Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(347)

Unified Diff: net/http/http_network_transaction_ssl_unittest.cc

Issue 14125003: Do not roll back to SSL 3.0 for Google properties. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Cleanup Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/http/http_network_transaction_ssl_unittest.cc
diff --git a/net/http/http_network_transaction_ssl_unittest.cc b/net/http/http_network_transaction_ssl_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..662fc497a0a9bc5915dc7525b899704922be12fb
--- /dev/null
+++ b/net/http/http_network_transaction_ssl_unittest.cc
@@ -0,0 +1,206 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <string>
+
+#include "base/memory/ref_counted.h"
+#include "base/memory/scoped_ptr.h"
+#include "net/base/net_util.h"
+#include "net/base/request_priority.h"
+#include "net/dns/mock_host_resolver.h"
+#include "net/http/http_auth_handler_mock.h"
+#include "net/http/http_network_session.h"
+#include "net/http/http_network_transaction.h"
+#include "net/http/http_request_info.h"
+#include "net/http/http_server_properties_impl.h"
+#include "net/http/transport_security_state.h"
+#include "net/proxy/proxy_service.h"
+#include "net/socket/socket_test_util.h"
+#include "net/ssl/ssl_config_service_defaults.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace net {
+
+class HttpNetworkTransactionSSLTest : public testing::Test {
+ protected:
+ virtual void SetUp() {
+ ssl_config_ = new SSLConfigServiceDefaults;
+ session_params_.ssl_config_service = ssl_config_.get();
+
+ auth_handler_factory_.reset(new HttpAuthHandlerMock::Factory());
+ session_params_.http_auth_handler_factory = auth_handler_factory_.get();
+
+ proxy_service_.reset(ProxyService::CreateDirect());
+ session_params_.proxy_service = proxy_service_.get();
+
+ session_params_.host_resolver = &mock_resolver_;
+ session_params_.http_server_properties = &http_server_properties_;
+ session_params_.transport_security_state = &transport_security_state_;
+ }
+
+ HttpRequestInfo* GetRequestInfo(std::string url) {
+ HttpRequestInfo* request_info = new HttpRequestInfo;
+ request_info->url = GURL(url);
+ request_info->method = "GET";
+ return request_info;
+ }
+
+ SSLConfig& GetServerSSLConfig(HttpNetworkTransaction* trans) {
+ return trans->server_ssl_config_;
+ }
+
+ scoped_refptr<SSLConfigService> ssl_config_;
+ scoped_ptr<HttpAuthHandlerMock::Factory> auth_handler_factory_;
+ scoped_ptr<ProxyService> proxy_service_;
+
+ MockHostResolver mock_resolver_;
+ HttpServerPropertiesImpl http_server_properties_;
+ TransportSecurityState transport_security_state_;
+ HttpNetworkSession::Params session_params_;
+};
+
+TEST_F(HttpNetworkTransactionSSLTest, Google_SSLVersionMinPreloadedEnabled) {
+ MockClientSocketFactory mock_socket_factory;
Ryan Sleevi 2013/04/17 01:16:36 Seems like all your tests just end up creating a m
thaidn_google 2013/04/17 04:34:47 Nice tip. Thanks! On 2013/04/17 01:16:36, Ryan Sl
+
+ // |ssl_data| contains the data for the first TLS 1.0 handshake that will
+ // return |ERR_SSL_PROTOCOL_ERROR| to trigger the SSL 3.0 fallback logic in
+ // |HttpNetworkTransaction|.
Ryan Sleevi 2013/04/17 01:16:36 comment style nit: While the || notation isn't for
thaidn_google 2013/04/17 04:34:47 Good to know. Thanks! On 2013/04/17 01:16:36, Rya
+
+ // Note: When a connection to a server fails during a handshake,
+ // |HttpNetworkTransaction| will attempt to fallback to SSL 3.0 if the
+ // previous connection was attempted with TLS 1.0. Since that behavior is
Ryan Sleevi 2013/04/17 01:16:36 comment nit: Two bits: 1) This is explaining a con
thaidn_google 2013/04/17 04:34:47 I hope the modified comments LGTY :-). On 2013/04
+ // disabled for Google properties, there is only one handshake data here.
+ SSLSocketDataProvider ssl_data(ASYNC, ERR_SSL_PROTOCOL_ERROR);
+ mock_socket_factory.AddSSLSocketDataProvider(&ssl_data);
+ net::StaticSocketDataProvider data(NULL, 0, NULL, 0);
Ryan Sleevi 2013/04/17 01:16:36 style: net:: namespace issues still
thaidn_google 2013/04/17 04:34:47 Done.
+ mock_socket_factory.AddSocketDataProvider(&data);
+
+ session_params_.client_socket_factory = &mock_socket_factory;
+
+ scoped_refptr<HttpNetworkSession> session(
+ new HttpNetworkSession(session_params_));
+ scoped_ptr<HttpNetworkTransaction> trans(
+ new HttpNetworkTransaction(DEFAULT_PRIORITY, session));
+ TestCompletionCallback callback;
Ryan Sleevi 2013/04/17 01:16:36 style nit: Move the TestCompletionCallback declara
thaidn_google 2013/04/17 04:34:47 Done.
+
+ SSLConfig& ssl_config = GetServerSSLConfig(trans.get());
+ // Explicitly configures the maximum supported SSL version to TLS 1.0.
+ ssl_config.version_max = SSL_PROTOCOL_VERSION_TLS1;
Ryan Sleevi 2013/04/17 01:16:36 Seems like this could be done in the test harness
thaidn_google 2013/04/17 04:34:47 Done.
+
+ // This will consume |ssl_data|.
+ int rv = callback.GetResult(
+ trans->Start(GetRequestInfo("https://www.google.com/"),
+ callback.callback(), BoundNetLog()));
+ EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
+
+ // |version_max| never fallbacks to SSLv3 for Google properties.
+ EXPECT_EQ(SSL_PROTOCOL_VERSION_TLS1,
+ ssl_config.version_max);
+ EXPECT_FALSE(ssl_config.version_fallback);
+}
+
+TEST_F(HttpNetworkTransactionSSLTest, Google_SSLVersionMinPreloadedDisabled) {
+ MockClientSocketFactory mock_socket_factory;
+
+ // |ssl_data1| contains the data for the first TLS 1.0 handshake that will
+ // return |ERR_SSL_PROTOCOL_ERROR| to trigger the SSL 3.0 fallback logic in
+ // |HttpNetworkTransaction|.
+ SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR);
+ mock_socket_factory.AddSSLSocketDataProvider(&ssl_data1);
+ net::StaticSocketDataProvider data1(NULL, 0, NULL, 0);
+ mock_socket_factory.AddSocketDataProvider(&data1);
+
+ // |ssl_data2| contains the data for the second SSL 3.0 handshake. When a
+ // connection to a server fails during a handshake,
+ // |HttpNetworkTransaction| will attempt to fallback to SSL 3.0 if the
+ // previous connection was attempted with TLS 1.0. This is transparent to the
+ // caller of the |HttpNetworkTransaction|.
Ryan Sleevi 2013/04/17 01:16:36 With the comments from line 72 incorporated (eg: i
thaidn_google 2013/04/17 04:34:47 Done.
+
+ // Note: if |ssl_data2| is omitted (like in
+ // |Google_SSLVersionMinPreloadedEnabled|) then this test will crash, because
+ // |HttpNetworkTransaction| will attempt to handshake two times, but there is
+ // only one handshake data.
Ryan Sleevi 2013/04/17 01:16:36 comment nit: I'm generally not fond of inter-test
thaidn_google 2013/04/17 04:34:47 I agree. On 2013/04/17 01:16:36, Ryan Sleevi wrot
+ SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR);
+ mock_socket_factory.AddSSLSocketDataProvider(&ssl_data2);
+ net::StaticSocketDataProvider data2(NULL, 0, NULL, 0);
+ mock_socket_factory.AddSocketDataProvider(&data2);
+
+ session_params_.client_socket_factory = &mock_socket_factory;
+
+ scoped_refptr<HttpNetworkSession> session(
+ new HttpNetworkSession(session_params_));
+ scoped_ptr<HttpNetworkTransaction> trans(
+ new HttpNetworkTransaction(DEFAULT_PRIORITY, session));
+ TestCompletionCallback callback;
+
+ SSLConfig& ssl_config = GetServerSSLConfig(trans.get());
+ // Explicitly configures the maximum supported SSL version to TLS 1.0.
+ ssl_config.version_max = SSL_PROTOCOL_VERSION_TLS1;
+
+ ssl_config.ssl_version_min_preloaded_disabled = true;
+
+ // This will consume |ssl_data1| and |ssl_data2|.
+ int rv = callback.GetResult(
+ trans->Start(GetRequestInfo("https://www.google.com/"),
+ callback.callback(), BoundNetLog()));
+ EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
+
+ // |version_max| fallbacks to SSL 3.0 for Google properties when
+ // |ssl_version_min_preloaded_disabled| is true.
+ EXPECT_EQ(SSL_PROTOCOL_VERSION_SSL3,
+ ssl_config.version_max);
+ EXPECT_TRUE(ssl_config.version_fallback);
+}
+
+TEST_F(HttpNetworkTransactionSSLTest, PayPal_SSLVersionMinPreloadedDisabled) {
+ MockClientSocketFactory mock_socket_factory;
+ // |ssl_data1| contains the data for the first TLS 1.0 handshake that will
+ // return |ERR_SSL_PROTOCOL_ERROR| to trigger the SSL 3.0 fallback logic in
+ // |HttpNetworkTransaction|.
+ SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR);
+ mock_socket_factory.AddSSLSocketDataProvider(&ssl_data1);
+ net::StaticSocketDataProvider data1(NULL, 0, NULL, 0);
+ mock_socket_factory.AddSocketDataProvider(&data1);
+
+ // |ssl_data2| contains the data for the second SSL 3.0 handshake. When a
+ // connection to a server fails during a handshake,
+ // |HttpNetworkTransaction| will attempt to fallback to SSL 3.0 if the
+ // previous connection was attempted with TLS 1.0. This is transparent to the
+ // caller of the |HttpNetworkTransaction|.
+
+ // Note: if |ssl_data2| is omitted (like in
+ // |Google_SSLVersionMinPreloadedEnabled|) then this test will crash, because
+ // |HttpNetworkTransaction| will attempt to handshake two times, but there is
+ // only one handshake data.
+ SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR);
+ mock_socket_factory.AddSSLSocketDataProvider(&ssl_data2);
+ net::StaticSocketDataProvider data2(NULL, 0, NULL, 0);
+ mock_socket_factory.AddSocketDataProvider(&data2);
+
+ session_params_.client_socket_factory = &mock_socket_factory;
+
+ scoped_refptr<HttpNetworkSession> session(
+ new HttpNetworkSession(session_params_));
+ scoped_ptr<HttpNetworkTransaction> trans(
+ new HttpNetworkTransaction(DEFAULT_PRIORITY, session));
+ TestCompletionCallback callback;
+
+ SSLConfig& ssl_config = GetServerSSLConfig(trans.get());
+ // Explicitly configures the maximum supported SSL version to TLS 1.0.
+ ssl_config.version_max = SSL_PROTOCOL_VERSION_TLS1;
+
+ // This will consume |ssl_data1| and |ssl_data2|.
+ int rv = callback.GetResult(
+ trans->Start(GetRequestInfo("https://www.paypal.com/"),
+ callback.callback(), BoundNetLog()));
+ EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
+
+ // |version_max| fallbacks to SSL 3.0.
+ EXPECT_EQ(SSL_PROTOCOL_VERSION_SSL3,
+ ssl_config.version_max);
Ryan Sleevi 2013/04/17 01:16:36 Is wrapping really necessary here?
thaidn_google 2013/04/17 04:34:47 Done.
+ EXPECT_TRUE(ssl_config.version_fallback);
+}
+
+} // namespace net
+

Powered by Google App Engine
This is Rietveld 408576698