Tests ++ H1Tests},
  46. {https_compress, [parallel], Tests ++ H1Tests},
  47. {h2_compress, [parallel], Tests},
  48. {h2c_compress, [parallel], Tests ++ H2CTests}
  49. ].
  50. init_per_suite(Config) ->
  51. ct_helper:create_static_dir(config(priv_dir, Config) ++ "/static"),
  52. Config.
  53. end_per_suite(Config) ->
  54. ct_helper:delete_static_dir(config(priv_dir, Config) ++ "/static").
  55. init_per_group(Name, Config) ->
  56. cowboy_test:init_common_groups(Name, Config, ?MODULE).
  57. end_per_group(Name, _) ->
  58. cowboy:stop_listener(Name).
  59. %% Routes.
  60. init_dispatch(_) ->
  61. cowboy_router:compile([{"localhost", [
  62. {"/", hello_h, []},
  63. {"/echo/:key", echo_h, []},
  64. {"/resp/:key[/:arg]", resp_h, []}
  65. ]}]).
  66. %% Tests.
  67. http2_data_dribble(Config) ->
  68. doc("Request a very large response then update the window 1 byte at a time. (CVE-2019-9511)"),
  69. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  70. %% Send a GET request for a very large response.
  71. {HeadersBlock, _} = cow_hpack:encode([
  72. {<<":method">>, <<"GET">>},
  73. {<<":scheme">>, <<"http">>},
  74. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  75. {<<":path">>, <<"/resp/stream_body/loop">>}
  76. ]),
  77. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  78. %% Receive a response with a few DATA frames draining the window.
  79. {ok, <<SkipLen:24, 1:8, _:8, 1:32>>} = gen_tcp:recv(Socket, 9, 1000),
  80. {ok, _} = gen_tcp:recv(Socket, SkipLen, 1000),
  81. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  82. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  83. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  84. {ok, <<16383:24, 0:8, 0:8, 1:32, _:16383/unit:8>>} = gen_tcp:recv(Socket, 9 + 16383, 1000),
  85. %% Send WINDOW_UPDATE frames with a value of 1. The server should
  86. %% not attempt to send data until the window is over a configurable threshold.
  87. ok = gen_tcp:send(Socket, [
  88. cow_http2:window_update(1),
  89. cow_http2:window_update(1, 1)
  90. ]),
  91. {error, timeout} = gen_tcp:recv(Socket, 0, 1000),
  92. ok.
  93. http2_empty_frame_flooding_data(Config) ->
  94. doc("Confirm that Cowboy detects empty DATA frame flooding. (CVE-2019-9518)"),
  95. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  96. %% Send a POST request followed by many empty DATA frames.
  97. {HeadersBlock, _} = cow_hpack:encode([
  98. {<<":method">>, <<"POST">>},
  99. {<<":scheme">>, <<"http">>},
  100. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  101. {<<":path">>, <<"/echo/read_body">>}
  102. ]),
  103. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  104. _ = [gen_tcp:send(Socket, cow_http2:data(1, nofin, <<>>)) || _ <- lists:seq(1, 2000)],
  105. %% When Cowboy detects a flood it must close the connection.
  106. %% We skip WINDOW_UPDATE frames sent when Cowboy starts to read the body.
  107. case gen_tcp:recv(Socket, 43, 6000) of
  108. {ok, <<_:26/unit:8, _:24, 7:8, _:72, 11:32>>} ->
  109. ok;
  110. %% We also accept the connection being closed immediately,
  111. %% which may happen because we send the GOAWAY right before closing.
  112. {error, closed} ->
  113. ok
  114. end.
  115. http2_empty_frame_flooding_headers_continuation(Config) ->
  116. doc("Confirm that Cowboy detects empty HEADERS/CONTINUATION frame flooding. (CVE-2019-9518)"),
  117. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  118. %% Send many empty HEADERS/CONTINUATION frames before the headers.
  119. ok = gen_tcp:send(Socket, <<0:24, 1:8, 0:9, 1:31>>),
  120. _ = [gen_tcp:send(Socket, <<0:24, 9:8, 0:9, 1:31>>) || _ <- lists:seq(1, 2000)],
  121. {HeadersBlock, _} = cow_hpack:encode([
  122. {<<":method">>, <<"POST">>},
  123. {<<":scheme">>, <<"http">>},
  124. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  125. {<<":path">>, <<"/">>}
  126. ]),
  127. Len = iolist_size(HeadersBlock),
  128. _ = gen_tcp:send(Socket, [<<Len:24, 9:8, 0:5, 1:1, 0:1, 1:1, 0:1, 1:31>>, HeadersBlock]),
  129. %% When Cowboy detects a flood it must close the connection.
  130. case gen_tcp:recv(Socket, 17, 6000) of
  131. {ok, <<_:24, 7:8, _:72, 11:32>>} ->
  132. ok;
  133. %% We also accept the connection being closed immediately,
  134. %% which may happen because we send the GOAWAY right before closing.
  135. {error, closed} ->
  136. ok
  137. end.
  138. http2_empty_frame_flooding_push_promise(Config) ->
  139. doc("Confirm that Cowboy detects empty PUSH_PROMISE frame flooding. (CVE-2019-9518)"),
  140. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  141. %% Send a HEADERS frame to which we will attach a PUSH_PROMISE.
  142. %% We use nofin in order to keep the stream alive.
  143. {HeadersBlock, _} = cow_hpack:encode([
  144. {<<":method">>, <<"GET">>},
  145. {<<":scheme">>, <<"http">>},
  146. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  147. {<<":path">>, <<"/">>}
  148. ]),
  149. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  150. %% Send nofin PUSH_PROMISE frame without any data.
  151. ok = gen_tcp:send(Socket, <<4:24, 5:8, 0:8, 0:1, 1:31, 0:1, 3:31>>),
  152. %% Receive a PROTOCOL_ERROR connection error.
  153. %%
  154. %% Cowboy rejects all PUSH_PROMISE frames therefore no flooding
  155. %% can take place.
  156. {ok, <<_:24, 7:8, _:72, 1:32>>} = gen_tcp:recv(Socket, 17, 6000),
  157. ok.
  158. %% @todo http2_internal_data_buffering(Config) -> I do not know how to test this.
  159. % doc("Request many very large responses, with a larger than necessary window size, "
  160. % "but do not attempt to read from the socket. (CVE-2019-9517)"),
  161. http2_ping_flood(Config) ->
  162. doc("Confirm that Cowboy detects PING floods. (CVE-2019-9512)"),
  163. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  164. %% Flood the server with PING frames.
  165. _ = [gen_tcp:send(Socket, cow_http2:ping(0)) || _ <- lists:seq(1, 2000)],
  166. %% Receive a number of PING ACK frames in return, following by the closing of the connection.
  167. try
  168. [case gen_tcp:recv(Socket, 17, 6000) of
  169. {ok, <<8:24, 6:8, _:7, 1:1, _:32, 0:64>>} -> ok;
  170. {ok, <<_:24, 7:8, _:72, 11:32>>} -> throw(goaway);
  171. %% We also accept the connection being closed immediately,
  172. %% which may happen because we send the GOAWAY right before closing.
  173. {error, closed} -> throw(goaway)
  174. end || _ <- lists:seq(1, 2000)],
  175. error(flood_successful)
  176. catch throw:goaway ->
  177. ok
  178. end.
  179. http2_reset_flood(Config) ->
  180. doc("Confirm that Cowboy detects reset floods. (CVE-2019-9514)"),
  181. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  182. %% Flood the server with HEADERS frames without a :method pseudo-header.
  183. {HeadersBlock, _} = cow_hpack:encode([
  184. {<<":scheme">>, <<"http">>},
  185. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  186. {<<":path">>, <<"/">>}
  187. ]),
  188. _ = [gen_tcp:send(Socket, cow_http2:headers(ID, fin, HeadersBlock)) || ID <- lists:seq(1, 100, 2)],
  189. %% Receive a number of RST_STREAM frames in return, following by the closing of the connection.
  190. try
  191. [case gen_tcp:recv(Socket, 13, 6000) of
  192. {ok, <<_:24, 3:8, _:8, ID:32, 1:32>>} -> ok;
  193. {ok, <<_:24, 7:8, _:72>>} ->
  194. {ok, <<11:32>>} = gen_tcp:recv(Socket, 4, 1000),
  195. throw(goaway);
  196. %% We also accept the connection being closed immediately,
  197. %% which may happen because we send the GOAWAY right before closing.
  198. {error, closed} ->
  199. throw(goaway)
  200. end || ID <- lists:seq(1, 100, 2)],
  201. error(flood_successful)
  202. catch throw:goaway ->
  203. ok
  204. end.
  205. %% @todo If we ever implement the PRIORITY mechanism, this test should
  206. %% be implemented as well. CVE-2019-9513 https://www.kb.cert.org/vuls/id/605641/
  207. %% http2_resource_loop
  208. http2_settings_flood(Config) ->
  209. doc("Confirm that Cowboy detects SETTINGS floods. (CVE-2019-9515)"),
  210. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  211. %% Flood the server with empty SETTINGS frames.
  212. _ = [gen_tcp:send(Socket, cow_http2:settings(#{})) || _ <- lists:seq(1, 2000)],
  213. %% Receive a number of SETTINGS ACK frames in return, following by the closing of the connection.
  214. try
  215. [case gen_tcp:recv(Socket, 9, 6000) of
  216. {ok, <<0:24, 4:8, 0:7, 1:1, 0:32>>} -> ok;
  217. {ok, <<_:24, 7:8, _:40>>} ->
  218. {ok, <<_:32, 11:32>>} = gen_tcp:recv(Socket, 8, 1000),
  219. throw(goaway);
  220. %% We also accept the connection being closed immediately,
  221. %% which may happen because we send the GOAWAY right before closing.
  222. {error, closed} ->
  223. throw(goaway)
  224. end || _ <- lists:seq(1, 2000)],
  225. error(flood_successful)
  226. catch throw:goaway ->
  227. ok
  228. end.
  229. http2_zero_length_header_leak(Config) ->
  230. doc("Confirm that Cowboy rejects HEADERS frame with a 0-length header name. (CVE-2019-9516)"),
  231. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  232. %% Send a GET request with a 0-length header name.
  233. {HeadersBlock, _} = cow_hpack:encode([
  234. {<<":method">>, <<"GET">>},
  235. {<<":scheme">>, <<"http">>},
  236. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  237. {<<":path">>, <<"/">>},
  238. {<<>>, <<"CVE-2019-9516">>}
  239. ]),
  240. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  241. %% Receive a PROTOCOL_ERROR stream error.
  242. {ok, <<_:24, 3:8, _:8, 1:32, 1:32>>} = gen_tcp:recv(Socket, 13, 6000),
  243. ok.
  244. nc_rand(Config) ->
  245. doc("Throw random garbage at the server, then check if it's still up."),
  246. do_nc(Config, "/dev/urandom").
  247. nc_zero(Config) ->
  248. doc("Throw zeroes at the server, then check if it's still up."),
  249. do_nc(Config, "/dev/zero").
  250. do_nc(Config, Input) ->
  251. Cat = os:find_executable("cat"),
  252. Nc = os:find_executable("nc"),
  253. case {Cat, Nc} of
  254. {false, _} ->
  255. {skip, "The cat executable was not found."};
  256. {_, false} ->
  257. {skip, "The nc executable was not found."};
  258. _ ->
  259. StrPort = integer_to_list(config(port, Config)),
  260. _ = [
  261. os:cmd("cat " ++ Input ++ " | nc localhost " ++ StrPort)
  262. || _ <- lists:seq(1, 100)],
  263. ConnPid = gun_open(Config),
  264. Ref = gun:get(ConnPid, "/"),
  265. {response, _, 200, _} = gun:await(ConnPid, Ref),
  266. ok
  267. end.
  268. slowloris(Config) ->
  269. doc("Send request headers one byte at a time. "
  270. "Confirm that the connection gets closed."),
  271. Client = raw_open(Config),
  272. try
  273. [begin
  274. ok = raw_send(Client, [C]),
  275. timer:sleep(250)
  276. end || C <- "GET / HTTP/1.1\r\nHost: localhost\r\n"
  277. "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US)\r\n"
  278. "Cookie: name=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\r\n\r\n"],
  279. error(failure)
  280. catch error:{badmatch, _} ->
  281. ok
  282. end.
  283. slowloris_chunks(Config) ->
  284. doc("Send request headers one line at a time. "
  285. "Confirm that the connection gets closed."),
  286. Client = raw_open(Config),
  287. ok = raw_send(Client, "GET / HTTP/1.1\r\n"),
  288. timer:sleep(300),
  289. ok = raw_send(Client, "Host: localhost\r\n"),
  290. timer:sleep(300),
  291. Data = raw_recv_head(Client),
  292. {'HTTP/1.1', 408, _, Rest} = cow_http:parse_status_line(Data),
  293. {Headers, _} = cow_http:parse_headers(Rest),
  294. {_, <<"close">>} = lists:keyfind(<<"connection">>, 1, Headers),
  295. {error, closed} = raw_recv(Client, 0, 1000).