Skip to content

Commit

Permalink
Bug 1851570 - Allow necko to know when client auth is selected to dri…
Browse files Browse the repository at this point in the history
…ve TLS handshake, r=necko-reviewers,keeler,valentin

Differential Revision: https://phabricator.services.mozilla.com/D194242
  • Loading branch information
KershawChang committed Nov 22, 2023
1 parent 5f948f3 commit 3e7402a
Show file tree
Hide file tree
Showing 5 changed files with 213 additions and 0 deletions.
18 changes: 18 additions & 0 deletions netwerk/protocol/http/TlsHandshaker.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,24 @@ TlsHandshaker::TlsHandshaker(nsHttpConnectionInfo* aInfo,

TlsHandshaker::~TlsHandshaker() { LOG(("TlsHandshaker dtor %p", this)); }

NS_IMETHODIMP
TlsHandshaker::CertVerificationDone() {
LOG(("TlsHandshaker::CertVerificationDone mOwner=%p", mOwner.get()));
if (mOwner) {
Unused << mOwner->ResumeSend();
}
return NS_OK;
}

NS_IMETHODIMP
TlsHandshaker::ClientAuthCertificateSelected() {
LOG(("TlsHandshaker::ClientAuthCertificateSelected mOwner=%p", mOwner.get()));
if (mOwner) {
Unused << mOwner->ResumeSend();
}
return NS_OK;
}

NS_IMETHODIMP
TlsHandshaker::HandshakeDone() {
LOG(("TlsHandshaker::HandshakeDone mOwner=%p", mOwner.get()));
Expand Down
2 changes: 2 additions & 0 deletions netwerk/protocol/http/nsITlsHandshakeListener.idl
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,6 @@
[uuid(b4bbe824-ec4c-48be-9a40-6a7339347f40)]
interface nsITlsHandshakeCallbackListener : nsISupports {
[noscript] void handshakeDone();
[noscript] void certVerificationDone();
[noscript] void clientAuthCertificateSelected();
};
176 changes: 176 additions & 0 deletions netwerk/test/unit/test_client_auth_with_proxy.js
Original file line number Diff line number Diff line change
@@ -0,0 +1,176 @@
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */

"use strict";

/* import-globals-from head_cache.js */
/* import-globals-from head_cookies.js */
/* import-globals-from head_channels.js */
/* import-globals-from head_servers.js */

const { MockRegistrar } = ChromeUtils.importESModule(
"resource://testing-common/MockRegistrar.sys.mjs"
);

const certOverrideService = Cc[
"@mozilla.org/security/certoverride;1"
].getService(Ci.nsICertOverrideService);

function makeChan(uri) {
let chan = NetUtil.newChannel({
uri,
loadUsingSystemPrincipal: true,
}).QueryInterface(Ci.nsIHttpChannel);
chan.loadFlags = Ci.nsIChannel.LOAD_INITIAL_DOCUMENT_URI;
return chan;
}

function channelOpenPromise(chan, flags) {
return new Promise(resolve => {
function finish(req, buffer) {
resolve([req, buffer]);
}
chan.asyncOpen(new ChannelListener(finish, null, flags));
});
}

class SecurityObserver {
constructor(input, output) {
this.input = input;
this.output = output;
}

onHandshakeDone(socket, status) {
info("TLS handshake done");

let output = this.output;
this.input.asyncWait(
{
onInputStreamReady(readyInput) {
let request = NetUtil.readInputStreamToString(
readyInput,
readyInput.available()
);
ok(
request.startsWith("GET /") && request.includes("HTTP/1.1"),
"expecting an HTTP/1.1 GET request"
);
let response =
"HTTP/1.1 200 OK\r\nContent-Type:text/plain\r\n" +
"Connection:Close\r\nContent-Length:2\r\n\r\nOK";
output.write(response, response.length);
},
},
0,
0,
Services.tm.currentThread
);
}
}

function startServer(cert) {
let tlsServer = Cc["@mozilla.org/network/tls-server-socket;1"].createInstance(
Ci.nsITLSServerSocket
);
tlsServer.init(-1, true, -1);
tlsServer.serverCert = cert;

let securityObservers = [];

let listener = {
onSocketAccepted(socket, transport) {
info("Accepted TLS client connection");
let connectionInfo = transport.securityCallbacks.getInterface(
Ci.nsITLSServerConnectionInfo
);
let input = transport.openInputStream(0, 0, 0);
let output = transport.openOutputStream(0, 0, 0);
connectionInfo.setSecurityObserver(new SecurityObserver(input, output));
},

onStopListening() {
info("onStopListening");
for (let securityObserver of securityObservers) {
securityObserver.input.close();
securityObserver.output.close();
}
},
};

tlsServer.setSessionTickets(false);
tlsServer.setRequestClientCertificate(Ci.nsITLSServerSocket.REQUEST_ALWAYS);

tlsServer.asyncListen(listener);

return tlsServer;
}

// Replace the UI dialog that prompts the user to pick a client certificate.
const clientAuthDialogService = {
chooseCertificate(hostname, certArray, loadContext, callback) {
callback.certificateChosen(certArray[0], false);
},
QueryInterface: ChromeUtils.generateQI(["nsIClientAuthDialogService"]),
};

let server;
add_setup(async function setup() {
do_get_profile();

let clientAuthDialogServiceCID = MockRegistrar.register(
"@mozilla.org/security/ClientAuthDialogService;1",
clientAuthDialogService
);

let cert = getTestServerCertificate();
ok(!!cert, "Got self-signed cert");
server = startServer(cert);

certOverrideService.rememberValidityOverride(
"localhost",
server.port,
{},
cert,
true
);

registerCleanupFunction(async function () {
MockRegistrar.unregister(clientAuthDialogServiceCID);
certOverrideService.clearValidityOverride("localhost", server.port, {});
server.close();
});
});

add_task(async function test_client_auth_with_proxy() {
let certdb = Cc["@mozilla.org/security/x509certdb;1"].getService(
Ci.nsIX509CertDB
);
addCertFromFile(certdb, "http2-ca.pem", "CTu,u,u");
addCertFromFile(certdb, "proxy-ca.pem", "CTu,u,u");

let proxies = [
NodeHTTPProxyServer,
NodeHTTPSProxyServer,
NodeHTTP2ProxyServer,
];

for (let p of proxies) {
info(`Test with proxy:${p.name}`);
let proxy = new p();
await proxy.start();
registerCleanupFunction(async () => {
await proxy.stop();
});

let chan = makeChan(`https://localhost:${server.port}`);
let [req, buff] = await channelOpenPromise(chan, CL_ALLOW_UNKNOWN_CL);
equal(req.status, Cr.NS_OK);
equal(req.QueryInterface(Ci.nsIHttpChannel).responseStatus, 200);
equal(buff, "OK");
req.QueryInterface(Ci.nsIProxiedChannel);
ok(!!req.proxyInfo);
notEqual(req.proxyInfo.type, "direct");
await proxy.stop();
}
});
2 changes: 2 additions & 0 deletions netwerk/test/unit/xpcshell.ini
Original file line number Diff line number Diff line change
Expand Up @@ -778,3 +778,5 @@ skip-if =
run-sequentially = node server exceptions dont replay well
[test_non_ipv4_hostname_ending_in_number_cookie_db.js]
[test_verify_traffic.js]
[test_client_auth_with_proxy.js]
skip-if = os == "android"
15 changes: 15 additions & 0 deletions security/manager/ssl/NSSSocketControl.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -383,7 +383,15 @@ void NSSSocketControl::SetCertVerificationResult(PRErrorCode errorCode) {
AssertedCast<uint32_t>(mPlaintextBytesRead));
}

MOZ_LOG(gPIPNSSLog, LogLevel::Debug,
("[%p] SetCertVerificationResult to AfterCertVerification, "
"mTlsHandshakeCallback=%p",
(void*)mFd, mTlsHandshakeCallback.get()));

mCertVerificationState = AfterCertVerification;
if (mTlsHandshakeCallback) {
Unused << mTlsHandshakeCallback->CertVerificationDone();
}
}

void NSSSocketControl::ClientAuthCertificateSelected(
Expand Down Expand Up @@ -435,6 +443,13 @@ void NSSSocketControl::ClientAuthCertificateSelected(
mFd, sendingClientAuthCert ? SECSuccess : SECFailure,
sendingClientAuthCert ? key.release() : nullptr,
sendingClientAuthCert ? cert.release() : nullptr);

MOZ_LOG(gPIPNSSLog, LogLevel::Debug,
("[%p] ClientAuthCertificateSelected mTlsHandshakeCallback=%p",
(void*)mFd, mTlsHandshakeCallback.get()));
if (mTlsHandshakeCallback) {
Unused << mTlsHandshakeCallback->ClientAuthCertificateSelected();
}
}

SharedSSLState& NSSSocketControl::SharedState() {
Expand Down

0 comments on commit 3e7402a

Please sign in to comment.