security_SUITE.erl 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369
  1. %% Copyright (c) 2018, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. -module(security_SUITE).
  15. -compile(export_all).
  16. -compile(nowarn_export_all).
  17. -import(ct_helper, [config/2]).
  18. -import(ct_helper, [doc/1]).
  19. -import(cowboy_test, [gun_open/1]).
  20. -import(cowboy_test, [raw_open/1]).
  21. -import(cowboy_test, [raw_send/2]).
  22. -import(cowboy_test, [raw_recv_head/1]).
  23. -import(cowboy_test, [raw_recv/3]).
  24. %% ct.
  25. all() ->
  26. cowboy_test:common_all().
  27. groups() ->
  28. Tests = [nc_rand, nc_zero],
  29. H1Tests = [slowloris, slowloris_chunks],
  30. H2CTests = [
  31. http2_data_dribble,
  32. http2_empty_frame_flooding_data,
  33. http2_empty_frame_flooding_headers_continuation,
  34. http2_empty_frame_flooding_push_promise,
  35. http2_ping_flood,
  36. http2_reset_flood,
  37. http2_cancel_flood,
  38. http2_settings_flood,
  39. http2_zero_length_header_leak
  40. ],
  41. [
  42. {http, [parallel], Tests ++ H1Tests},
  43. {https, [parallel], Tests ++ H1Tests},
  44. {h2, [parallel], Tests},
  45. {h2c, [parallel], Tests ++ H2CTests},
  46. {http_compress, [parallel], Tests ++ H1Tests},
  47. {https_compress, [parallel], Tests ++ H1Tests},
  48. {h2_compress, [parallel], Tests},
  49. {h2c_compress, [parallel], Tests ++ H2CTests}
  50. ].
  51. init_per_suite(Config) ->
  52. ct_helper:create_static_dir(config(priv_dir, Config) ++ "/static"),
  53. Config.
  54. end_per_suite(Config) ->
  55. ct_helper:delete_static_dir(config(priv_dir, Config) ++ "/static").
  56. init_per_group(Name, Config) ->
  57. cowboy_test:init_common_groups(Name, Config, ?MODULE).
  58. end_per_group(Name, _) ->
  59. cowboy:stop_listener(Name).
  60. %% Routes.
  61. init_dispatch(_) ->
  62. cowboy_router:compile([{"localhost", [
  63. {"/", hello_h, []},
  64. {"/echo/:key", echo_h, []},
  65. {"/delay_hello", delay_hello_h, 1000},
  66. {"/long_polling", long_polling_h, []},
  67. {"/resp/:key[/:arg]", resp_h, []}
  68. ]}]).
  69. %% Tests.
  70. http2_cancel_flood(Config) ->
  71. doc("Confirm that Cowboy detects the rapid reset attack. (CVE-2023-44487)"),
  72. do_http2_cancel_flood(Config, 1, 500),
  73. do_http2_cancel_flood(Config, 10, 50),
  74. do_http2_cancel_flood(Config, 500, 1),
  75. ok.
  76. do_http2_cancel_flood(Config, NumStreamsPerBatch, NumBatches) ->
  77. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  78. {HeadersBlock, _} = cow_hpack:encode([
  79. {<<":method">>, <<"GET">>},
  80. {<<":scheme">>, <<"http">>},
  81. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  82. {<<":path">>, <<"/delay_hello">>}
  83. ]),
  84. AllStreamIDs = lists:seq(1, NumBatches * NumStreamsPerBatch * 2, 2),
  85. _ = lists:foldl(
  86. fun (_BatchNumber, AvailableStreamIDs) ->
  87. %% Take a bunch of IDs from the available stream IDs.
  88. %% Send HEADERS for all these and then cancel them.
  89. {IDs, RemainingStreamIDs} = lists:split(NumStreamsPerBatch, AvailableStreamIDs),
  90. _ = gen_tcp:send(Socket, [cow_http2:headers(ID, fin, HeadersBlock) || ID <- IDs]),
  91. _ = gen_tcp:send(Socket, [<<4:24, 3:8, 0:8, ID:32, 8:32>> || ID <- IDs]),
  92. RemainingStreamIDs
  93. end,
  94. AllStreamIDs,
  95. lists:seq(1, NumBatches, 1)),
  96. %% When Cowboy detects a flood it must close the connection.
  97. case gen_tcp:recv(Socket, 17, 6000) of
  98. {ok, <<_:24, 7:8, 0:8, 0:32, _LastStreamId:32, 11:32>>} ->
  99. %% GOAWAY with error code 11 = ENHANCE_YOUR_CALM.
  100. ok;
  101. %% We also accept the connection being closed immediately,
  102. %% which may happen because we send the GOAWAY right before closing.
  103. {error, closed} ->
  104. ok
  105. end.
  106. http2_data_dribble(Config) ->
  107. doc("Request a very large response then update the window 1 byte at a time. (CVE-2019-9511)"),
  108. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  109. %% Send a GET request for a very large response.
  110. {HeadersBlock, _} = cow_hpack:encode([
  111. {<<":method">>, <<"GET">>},
  112. {<<":scheme">>, <<"http">>},
  113. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  114. {<<":path">>, <<"/resp/stream_body/loop">>}
  115. ]),
  116. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  117. %% Receive a response with a few DATA frames draining the window.
  118. {ok, <<SkipLen:24, 1:8, _:8, 1:32>>} = gen_tcp:recv(Socket, 9, 1000),
  119. {ok, _} = gen_tcp:recv(Socket, SkipLen, 1000),
  120. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  121. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  122. {ok, <<16384:24, 0:8, 0:8, 1:32, _:16384/unit:8>>} = gen_tcp:recv(Socket, 9 + 16384, 1000),
  123. {ok, <<16383:24, 0:8, 0:8, 1:32, _:16383/unit:8>>} = gen_tcp:recv(Socket, 9 + 16383, 1000),
  124. %% Send WINDOW_UPDATE frames with a value of 1. The server should
  125. %% not attempt to send data until the window is over a configurable threshold.
  126. ok = gen_tcp:send(Socket, [
  127. cow_http2:window_update(1),
  128. cow_http2:window_update(1, 1)
  129. ]),
  130. {error, timeout} = gen_tcp:recv(Socket, 0, 1000),
  131. ok.
  132. http2_empty_frame_flooding_data(Config) ->
  133. doc("Confirm that Cowboy detects empty DATA frame flooding. (CVE-2019-9518)"),
  134. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  135. %% Send a POST request followed by many empty DATA frames.
  136. {HeadersBlock, _} = cow_hpack:encode([
  137. {<<":method">>, <<"POST">>},
  138. {<<":scheme">>, <<"http">>},
  139. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  140. {<<":path">>, <<"/echo/read_body">>}
  141. ]),
  142. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  143. _ = [gen_tcp:send(Socket, cow_http2:data(1, nofin, <<>>)) || _ <- lists:seq(1, 20000)],
  144. %% When Cowboy detects a flood it must close the connection.
  145. %% We skip WINDOW_UPDATE frames sent when Cowboy starts to read the body.
  146. case gen_tcp:recv(Socket, 43, 6000) of
  147. {ok, <<_:26/unit:8, _:24, 7:8, _:72, 11:32>>} ->
  148. ok;
  149. %% We also accept the connection being closed immediately,
  150. %% which may happen because we send the GOAWAY right before closing.
  151. {error, closed} ->
  152. ok;
  153. %% At least on Windows this might also occur.
  154. {error, enotconn} ->
  155. ok
  156. end.
  157. http2_empty_frame_flooding_headers_continuation(Config) ->
  158. doc("Confirm that Cowboy detects empty HEADERS/CONTINUATION frame flooding. (CVE-2019-9518)"),
  159. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  160. %% Send many empty HEADERS/CONTINUATION frames before the headers.
  161. ok = gen_tcp:send(Socket, <<0:24, 1:8, 0:9, 1:31>>),
  162. _ = [gen_tcp:send(Socket, <<0:24, 9:8, 0:9, 1:31>>) || _ <- lists:seq(1, 20000)],
  163. {HeadersBlock, _} = cow_hpack:encode([
  164. {<<":method">>, <<"POST">>},
  165. {<<":scheme">>, <<"http">>},
  166. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  167. {<<":path">>, <<"/">>}
  168. ]),
  169. Len = iolist_size(HeadersBlock),
  170. _ = gen_tcp:send(Socket, [<<Len:24, 9:8, 0:5, 1:1, 0:1, 1:1, 0:1, 1:31>>, HeadersBlock]),
  171. %% When Cowboy detects a flood it must close the connection.
  172. case gen_tcp:recv(Socket, 17, 6000) of
  173. {ok, <<_:24, 7:8, _:72, 11:32>>} ->
  174. ok;
  175. %% We also accept the connection being closed immediately,
  176. %% which may happen because we send the GOAWAY right before closing.
  177. {error, closed} ->
  178. ok;
  179. %% At least on Windows this might also occur.
  180. {error, enotconn} ->
  181. ok
  182. end.
  183. http2_empty_frame_flooding_push_promise(Config) ->
  184. doc("Confirm that Cowboy detects empty PUSH_PROMISE frame flooding. (CVE-2019-9518)"),
  185. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  186. %% Send a HEADERS frame to which we will attach a PUSH_PROMISE.
  187. %% We use nofin in order to keep the stream alive.
  188. {HeadersBlock, _} = cow_hpack:encode([
  189. {<<":method">>, <<"GET">>},
  190. {<<":scheme">>, <<"http">>},
  191. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  192. {<<":path">>, <<"/long_polling">>}
  193. ]),
  194. ok = gen_tcp:send(Socket, cow_http2:headers(1, nofin, HeadersBlock)),
  195. %% Send nofin PUSH_PROMISE frame without any data.
  196. ok = gen_tcp:send(Socket, <<4:24, 5:8, 0:8, 0:1, 1:31, 0:1, 3:31>>),
  197. %% Receive a PROTOCOL_ERROR connection error.
  198. %%
  199. %% Cowboy rejects all PUSH_PROMISE frames therefore no flooding
  200. %% can take place.
  201. {ok, <<_:24, 7:8, _:72, 1:32>>} = gen_tcp:recv(Socket, 17, 6000),
  202. ok.
  203. %% @todo http2_internal_data_buffering(Config) -> I do not know how to test this.
  204. % doc("Request many very large responses, with a larger than necessary window size, "
  205. % "but do not attempt to read from the socket. (CVE-2019-9517)"),
  206. http2_ping_flood(Config) ->
  207. doc("Confirm that Cowboy detects PING floods. (CVE-2019-9512)"),
  208. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  209. %% Flood the server with PING frames.
  210. _ = [gen_tcp:send(Socket, cow_http2:ping(0)) || _ <- lists:seq(1, 20000)],
  211. %% Receive a number of PING ACK frames in return, following by the closing of the connection.
  212. try
  213. [case gen_tcp:recv(Socket, 17, 6000) of
  214. {ok, <<8:24, 6:8, _:7, 1:1, _:32, 0:64>>} -> ok;
  215. {ok, <<_:24, 7:8, _:72, 11:32>>} -> throw(goaway);
  216. %% We also accept the connection being closed immediately,
  217. %% which may happen because we send the GOAWAY right before closing.
  218. {error, closed} -> throw(goaway)
  219. end || _ <- lists:seq(1, 20000)],
  220. error(flood_successful)
  221. catch throw:goaway ->
  222. ok
  223. end.
  224. http2_reset_flood(Config) ->
  225. doc("Confirm that Cowboy detects reset floods. (CVE-2019-9514)"),
  226. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  227. %% Flood the server with HEADERS frames without a :method pseudo-header.
  228. {HeadersBlock, _} = cow_hpack:encode([
  229. {<<":scheme">>, <<"http">>},
  230. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  231. {<<":path">>, <<"/">>}
  232. ]),
  233. _ = [gen_tcp:send(Socket, cow_http2:headers(ID, fin, HeadersBlock)) || ID <- lists:seq(1, 100, 2)],
  234. %% Receive a number of RST_STREAM frames in return, following by the closing of the connection.
  235. try
  236. [case gen_tcp:recv(Socket, 13, 6000) of
  237. {ok, <<_:24, 3:8, _:8, ID:32, 1:32>>} -> ok;
  238. {ok, <<_:24, 7:8, _:72>>} ->
  239. {ok, <<11:32>>} = gen_tcp:recv(Socket, 4, 1000),
  240. throw(goaway);
  241. %% We also accept the connection being closed immediately,
  242. %% which may happen because we send the GOAWAY right before closing.
  243. {error, closed} ->
  244. throw(goaway)
  245. end || ID <- lists:seq(1, 100, 2)],
  246. error(flood_successful)
  247. catch throw:goaway ->
  248. ok
  249. end.
  250. %% @todo If we ever implement the PRIORITY mechanism, this test should
  251. %% be implemented as well. CVE-2019-9513 https://www.kb.cert.org/vuls/id/605641/
  252. %% http2_resource_loop
  253. http2_settings_flood(Config) ->
  254. doc("Confirm that Cowboy detects SETTINGS floods. (CVE-2019-9515)"),
  255. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  256. %% Flood the server with empty SETTINGS frames.
  257. _ = [gen_tcp:send(Socket, cow_http2:settings(#{})) || _ <- lists:seq(1, 20000)],
  258. %% Receive a number of SETTINGS ACK frames in return, following by the closing of the connection.
  259. try
  260. [case gen_tcp:recv(Socket, 9, 6000) of
  261. {ok, <<0:24, 4:8, 0:7, 1:1, 0:32>>} -> ok;
  262. {ok, <<_:24, 7:8, _:40>>} ->
  263. {ok, <<_:32, 11:32>>} = gen_tcp:recv(Socket, 8, 1000),
  264. throw(goaway);
  265. %% We also accept the connection being closed immediately,
  266. %% which may happen because we send the GOAWAY right before closing.
  267. {error, closed} ->
  268. throw(goaway)
  269. end || _ <- lists:seq(1, 20000)],
  270. error(flood_successful)
  271. catch throw:goaway ->
  272. ok
  273. end.
  274. http2_zero_length_header_leak(Config) ->
  275. doc("Confirm that Cowboy rejects HEADERS frame with a 0-length header name. (CVE-2019-9516)"),
  276. {ok, Socket} = rfc7540_SUITE:do_handshake(Config),
  277. %% Send a GET request with a 0-length header name.
  278. {HeadersBlock, _} = cow_hpack:encode([
  279. {<<":method">>, <<"GET">>},
  280. {<<":scheme">>, <<"http">>},
  281. {<<":authority">>, <<"localhost">>}, %% @todo Correct port number.
  282. {<<":path">>, <<"/">>},
  283. {<<>>, <<"CVE-2019-9516">>}
  284. ]),
  285. ok = gen_tcp:send(Socket, cow_http2:headers(1, fin, HeadersBlock)),
  286. %% Receive a PROTOCOL_ERROR stream error.
  287. {ok, <<_:24, 3:8, _:8, 1:32, 1:32>>} = gen_tcp:recv(Socket, 13, 6000),
  288. ok.
  289. nc_rand(Config) ->
  290. doc("Throw random garbage at the server, then check if it's still up."),
  291. do_nc(Config, "/dev/urandom").
  292. nc_zero(Config) ->
  293. doc("Throw zeroes at the server, then check if it's still up."),
  294. do_nc(Config, "/dev/zero").
  295. do_nc(Config, Input) ->
  296. Cat = os:find_executable("cat"),
  297. Nc = os:find_executable("nc"),
  298. case {Cat, Nc} of
  299. {false, _} ->
  300. {skip, "The cat executable was not found."};
  301. {_, false} ->
  302. {skip, "The nc executable was not found."};
  303. _ ->
  304. StrPort = integer_to_list(config(port, Config)),
  305. _ = [
  306. os:cmd("cat " ++ Input ++ " | nc localhost " ++ StrPort)
  307. || _ <- lists:seq(1, 100)],
  308. ConnPid = gun_open(Config),
  309. Ref = gun:get(ConnPid, "/"),
  310. {response, _, 200, _} = gun:await(ConnPid, Ref),
  311. ok
  312. end.
  313. slowloris(Config) ->
  314. doc("Send request headers one byte at a time. "
  315. "Confirm that the connection gets closed."),
  316. Client = raw_open(Config),
  317. try
  318. [begin
  319. ok = raw_send(Client, [C]),
  320. timer:sleep(250)
  321. end || C <- "GET / HTTP/1.1\r\nHost: localhost\r\n"
  322. "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US)\r\n"
  323. "Cookie: name=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\r\n\r\n"],
  324. error(failure)
  325. catch error:{badmatch, _} ->
  326. ok
  327. end.
  328. slowloris_chunks(Config) ->
  329. doc("Send request headers one line at a time. "
  330. "Confirm that the connection gets closed."),
  331. Client = raw_open(Config),
  332. ok = raw_send(Client, "GET / HTTP/1.1\r\n"),
  333. timer:sleep(300),
  334. ok = raw_send(Client, "Host: localhost\r\n"),
  335. timer:sleep(300),
  336. Data = raw_recv_head(Client),
  337. {'HTTP/1.1', 408, _, Rest} = cow_http:parse_status_line(Data),
  338. {Headers, _} = cow_http:parse_headers(Rest),
  339. {_, <<"close">>} = lists:keyfind(<<"connection">>, 1, Headers),
  340. {error, closed} = raw_recv(Client, 0, 1000).