blob: 8d945a11aece348ae99f7e72a396cda16ce10541 [file] [log] [blame]
Pierre Imai904ce3a2016-02-18 13:13:12 +09001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless requied by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 */
17
18#include <arpa/inet.h>
19#include <errno.h>
20#include <netdb.h>
21#include <stdarg.h>
22#include <stdio.h>
23#include <stdlib.h>
Pierre Imai95f5f942016-03-09 18:09:25 +090024#include <unistd.h>
Pierre Imai904ce3a2016-02-18 13:13:12 +090025
26#include <cutils/sockets.h>
Pierre Imai95f5f942016-03-09 18:09:25 +090027#include <android-base/stringprintf.h>
Pierre Imai904ce3a2016-02-18 13:13:12 +090028#include <private/android_filesystem_config.h>
Pierre Imai95f5f942016-03-09 18:09:25 +090029
Ben Schwartze7601812017-04-28 16:38:29 -040030#include <openssl/base64.h>
31
Pierre Imaibeedec32016-04-13 06:44:51 +090032#include <algorithm>
33#include <chrono>
34#include <iterator>
35#include <numeric>
Pierre Imai95f5f942016-03-09 18:09:25 +090036#include <thread>
37
Pierre Imaibeedec32016-04-13 06:44:51 +090038#define LOG_TAG "netd_test"
39// TODO: make this dynamic and stop depending on implementation details.
Pierre Imaibeedec32016-04-13 06:44:51 +090040#define TEST_NETID 30
41
Pierre Imai904ce3a2016-02-18 13:13:12 +090042#include "NetdClient.h"
43
44#include <gtest/gtest.h>
Pierre Imaibeedec32016-04-13 06:44:51 +090045
Pierre Imai904ce3a2016-02-18 13:13:12 +090046#include <utils/Log.h>
Pierre Imaibeedec32016-04-13 06:44:51 +090047
Pierre Imai904ce3a2016-02-18 13:13:12 +090048#include "dns_responder.h"
Robin Lee2cf56172016-09-13 18:55:42 +090049#include "dns_responder_client.h"
Ben Schwartze7601812017-04-28 16:38:29 -040050#include "dns_tls_frontend.h"
Pierre Imai95f5f942016-03-09 18:09:25 +090051#include "resolv_params.h"
Pierre Imaibeedec32016-04-13 06:44:51 +090052#include "ResolverStats.h"
53
54#include "android/net/INetd.h"
Michal Karpinski89167102016-10-26 10:33:26 +010055#include "android/net/metrics/INetdEventListener.h"
Pierre Imaibeedec32016-04-13 06:44:51 +090056#include "binder/IServiceManager.h"
Pierre Imai95f5f942016-03-09 18:09:25 +090057
58using android::base::StringPrintf;
59using android::base::StringAppendF;
Pierre Imaibeedec32016-04-13 06:44:51 +090060using android::net::ResolverStats;
Michal Karpinski89167102016-10-26 10:33:26 +010061using android::net::metrics::INetdEventListener;
Pierre Imai904ce3a2016-02-18 13:13:12 +090062
Pierre Imaibeedec32016-04-13 06:44:51 +090063// Emulates the behavior of UnorderedElementsAreArray, which currently cannot be used.
64// TODO: Use UnorderedElementsAreArray, which depends on being able to compile libgmock_host,
65// if that is not possible, improve this hacky algorithm, which is O(n**2)
66template <class A, class B>
67bool UnorderedCompareArray(const A& a, const B& b) {
68 if (a.size() != b.size()) return false;
69 for (const auto& a_elem : a) {
70 size_t a_count = 0;
71 for (const auto& a_elem2 : a) {
72 if (a_elem == a_elem2) {
73 ++a_count;
74 }
75 }
76 size_t b_count = 0;
77 for (const auto& b_elem : b) {
78 if (a_elem == b_elem) ++b_count;
79 }
80 if (a_count != b_count) return false;
81 }
82 return true;
83}
Pierre Imai904ce3a2016-02-18 13:13:12 +090084
Pierre Imai3a272072016-04-19 16:17:07 +090085class AddrInfo {
86 public:
87 AddrInfo() : ai_(nullptr), error_(0) {}
88
89 AddrInfo(const char* node, const char* service, const addrinfo& hints) : ai_(nullptr) {
90 init(node, service, hints);
91 }
92
93 AddrInfo(const char* node, const char* service) : ai_(nullptr) {
94 init(node, service);
95 }
96
97 ~AddrInfo() { clear(); }
98
99 int init(const char* node, const char* service, const addrinfo& hints) {
100 clear();
101 error_ = getaddrinfo(node, service, &hints, &ai_);
102 return error_;
103 }
104
105 int init(const char* node, const char* service) {
106 clear();
107 error_ = getaddrinfo(node, service, nullptr, &ai_);
108 return error_;
109 }
110
111 void clear() {
112 if (ai_ != nullptr) {
113 freeaddrinfo(ai_);
114 ai_ = nullptr;
115 error_ = 0;
116 }
117 }
118
119 const addrinfo& operator*() const { return *ai_; }
120 const addrinfo* get() const { return ai_; }
121 const addrinfo* operator&() const { return ai_; }
122 int error() const { return error_; }
123
124 private:
125 addrinfo* ai_;
126 int error_;
127};
128
Robin Lee2cf56172016-09-13 18:55:42 +0900129class ResolverTest : public ::testing::Test, public DnsResponderClient {
Michal Karpinski89167102016-10-26 10:33:26 +0100130private:
131 int mOriginalMetricsLevel;
132
Pierre Imai904ce3a2016-02-18 13:13:12 +0900133protected:
134 virtual void SetUp() {
135 // Ensure resolutions go via proxy.
Robin Lee2cf56172016-09-13 18:55:42 +0900136 DnsResponderClient::SetUp();
Michal Karpinski89167102016-10-26 10:33:26 +0100137
138 // If DNS reporting is off: turn it on so we run through everything.
139 auto rv = mNetdSrv->getMetricsReportingLevel(&mOriginalMetricsLevel);
140 ASSERT_TRUE(rv.isOk());
141 if (mOriginalMetricsLevel != INetdEventListener::REPORTING_LEVEL_FULL) {
142 rv = mNetdSrv->setMetricsReportingLevel(INetdEventListener::REPORTING_LEVEL_FULL);
143 ASSERT_TRUE(rv.isOk());
144 }
Pierre Imai904ce3a2016-02-18 13:13:12 +0900145 }
146
147 virtual void TearDown() {
Michal Karpinski89167102016-10-26 10:33:26 +0100148 if (mOriginalMetricsLevel != INetdEventListener::REPORTING_LEVEL_FULL) {
149 auto rv = mNetdSrv->setMetricsReportingLevel(mOriginalMetricsLevel);
150 ASSERT_TRUE(rv.isOk());
151 }
152
Robin Lee2cf56172016-09-13 18:55:42 +0900153 DnsResponderClient::TearDown();
Pierre Imai904ce3a2016-02-18 13:13:12 +0900154 }
155
Pierre Imaibeedec32016-04-13 06:44:51 +0900156 bool GetResolverInfo(std::vector<std::string>* servers, std::vector<std::string>* domains,
157 __res_params* params, std::vector<ResolverStats>* stats) {
158 using android::net::INetd;
159 std::vector<int32_t> params32;
160 std::vector<int32_t> stats32;
161 auto rv = mNetdSrv->getResolverInfo(TEST_NETID, servers, domains, &params32, &stats32);
162 if (!rv.isOk() || params32.size() != INetd::RESOLVER_PARAMS_COUNT) {
163 return false;
164 }
165 *params = __res_params {
166 .sample_validity = static_cast<uint16_t>(
167 params32[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY]),
168 .success_threshold = static_cast<uint8_t>(
169 params32[INetd::RESOLVER_PARAMS_SUCCESS_THRESHOLD]),
170 .min_samples = static_cast<uint8_t>(
171 params32[INetd::RESOLVER_PARAMS_MIN_SAMPLES]),
172 .max_samples = static_cast<uint8_t>(
173 params32[INetd::RESOLVER_PARAMS_MAX_SAMPLES])
174 };
175 return ResolverStats::decodeAll(stats32, stats);
176 }
177
Pierre Imai95f5f942016-03-09 18:09:25 +0900178 std::string ToString(const hostent* he) const {
179 if (he == nullptr) return "<null>";
180 char buffer[INET6_ADDRSTRLEN];
181 if (!inet_ntop(he->h_addrtype, he->h_addr_list[0], buffer, sizeof(buffer))) {
182 return "<invalid>";
183 }
184 return buffer;
Pierre Imaiccf7b992016-02-25 16:34:29 +0900185 }
186
Pierre Imai95f5f942016-03-09 18:09:25 +0900187 std::string ToString(const addrinfo* ai) const {
188 if (!ai)
Pierre Imai904ce3a2016-02-18 13:13:12 +0900189 return "<null>";
Pierre Imai95f5f942016-03-09 18:09:25 +0900190 for (const auto* aip = ai ; aip != nullptr ; aip = aip->ai_next) {
191 char host[NI_MAXHOST];
192 int rv = getnameinfo(aip->ai_addr, aip->ai_addrlen, host, sizeof(host), nullptr, 0,
193 NI_NUMERICHOST);
194 if (rv != 0)
195 return gai_strerror(rv);
196 return host;
197 }
198 return "<invalid>";
199 }
200
201 size_t GetNumQueries(const test::DNSResponder& dns, const char* name) const {
202 auto queries = dns.queries();
203 size_t found = 0;
204 for (const auto& p : queries) {
Pierre Imai95f5f942016-03-09 18:09:25 +0900205 if (p.first == name) {
206 ++found;
207 }
208 }
209 return found;
210 }
211
212 size_t GetNumQueriesForType(const test::DNSResponder& dns, ns_type type,
213 const char* name) const {
214 auto queries = dns.queries();
215 size_t found = 0;
216 for (const auto& p : queries) {
Pierre Imai95f5f942016-03-09 18:09:25 +0900217 if (p.second == type && p.first == name) {
218 ++found;
219 }
220 }
221 return found;
Pierre Imai904ce3a2016-02-18 13:13:12 +0900222 }
223
Pierre Imaibeedec32016-04-13 06:44:51 +0900224 void RunGetAddrInfoStressTest_Binder(unsigned num_hosts, unsigned num_threads,
225 unsigned num_queries) {
226 std::vector<std::string> domains = { "example.com" };
227 std::vector<std::unique_ptr<test::DNSResponder>> dns;
228 std::vector<std::string> servers;
Robin Lee2cf56172016-09-13 18:55:42 +0900229 std::vector<DnsResponderClient::Mapping> mappings;
Pierre Imaibeedec32016-04-13 06:44:51 +0900230 ASSERT_NO_FATAL_FAILURE(SetupMappings(num_hosts, domains, &mappings));
231 ASSERT_NO_FATAL_FAILURE(SetupDNSServers(MAXNS, mappings, &dns, &servers));
232
Pierre Imai0452cb52016-05-30 16:42:34 +0900233 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
Pierre Imaibeedec32016-04-13 06:44:51 +0900234
235 auto t0 = std::chrono::steady_clock::now();
236 std::vector<std::thread> threads(num_threads);
237 for (std::thread& thread : threads) {
Yi Kong1ad22582017-05-04 16:45:47 -0700238 thread = std::thread([this, &mappings, num_queries]() {
Pierre Imaibeedec32016-04-13 06:44:51 +0900239 for (unsigned i = 0 ; i < num_queries ; ++i) {
240 uint32_t ofs = arc4random_uniform(mappings.size());
Robin Leed67c77f2016-09-15 10:55:25 +0900241 auto& mapping = mappings[ofs];
Pierre Imaibeedec32016-04-13 06:44:51 +0900242 addrinfo* result = nullptr;
243 int rv = getaddrinfo(mapping.host.c_str(), nullptr, nullptr, &result);
244 EXPECT_EQ(0, rv) << "error [" << rv << "] " << gai_strerror(rv);
245 if (rv == 0) {
246 std::string result_str = ToString(result);
247 EXPECT_TRUE(result_str == mapping.ip4 || result_str == mapping.ip6)
248 << "result='" << result_str << "', ip4='" << mapping.ip4
249 << "', ip6='" << mapping.ip6;
250 }
251 if (result) {
252 freeaddrinfo(result);
253 result = nullptr;
254 }
255 }
256 });
257 }
258
259 for (std::thread& thread : threads) {
260 thread.join();
261 }
262 auto t1 = std::chrono::steady_clock::now();
263 ALOGI("%u hosts, %u threads, %u queries, %Es", num_hosts, num_threads, num_queries,
264 std::chrono::duration<double>(t1 - t0).count());
265 ASSERT_NO_FATAL_FAILURE(ShutdownDNSServers(&dns));
266 }
267
Pierre Imai95f5f942016-03-09 18:09:25 +0900268 const std::vector<std::string> mDefaultSearchDomains = { "example.com" };
269 // <sample validity in s> <success threshold in percent> <min samples> <max samples>
270 const std::string mDefaultParams = "300 25 8 8";
Pierre Imai0452cb52016-05-30 16:42:34 +0900271 const std::vector<int> mDefaultParams_Binder = { 300, 25, 8, 8 };
Pierre Imai904ce3a2016-02-18 13:13:12 +0900272};
273
Pierre Imai904ce3a2016-02-18 13:13:12 +0900274TEST_F(ResolverTest, GetHostByName) {
275 const char* listen_addr = "127.0.0.3";
276 const char* listen_srv = "53";
Pierre Imai95f5f942016-03-09 18:09:25 +0900277 const char* host_name = "hello.example.com.";
Michal Karpinski89167102016-10-26 10:33:26 +0100278 const char *nonexistent_host_name = "nonexistent.example.com.";
Pierre Imai95f5f942016-03-09 18:09:25 +0900279 test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail, 1.0);
280 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.3");
281 ASSERT_TRUE(dns.startServer());
282 std::vector<std::string> servers = { listen_addr };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900283 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Pierre Imai904ce3a2016-02-18 13:13:12 +0900284
Michal Karpinski89167102016-10-26 10:33:26 +0100285 const hostent* result;
286
Pierre Imai95f5f942016-03-09 18:09:25 +0900287 dns.clearQueries();
Michal Karpinski89167102016-10-26 10:33:26 +0100288 result = gethostbyname("nonexistent");
289 EXPECT_EQ(1U, GetNumQueriesForType(dns, ns_type::ns_t_a, nonexistent_host_name));
290 ASSERT_TRUE(result == nullptr);
291 ASSERT_EQ(HOST_NOT_FOUND, h_errno);
292
293 dns.clearQueries();
294 result = gethostbyname("hello");
Pierre Imai95f5f942016-03-09 18:09:25 +0900295 EXPECT_EQ(1U, GetNumQueriesForType(dns, ns_type::ns_t_a, host_name));
Pierre Imai904ce3a2016-02-18 13:13:12 +0900296 ASSERT_FALSE(result == nullptr);
297 ASSERT_EQ(4, result->h_length);
298 ASSERT_FALSE(result->h_addr_list[0] == nullptr);
Pierre Imai95f5f942016-03-09 18:09:25 +0900299 EXPECT_EQ("1.2.3.3", ToString(result));
Pierre Imai904ce3a2016-02-18 13:13:12 +0900300 EXPECT_TRUE(result->h_addr_list[1] == nullptr);
Michal Karpinski89167102016-10-26 10:33:26 +0100301
Pierre Imai95f5f942016-03-09 18:09:25 +0900302 dns.stopServer();
Pierre Imai904ce3a2016-02-18 13:13:12 +0900303}
304
Pierre Imaibeedec32016-04-13 06:44:51 +0900305TEST_F(ResolverTest, TestBinderSerialization) {
306 using android::net::INetd;
307 std::vector<int> params_offsets = {
308 INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY,
309 INetd::RESOLVER_PARAMS_SUCCESS_THRESHOLD,
310 INetd::RESOLVER_PARAMS_MIN_SAMPLES,
311 INetd::RESOLVER_PARAMS_MAX_SAMPLES
312 };
313 int size = static_cast<int>(params_offsets.size());
314 EXPECT_EQ(size, INetd::RESOLVER_PARAMS_COUNT);
315 std::sort(params_offsets.begin(), params_offsets.end());
316 for (int i = 0 ; i < size ; ++i) {
317 EXPECT_EQ(params_offsets[i], i);
318 }
319}
320
321TEST_F(ResolverTest, GetHostByName_Binder) {
322 using android::net::INetd;
323
324 std::vector<std::string> domains = { "example.com" };
325 std::vector<std::unique_ptr<test::DNSResponder>> dns;
326 std::vector<std::string> servers;
327 std::vector<Mapping> mappings;
328 ASSERT_NO_FATAL_FAILURE(SetupMappings(1, domains, &mappings));
329 ASSERT_NO_FATAL_FAILURE(SetupDNSServers(4, mappings, &dns, &servers));
330 ASSERT_EQ(1U, mappings.size());
331 const Mapping& mapping = mappings[0];
332
Pierre Imai0452cb52016-05-30 16:42:34 +0900333 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
Pierre Imaibeedec32016-04-13 06:44:51 +0900334
335 const hostent* result = gethostbyname(mapping.host.c_str());
336 size_t total_queries = std::accumulate(dns.begin(), dns.end(), 0,
337 [this, &mapping](size_t total, auto& d) {
338 return total + GetNumQueriesForType(*d, ns_type::ns_t_a, mapping.entry.c_str());
339 });
340
341 EXPECT_LE(1U, total_queries);
342 ASSERT_FALSE(result == nullptr);
343 ASSERT_EQ(4, result->h_length);
344 ASSERT_FALSE(result->h_addr_list[0] == nullptr);
345 EXPECT_EQ(mapping.ip4, ToString(result));
346 EXPECT_TRUE(result->h_addr_list[1] == nullptr);
347
348 std::vector<std::string> res_servers;
349 std::vector<std::string> res_domains;
350 __res_params res_params;
351 std::vector<ResolverStats> res_stats;
352 ASSERT_TRUE(GetResolverInfo(&res_servers, &res_domains, &res_params, &res_stats));
353 EXPECT_EQ(servers.size(), res_servers.size());
354 EXPECT_EQ(domains.size(), res_domains.size());
Pierre Imai0452cb52016-05-30 16:42:34 +0900355 ASSERT_EQ(INetd::RESOLVER_PARAMS_COUNT, mDefaultParams_Binder.size());
356 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY],
357 res_params.sample_validity);
358 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_SUCCESS_THRESHOLD],
359 res_params.success_threshold);
360 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_MIN_SAMPLES], res_params.min_samples);
361 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_MAX_SAMPLES], res_params.max_samples);
Pierre Imaibeedec32016-04-13 06:44:51 +0900362 EXPECT_EQ(servers.size(), res_stats.size());
363
364 EXPECT_TRUE(UnorderedCompareArray(res_servers, servers));
365 EXPECT_TRUE(UnorderedCompareArray(res_domains, domains));
366
367 ASSERT_NO_FATAL_FAILURE(ShutdownDNSServers(&dns));
368}
369
Pierre Imai904ce3a2016-02-18 13:13:12 +0900370TEST_F(ResolverTest, GetAddrInfo) {
371 addrinfo* result = nullptr;
372
373 const char* listen_addr = "127.0.0.4";
Pierre Imai6f4f86d2016-04-08 13:15:27 +0900374 const char* listen_addr2 = "127.0.0.5";
Pierre Imai904ce3a2016-02-18 13:13:12 +0900375 const char* listen_srv = "53";
Pierre Imaibeedec32016-04-13 06:44:51 +0900376 const char* host_name = "howdy.example.com.";
Pierre Imai95f5f942016-03-09 18:09:25 +0900377 test::DNSResponder dns(listen_addr, listen_srv, 250,
378 ns_rcode::ns_r_servfail, 1.0);
379 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4");
380 dns.addMapping(host_name, ns_type::ns_t_aaaa, "::1.2.3.4");
381 ASSERT_TRUE(dns.startServer());
Pierre Imai904ce3a2016-02-18 13:13:12 +0900382
Pierre Imai6f4f86d2016-04-08 13:15:27 +0900383 test::DNSResponder dns2(listen_addr2, listen_srv, 250,
384 ns_rcode::ns_r_servfail, 1.0);
385 dns2.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4");
386 dns2.addMapping(host_name, ns_type::ns_t_aaaa, "::1.2.3.4");
387 ASSERT_TRUE(dns2.startServer());
Pierre Imai6f4f86d2016-04-08 13:15:27 +0900388
Pierre Imai3a272072016-04-19 16:17:07 +0900389
Erik Klinef6106462016-11-24 08:30:34 +0900390 std::vector<std::string> servers = { listen_addr };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900391 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Erik Klinef6106462016-11-24 08:30:34 +0900392 dns.clearQueries();
393 dns2.clearQueries();
Pierre Imai3a272072016-04-19 16:17:07 +0900394
Erik Klinef6106462016-11-24 08:30:34 +0900395 EXPECT_EQ(0, getaddrinfo("howdy", nullptr, nullptr, &result));
396 size_t found = GetNumQueries(dns, host_name);
397 EXPECT_LE(1U, found);
398 // Could be A or AAAA
399 std::string result_str = ToString(result);
400 EXPECT_TRUE(result_str == "1.2.3.4" || result_str == "::1.2.3.4")
401 << ", result_str='" << result_str << "'";
402 // TODO: Use ScopedAddrinfo or similar once it is available in a common header file.
403 if (result) {
404 freeaddrinfo(result);
405 result = nullptr;
Pierre Imaibeedec32016-04-13 06:44:51 +0900406 }
Erik Klinef6106462016-11-24 08:30:34 +0900407
408 // Verify that the name is cached.
409 size_t old_found = found;
410 EXPECT_EQ(0, getaddrinfo("howdy", nullptr, nullptr, &result));
411 found = GetNumQueries(dns, host_name);
412 EXPECT_LE(1U, found);
413 EXPECT_EQ(old_found, found);
414 result_str = ToString(result);
415 EXPECT_TRUE(result_str == "1.2.3.4" || result_str == "::1.2.3.4")
416 << result_str;
417 if (result) {
418 freeaddrinfo(result);
419 result = nullptr;
420 }
421
422 // Change the DNS resolver, ensure that queries are still cached.
423 servers = { listen_addr2 };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900424 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Erik Klinef6106462016-11-24 08:30:34 +0900425 dns.clearQueries();
426 dns2.clearQueries();
427
428 EXPECT_EQ(0, getaddrinfo("howdy", nullptr, nullptr, &result));
429 found = GetNumQueries(dns, host_name);
430 size_t found2 = GetNumQueries(dns2, host_name);
431 EXPECT_EQ(0U, found);
432 EXPECT_LE(0U, found2);
433
434 // Could be A or AAAA
435 result_str = ToString(result);
436 EXPECT_TRUE(result_str == "1.2.3.4" || result_str == "::1.2.3.4")
437 << ", result_str='" << result_str << "'";
438 if (result) {
439 freeaddrinfo(result);
440 result = nullptr;
441 }
442
Pierre Imai6f4f86d2016-04-08 13:15:27 +0900443 dns.stopServer();
444 dns2.stopServer();
Pierre Imai904ce3a2016-02-18 13:13:12 +0900445}
446
447TEST_F(ResolverTest, GetAddrInfoV4) {
448 addrinfo* result = nullptr;
449
450 const char* listen_addr = "127.0.0.5";
451 const char* listen_srv = "53";
Pierre Imai95f5f942016-03-09 18:09:25 +0900452 const char* host_name = "hola.example.com.";
453 test::DNSResponder dns(listen_addr, listen_srv, 250,
454 ns_rcode::ns_r_servfail, 1.0);
455 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.5");
456 ASSERT_TRUE(dns.startServer());
457 std::vector<std::string> servers = { listen_addr };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900458 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Pierre Imai904ce3a2016-02-18 13:13:12 +0900459
460 addrinfo hints;
461 memset(&hints, 0, sizeof(hints));
462 hints.ai_family = AF_INET;
463 EXPECT_EQ(0, getaddrinfo("hola", nullptr, &hints, &result));
Pierre Imai95f5f942016-03-09 18:09:25 +0900464 EXPECT_EQ(1U, GetNumQueries(dns, host_name));
Pierre Imaiccf7b992016-02-25 16:34:29 +0900465 EXPECT_EQ("1.2.3.5", ToString(result));
Pierre Imaibeedec32016-04-13 06:44:51 +0900466 if (result) {
467 freeaddrinfo(result);
468 result = nullptr;
469 }
Pierre Imai904ce3a2016-02-18 13:13:12 +0900470}
Pierre Imai95f5f942016-03-09 18:09:25 +0900471
472TEST_F(ResolverTest, MultidomainResolution) {
473 std::vector<std::string> searchDomains = { "example1.com", "example2.com", "example3.com" };
474 const char* listen_addr = "127.0.0.6";
475 const char* listen_srv = "53";
476 const char* host_name = "nihao.example2.com.";
477 test::DNSResponder dns(listen_addr, listen_srv, 250,
478 ns_rcode::ns_r_servfail, 1.0);
479 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.3");
480 ASSERT_TRUE(dns.startServer());
481 std::vector<std::string> servers = { listen_addr };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900482 ASSERT_TRUE(SetResolversForNetwork(servers, searchDomains, mDefaultParams_Binder));
Pierre Imai95f5f942016-03-09 18:09:25 +0900483
484 dns.clearQueries();
485 const hostent* result = gethostbyname("nihao");
486 EXPECT_EQ(1U, GetNumQueriesForType(dns, ns_type::ns_t_a, host_name));
487 ASSERT_FALSE(result == nullptr);
488 ASSERT_EQ(4, result->h_length);
489 ASSERT_FALSE(result->h_addr_list[0] == nullptr);
490 EXPECT_EQ("1.2.3.3", ToString(result));
491 EXPECT_TRUE(result->h_addr_list[1] == nullptr);
492 dns.stopServer();
493}
494
495TEST_F(ResolverTest, GetAddrInfoV6_failing) {
496 addrinfo* result = nullptr;
497
498 const char* listen_addr0 = "127.0.0.7";
499 const char* listen_addr1 = "127.0.0.8";
500 const char* listen_srv = "53";
501 const char* host_name = "ohayou.example.com.";
502 test::DNSResponder dns0(listen_addr0, listen_srv, 250,
503 ns_rcode::ns_r_servfail, 0.0);
504 test::DNSResponder dns1(listen_addr1, listen_srv, 250,
505 ns_rcode::ns_r_servfail, 1.0);
506 dns0.addMapping(host_name, ns_type::ns_t_aaaa, "2001:db8::5");
507 dns1.addMapping(host_name, ns_type::ns_t_aaaa, "2001:db8::6");
508 ASSERT_TRUE(dns0.startServer());
509 ASSERT_TRUE(dns1.startServer());
510 std::vector<std::string> servers = { listen_addr0, listen_addr1 };
511 // <sample validity in s> <success threshold in percent> <min samples> <max samples>
Pierre Imai95f5f942016-03-09 18:09:25 +0900512 int sample_count = 8;
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900513 const std::vector<int> params = { 300, 25, sample_count, sample_count };
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400514 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, params));
Pierre Imai95f5f942016-03-09 18:09:25 +0900515
516 // Repeatedly perform resolutions for non-existing domains until MAXNSSAMPLES resolutions have
517 // reached the dns0, which is set to fail. No more requests should then arrive at that server
518 // for the next sample_lifetime seconds.
519 // TODO: This approach is implementation-dependent, change once metrics reporting is available.
520 addrinfo hints;
521 memset(&hints, 0, sizeof(hints));
522 hints.ai_family = AF_INET6;
523 for (int i = 0 ; i < sample_count ; ++i) {
524 std::string domain = StringPrintf("nonexistent%d", i);
525 getaddrinfo(domain.c_str(), nullptr, &hints, &result);
Pierre Imaibeedec32016-04-13 06:44:51 +0900526 if (result) {
527 freeaddrinfo(result);
528 result = nullptr;
529 }
Pierre Imai95f5f942016-03-09 18:09:25 +0900530 }
531 // Due to 100% errors for all possible samples, the server should be ignored from now on and
532 // only the second one used for all following queries, until NSSAMPLE_VALIDITY is reached.
533 dns0.clearQueries();
534 dns1.clearQueries();
535 EXPECT_EQ(0, getaddrinfo("ohayou", nullptr, &hints, &result));
536 EXPECT_EQ(0U, GetNumQueries(dns0, host_name));
537 EXPECT_EQ(1U, GetNumQueries(dns1, host_name));
Pierre Imaibeedec32016-04-13 06:44:51 +0900538 if (result) {
539 freeaddrinfo(result);
540 result = nullptr;
541 }
Pierre Imai95f5f942016-03-09 18:09:25 +0900542}
543
544TEST_F(ResolverTest, GetAddrInfoV6_concurrent) {
545 const char* listen_addr0 = "127.0.0.9";
546 const char* listen_addr1 = "127.0.0.10";
547 const char* listen_addr2 = "127.0.0.11";
548 const char* listen_srv = "53";
549 const char* host_name = "konbanha.example.com.";
550 test::DNSResponder dns0(listen_addr0, listen_srv, 250,
551 ns_rcode::ns_r_servfail, 1.0);
552 test::DNSResponder dns1(listen_addr1, listen_srv, 250,
553 ns_rcode::ns_r_servfail, 1.0);
554 test::DNSResponder dns2(listen_addr2, listen_srv, 250,
555 ns_rcode::ns_r_servfail, 1.0);
556 dns0.addMapping(host_name, ns_type::ns_t_aaaa, "2001:db8::5");
557 dns1.addMapping(host_name, ns_type::ns_t_aaaa, "2001:db8::6");
558 dns2.addMapping(host_name, ns_type::ns_t_aaaa, "2001:db8::7");
559 ASSERT_TRUE(dns0.startServer());
560 ASSERT_TRUE(dns1.startServer());
561 ASSERT_TRUE(dns2.startServer());
562 const std::vector<std::string> servers = { listen_addr0, listen_addr1, listen_addr2 };
563 std::vector<std::thread> threads(10);
564 for (std::thread& thread : threads) {
Yi Kong1ad22582017-05-04 16:45:47 -0700565 thread = std::thread([this, &servers]() {
Pierre Imai95f5f942016-03-09 18:09:25 +0900566 unsigned delay = arc4random_uniform(1*1000*1000); // <= 1s
567 usleep(delay);
568 std::vector<std::string> serverSubset;
569 for (const auto& server : servers) {
570 if (arc4random_uniform(2)) {
571 serverSubset.push_back(server);
572 }
573 }
574 if (serverSubset.empty()) serverSubset = servers;
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400575 ASSERT_TRUE(SetResolversForNetwork(serverSubset, mDefaultSearchDomains,
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900576 mDefaultParams_Binder));
Pierre Imai95f5f942016-03-09 18:09:25 +0900577 addrinfo hints;
578 memset(&hints, 0, sizeof(hints));
579 hints.ai_family = AF_INET6;
580 addrinfo* result = nullptr;
581 int rv = getaddrinfo("konbanha", nullptr, &hints, &result);
582 EXPECT_EQ(0, rv) << "error [" << rv << "] " << gai_strerror(rv);
Pierre Imaibeedec32016-04-13 06:44:51 +0900583 if (result) {
584 freeaddrinfo(result);
585 result = nullptr;
586 }
Pierre Imai95f5f942016-03-09 18:09:25 +0900587 });
588 }
589 for (std::thread& thread : threads) {
590 thread.join();
591 }
592}
Pierre Imaibeedec32016-04-13 06:44:51 +0900593
594TEST_F(ResolverTest, GetAddrInfoStressTest_Binder_100) {
595 const unsigned num_hosts = 100;
596 const unsigned num_threads = 100;
597 const unsigned num_queries = 100;
598 ASSERT_NO_FATAL_FAILURE(RunGetAddrInfoStressTest_Binder(num_hosts, num_threads, num_queries));
599}
600
601TEST_F(ResolverTest, GetAddrInfoStressTest_Binder_100000) {
602 const unsigned num_hosts = 100000;
603 const unsigned num_threads = 100;
604 const unsigned num_queries = 100;
605 ASSERT_NO_FATAL_FAILURE(RunGetAddrInfoStressTest_Binder(num_hosts, num_threads, num_queries));
606}
607
608TEST_F(ResolverTest, EmptySetup) {
609 using android::net::INetd;
610 std::vector<std::string> servers;
611 std::vector<std::string> domains;
Pierre Imai0452cb52016-05-30 16:42:34 +0900612 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
Pierre Imaibeedec32016-04-13 06:44:51 +0900613 std::vector<std::string> res_servers;
614 std::vector<std::string> res_domains;
615 __res_params res_params;
616 std::vector<ResolverStats> res_stats;
617 ASSERT_TRUE(GetResolverInfo(&res_servers, &res_domains, &res_params, &res_stats));
618 EXPECT_EQ(0U, res_servers.size());
619 EXPECT_EQ(0U, res_domains.size());
Pierre Imai0452cb52016-05-30 16:42:34 +0900620 ASSERT_EQ(INetd::RESOLVER_PARAMS_COUNT, mDefaultParams_Binder.size());
621 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_SAMPLE_VALIDITY],
622 res_params.sample_validity);
623 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_SUCCESS_THRESHOLD],
624 res_params.success_threshold);
625 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_MIN_SAMPLES], res_params.min_samples);
626 EXPECT_EQ(mDefaultParams_Binder[INetd::RESOLVER_PARAMS_MAX_SAMPLES], res_params.max_samples);
Pierre Imaibeedec32016-04-13 06:44:51 +0900627}
Pierre Imaiee335ef2016-05-06 11:56:45 +0900628
629TEST_F(ResolverTest, SearchPathChange) {
630 addrinfo* result = nullptr;
631
632 const char* listen_addr = "127.0.0.13";
633 const char* listen_srv = "53";
634 const char* host_name1 = "test13.domain1.org.";
635 const char* host_name2 = "test13.domain2.org.";
636 test::DNSResponder dns(listen_addr, listen_srv, 250,
637 ns_rcode::ns_r_servfail, 1.0);
638 dns.addMapping(host_name1, ns_type::ns_t_aaaa, "2001:db8::13");
639 dns.addMapping(host_name2, ns_type::ns_t_aaaa, "2001:db8::1:13");
640 ASSERT_TRUE(dns.startServer());
641 std::vector<std::string> servers = { listen_addr };
642 std::vector<std::string> domains = { "domain1.org" };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900643 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
Pierre Imaiee335ef2016-05-06 11:56:45 +0900644
645 addrinfo hints;
646 memset(&hints, 0, sizeof(hints));
647 hints.ai_family = AF_INET6;
648 EXPECT_EQ(0, getaddrinfo("test13", nullptr, &hints, &result));
649 EXPECT_EQ(1U, dns.queries().size());
650 EXPECT_EQ(1U, GetNumQueries(dns, host_name1));
651 EXPECT_EQ("2001:db8::13", ToString(result));
652 if (result) freeaddrinfo(result);
653
654 // Test that changing the domain search path on its own works.
655 domains = { "domain2.org" };
Lorenzo Colittid33e96d2016-12-15 23:59:01 +0900656 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
Pierre Imaiee335ef2016-05-06 11:56:45 +0900657 dns.clearQueries();
658
659 EXPECT_EQ(0, getaddrinfo("test13", nullptr, &hints, &result));
660 EXPECT_EQ(1U, dns.queries().size());
661 EXPECT_EQ(1U, GetNumQueries(dns, host_name2));
662 EXPECT_EQ("2001:db8::1:13", ToString(result));
663 if (result) freeaddrinfo(result);
664}
Pierre Imai0452cb52016-05-30 16:42:34 +0900665
666TEST_F(ResolverTest, MaxServerPrune_Binder) {
667 using android::net::INetd;
668
669 std::vector<std::string> domains = { "example.com" };
670 std::vector<std::unique_ptr<test::DNSResponder>> dns;
671 std::vector<std::string> servers;
672 std::vector<Mapping> mappings;
673 ASSERT_NO_FATAL_FAILURE(SetupMappings(1, domains, &mappings));
674 ASSERT_NO_FATAL_FAILURE(SetupDNSServers(MAXNS + 1, mappings, &dns, &servers));
675
676 ASSERT_TRUE(SetResolversForNetwork(servers, domains, mDefaultParams_Binder));
677
678 std::vector<std::string> res_servers;
679 std::vector<std::string> res_domains;
680 __res_params res_params;
681 std::vector<ResolverStats> res_stats;
682 ASSERT_TRUE(GetResolverInfo(&res_servers, &res_domains, &res_params, &res_stats));
683 EXPECT_EQ(static_cast<size_t>(MAXNS), res_servers.size());
684
685 ASSERT_NO_FATAL_FAILURE(ShutdownDNSServers(&dns));
686}
Ben Schwartze7601812017-04-28 16:38:29 -0400687
688static std::string base64Encode(const std::vector<uint8_t>& input) {
689 size_t out_len;
690 EXPECT_EQ(1, EVP_EncodedLength(&out_len, input.size()));
691 // out_len includes the trailing NULL.
692 uint8_t output_bytes[out_len];
693 EXPECT_EQ(out_len - 1, EVP_EncodeBlock(output_bytes, input.data(), input.size()));
694 return std::string(reinterpret_cast<char*>(output_bytes));
695}
696
697// Test what happens if the specified TLS server is nonexistent.
698TEST_F(ResolverTest, GetHostByName_TlsMissing) {
699 const char* listen_addr = "127.0.0.3";
700 const char* listen_srv = "53";
701 const char* host_name = "tlsmissing.example.com.";
702 test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail, 1.0);
703 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.3");
704 ASSERT_TRUE(dns.startServer());
705 std::vector<std::string> servers = { listen_addr };
706
707 // There's nothing listening on this address, so validation will either fail or
708 /// hang. Either way, queries will continue to flow to the DNSResponder.
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400709 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "", {}));
Ben Schwartze7601812017-04-28 16:38:29 -0400710
711 const hostent* result;
712
713 result = gethostbyname("tlsmissing");
714 ASSERT_FALSE(result == nullptr);
715 EXPECT_EQ("1.2.3.3", ToString(result));
716
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400717 // Clear TLS bit.
718 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400719 dns.stopServer();
720}
721
722// Test what happens if the specified TLS server replies with garbage.
723TEST_F(ResolverTest, GetHostByName_TlsBroken) {
724 const char* listen_addr = "127.0.0.3";
725 const char* listen_srv = "53";
726 const char* host_name1 = "tlsbroken1.example.com.";
727 const char* host_name2 = "tlsbroken2.example.com.";
728 test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail, 1.0);
729 dns.addMapping(host_name1, ns_type::ns_t_a, "1.2.3.1");
730 dns.addMapping(host_name2, ns_type::ns_t_a, "1.2.3.2");
731 ASSERT_TRUE(dns.startServer());
732 std::vector<std::string> servers = { listen_addr };
733
734 // Bind the specified private DNS socket but don't respond to any client sockets yet.
735 int s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
736 ASSERT_TRUE(s >= 0);
737 struct sockaddr_in tlsServer = {
738 .sin_family = AF_INET,
739 .sin_port = htons(853),
740 };
741 ASSERT_TRUE(inet_pton(AF_INET, listen_addr, &tlsServer.sin_addr));
Ben Schwartzcbdd64a2017-08-23 18:21:46 -0400742 const int one = 1;
743 setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &one, sizeof(one));
744 setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
Ben Schwartze7601812017-04-28 16:38:29 -0400745 ASSERT_FALSE(bind(s, reinterpret_cast<struct sockaddr*>(&tlsServer), sizeof(tlsServer)));
746 ASSERT_FALSE(listen(s, 1));
747
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400748 // Trigger TLS validation.
749 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "", {}));
Ben Schwartze7601812017-04-28 16:38:29 -0400750
Ben Schwartze7601812017-04-28 16:38:29 -0400751 struct sockaddr_storage cliaddr;
752 socklen_t sin_size = sizeof(cliaddr);
753 int new_fd = accept(s, reinterpret_cast<struct sockaddr *>(&cliaddr), &sin_size);
754 ASSERT_TRUE(new_fd > 0);
755
756 // We've received the new file descriptor but not written to it or closed, so the
757 // validation is still pending. Queries should still flow correctly because the
758 // server is not used until validation succeeds.
759 const hostent* result;
760 result = gethostbyname("tlsbroken1");
761 ASSERT_FALSE(result == nullptr);
762 EXPECT_EQ("1.2.3.1", ToString(result));
763
764 // Now we cause the validation to fail.
765 std::string garbage = "definitely not a valid TLS ServerHello";
766 write(new_fd, garbage.data(), garbage.size());
767 close(new_fd);
768
769 // Validation failure shouldn't interfere with lookups, because lookups won't be sent
770 // to the TLS server unless validation succeeds.
771 result = gethostbyname("tlsbroken2");
772 ASSERT_FALSE(result == nullptr);
773 EXPECT_EQ("1.2.3.2", ToString(result));
774
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400775 // Clear TLS bit.
776 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400777 dns.stopServer();
778 close(s);
779}
780
781TEST_F(ResolverTest, GetHostByName_Tls) {
782 const char* listen_addr = "127.0.0.3";
783 const char* listen_udp = "53";
784 const char* listen_tls = "853";
785 const char* host_name1 = "tls1.example.com.";
786 const char* host_name2 = "tls2.example.com.";
787 const char* host_name3 = "tls3.example.com.";
788 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
789 dns.addMapping(host_name1, ns_type::ns_t_a, "1.2.3.1");
790 dns.addMapping(host_name2, ns_type::ns_t_a, "1.2.3.2");
791 dns.addMapping(host_name3, ns_type::ns_t_a, "1.2.3.3");
792 ASSERT_TRUE(dns.startServer());
793 std::vector<std::string> servers = { listen_addr };
794
795 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
796 ASSERT_TRUE(tls.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400797 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "", {}));
Ben Schwartze7601812017-04-28 16:38:29 -0400798
799 const hostent* result;
800
801 // Wait for validation to complete.
802 EXPECT_TRUE(tls.waitForQueries(1, 5000));
803
804 result = gethostbyname("tls1");
805 ASSERT_FALSE(result == nullptr);
806 EXPECT_EQ("1.2.3.1", ToString(result));
807
808 // Wait for query to get counted.
809 EXPECT_TRUE(tls.waitForQueries(2, 5000));
810
811 // Stop the TLS server. Since it's already been validated, queries will
812 // continue to be routed to it.
813 tls.stopServer();
814
815 result = gethostbyname("tls2");
816 EXPECT_TRUE(result == nullptr);
817 EXPECT_EQ(HOST_NOT_FOUND, h_errno);
818
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400819 // Reset the resolvers without enabling TLS. Queries should now be routed to the
Ben Schwartze7601812017-04-28 16:38:29 -0400820 // UDP endpoint.
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400821 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400822
823 result = gethostbyname("tls3");
824 ASSERT_FALSE(result == nullptr);
825 EXPECT_EQ("1.2.3.3", ToString(result));
826
827 dns.stopServer();
828}
829
830TEST_F(ResolverTest, GetHostByName_TlsFingerprint) {
831 const char* listen_addr = "127.0.0.3";
832 const char* listen_udp = "53";
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400833 const char* listen_tls = "853";
Ben Schwartzcbdd64a2017-08-23 18:21:46 -0400834 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
835 ASSERT_TRUE(dns.startServer());
Ben Schwartzf028d392017-07-10 15:07:12 -0400836 for (int chain_length = 1; chain_length <= 3; ++chain_length) {
837 const char* host_name = StringPrintf("tlsfingerprint%d.example.com.", chain_length).c_str();
Ben Schwartzf028d392017-07-10 15:07:12 -0400838 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.1");
Ben Schwartzf028d392017-07-10 15:07:12 -0400839 std::vector<std::string> servers = { listen_addr };
Ben Schwartze7601812017-04-28 16:38:29 -0400840
Ben Schwartzf028d392017-07-10 15:07:12 -0400841 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
842 tls.set_chain_length(chain_length);
843 ASSERT_TRUE(tls.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400844 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
845 { base64Encode(tls.fingerprint()) }));
Ben Schwartze7601812017-04-28 16:38:29 -0400846
Ben Schwartzf028d392017-07-10 15:07:12 -0400847 const hostent* result;
Ben Schwartze7601812017-04-28 16:38:29 -0400848
Ben Schwartzf028d392017-07-10 15:07:12 -0400849 // Wait for validation to complete.
850 EXPECT_TRUE(tls.waitForQueries(1, 5000));
Ben Schwartze7601812017-04-28 16:38:29 -0400851
Ben Schwartzf028d392017-07-10 15:07:12 -0400852 result = gethostbyname(StringPrintf("tlsfingerprint%d", chain_length).c_str());
853 EXPECT_FALSE(result == nullptr);
854 if (result) {
855 EXPECT_EQ("1.2.3.1", ToString(result));
Ben Schwartze7601812017-04-28 16:38:29 -0400856
Ben Schwartzf028d392017-07-10 15:07:12 -0400857 // Wait for query to get counted.
858 EXPECT_TRUE(tls.waitForQueries(2, 5000));
859 }
Ben Schwartze7601812017-04-28 16:38:29 -0400860
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400861 // Clear TLS bit to ensure revalidation.
862 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartzf028d392017-07-10 15:07:12 -0400863 tls.stopServer();
Ben Schwartzf028d392017-07-10 15:07:12 -0400864 }
Ben Schwartzcbdd64a2017-08-23 18:21:46 -0400865 dns.stopServer();
Ben Schwartze7601812017-04-28 16:38:29 -0400866}
867
868TEST_F(ResolverTest, GetHostByName_BadTlsFingerprint) {
869 const char* listen_addr = "127.0.0.3";
870 const char* listen_udp = "53";
871 const char* listen_tls = "853";
872 const char* host_name = "badtlsfingerprint.example.com.";
873 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
874 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.1");
875 ASSERT_TRUE(dns.startServer());
876 std::vector<std::string> servers = { listen_addr };
877
878 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
879 ASSERT_TRUE(tls.startServer());
880 std::vector<uint8_t> bad_fingerprint = tls.fingerprint();
881 bad_fingerprint[5] += 1; // Corrupt the fingerprint.
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400882 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
883 { base64Encode(bad_fingerprint) }));
Ben Schwartze7601812017-04-28 16:38:29 -0400884
885 // The initial validation should fail at the fingerprint check before
886 // issuing a query.
887 EXPECT_FALSE(tls.waitForQueries(1, 500));
888
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400889 // A fingerprint was provided and failed to match, so the query should fail.
890 EXPECT_EQ(nullptr, gethostbyname("badtlsfingerprint"));
Ben Schwartze7601812017-04-28 16:38:29 -0400891
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400892 // Clear TLS bit.
893 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400894 tls.stopServer();
895 dns.stopServer();
896}
897
898// Test that we can pass two different fingerprints, and connection succeeds as long as
899// at least one of them matches the server.
900TEST_F(ResolverTest, GetHostByName_TwoTlsFingerprints) {
901 const char* listen_addr = "127.0.0.3";
902 const char* listen_udp = "53";
903 const char* listen_tls = "853";
904 const char* host_name = "twotlsfingerprints.example.com.";
905 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
906 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.1");
907 ASSERT_TRUE(dns.startServer());
908 std::vector<std::string> servers = { listen_addr };
909
910 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
911 ASSERT_TRUE(tls.startServer());
912 std::vector<uint8_t> bad_fingerprint = tls.fingerprint();
913 bad_fingerprint[5] += 1; // Corrupt the fingerprint.
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400914 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
915 { base64Encode(bad_fingerprint), base64Encode(tls.fingerprint()) }));
Ben Schwartze7601812017-04-28 16:38:29 -0400916
917 const hostent* result;
918
919 // Wait for validation to complete.
920 EXPECT_TRUE(tls.waitForQueries(1, 5000));
921
922 result = gethostbyname("twotlsfingerprints");
923 ASSERT_FALSE(result == nullptr);
924 EXPECT_EQ("1.2.3.1", ToString(result));
925
926 // Wait for query to get counted.
927 EXPECT_TRUE(tls.waitForQueries(2, 5000));
928
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400929 // Clear TLS bit.
930 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400931 tls.stopServer();
932 dns.stopServer();
933}
934
935TEST_F(ResolverTest, GetHostByName_TlsFingerprintGoesBad) {
936 const char* listen_addr = "127.0.0.3";
937 const char* listen_udp = "53";
938 const char* listen_tls = "853";
939 const char* host_name1 = "tlsfingerprintgoesbad1.example.com.";
940 const char* host_name2 = "tlsfingerprintgoesbad2.example.com.";
941 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
942 dns.addMapping(host_name1, ns_type::ns_t_a, "1.2.3.1");
943 dns.addMapping(host_name2, ns_type::ns_t_a, "1.2.3.2");
944 ASSERT_TRUE(dns.startServer());
945 std::vector<std::string> servers = { listen_addr };
946
947 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
948 ASSERT_TRUE(tls.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400949 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
950 { base64Encode(tls.fingerprint()) }));
Ben Schwartze7601812017-04-28 16:38:29 -0400951
952 const hostent* result;
953
954 // Wait for validation to complete.
955 EXPECT_TRUE(tls.waitForQueries(1, 5000));
956
957 result = gethostbyname("tlsfingerprintgoesbad1");
958 ASSERT_FALSE(result == nullptr);
959 EXPECT_EQ("1.2.3.1", ToString(result));
960
961 // Wait for query to get counted.
962 EXPECT_TRUE(tls.waitForQueries(2, 5000));
963
964 // Restart the TLS server. This will generate a new certificate whose fingerprint
965 // no longer matches the stored fingerprint.
966 tls.stopServer();
967 tls.startServer();
968
969 result = gethostbyname("tlsfingerprintgoesbad2");
970 ASSERT_TRUE(result == nullptr);
971 EXPECT_EQ(HOST_NOT_FOUND, h_errno);
972
Ben Schwartz4204ecf2017-10-02 12:35:48 -0400973 // Clear TLS bit.
974 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -0400975 tls.stopServer();
976 dns.stopServer();
977}
978
979TEST_F(ResolverTest, GetHostByName_TlsFailover) {
980 const char* listen_addr1 = "127.0.0.3";
981 const char* listen_addr2 = "127.0.0.4";
982 const char* listen_udp = "53";
983 const char* listen_tls = "853";
984 const char* host_name1 = "tlsfailover1.example.com.";
985 const char* host_name2 = "tlsfailover2.example.com.";
986 test::DNSResponder dns1(listen_addr1, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
987 test::DNSResponder dns2(listen_addr2, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
988 dns1.addMapping(host_name1, ns_type::ns_t_a, "1.2.3.1");
989 dns1.addMapping(host_name2, ns_type::ns_t_a, "1.2.3.2");
990 dns2.addMapping(host_name1, ns_type::ns_t_a, "1.2.3.3");
991 dns2.addMapping(host_name2, ns_type::ns_t_a, "1.2.3.4");
992 ASSERT_TRUE(dns1.startServer());
993 ASSERT_TRUE(dns2.startServer());
994 std::vector<std::string> servers = { listen_addr1, listen_addr2 };
995
996 test::DnsTlsFrontend tls1(listen_addr1, listen_tls, listen_addr1, listen_udp);
997 test::DnsTlsFrontend tls2(listen_addr2, listen_tls, listen_addr2, listen_udp);
998 ASSERT_TRUE(tls1.startServer());
999 ASSERT_TRUE(tls2.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001000 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
1001 { base64Encode(tls1.fingerprint()), base64Encode(tls2.fingerprint()) }));
Ben Schwartze7601812017-04-28 16:38:29 -04001002
1003 const hostent* result;
1004
1005 // Wait for validation to complete.
1006 EXPECT_TRUE(tls1.waitForQueries(1, 5000));
1007 EXPECT_TRUE(tls2.waitForQueries(1, 5000));
1008
1009 result = gethostbyname("tlsfailover1");
1010 ASSERT_FALSE(result == nullptr);
1011 EXPECT_EQ("1.2.3.1", ToString(result));
1012
1013 // Wait for query to get counted.
1014 EXPECT_TRUE(tls1.waitForQueries(2, 5000));
1015 // No new queries should have reached tls2.
1016 EXPECT_EQ(1, tls2.queries());
1017
1018 // Stop tls1. Subsequent queries should attempt to reach tls1, fail, and retry to tls2.
1019 tls1.stopServer();
1020
1021 result = gethostbyname("tlsfailover2");
1022 EXPECT_EQ("1.2.3.4", ToString(result));
1023
1024 // Wait for query to get counted.
1025 EXPECT_TRUE(tls2.waitForQueries(2, 5000));
1026
1027 // No additional queries should have reached the insecure servers.
1028 EXPECT_EQ(2U, dns1.queries().size());
1029 EXPECT_EQ(2U, dns2.queries().size());
1030
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001031 // Clear TLS bit.
1032 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -04001033 tls2.stopServer();
1034 dns1.stopServer();
1035 dns2.stopServer();
1036}
1037
Ben Schwartz1691bc42017-08-16 12:53:09 -04001038TEST_F(ResolverTest, GetHostByName_BadTlsName) {
1039 const char* listen_addr = "127.0.0.3";
1040 const char* listen_udp = "53";
1041 const char* listen_tls = "853";
1042 const char* host_name = "badtlsname.example.com.";
1043 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
1044 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.1");
1045 ASSERT_TRUE(dns.startServer());
1046 std::vector<std::string> servers = { listen_addr };
1047
1048 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
1049 ASSERT_TRUE(tls.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001050 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder,
1051 "www.example.com", {}));
Ben Schwartz1691bc42017-08-16 12:53:09 -04001052
1053 // The TLS server's certificate doesn't chain to a known CA, and a nonempty name was specified,
1054 // so the client should fail the TLS handshake before ever issuing a query.
1055 EXPECT_FALSE(tls.waitForQueries(1, 500));
1056
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001057 // The query should fail hard, because a name was specified.
1058 EXPECT_EQ(nullptr, gethostbyname("badtlsname"));
Ben Schwartz1691bc42017-08-16 12:53:09 -04001059
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001060 // Clear TLS bit.
1061 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartz1691bc42017-08-16 12:53:09 -04001062 tls.stopServer();
1063 dns.stopServer();
1064}
1065
Ben Schwartze7601812017-04-28 16:38:29 -04001066TEST_F(ResolverTest, GetAddrInfo_Tls) {
1067 const char* listen_addr = "127.0.0.3";
1068 const char* listen_udp = "53";
1069 const char* listen_tls = "853";
1070 const char* host_name = "addrinfotls.example.com.";
1071 test::DNSResponder dns(listen_addr, listen_udp, 250, ns_rcode::ns_r_servfail, 1.0);
1072 dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4");
1073 dns.addMapping(host_name, ns_type::ns_t_aaaa, "::1.2.3.4");
1074 ASSERT_TRUE(dns.startServer());
1075 std::vector<std::string> servers = { listen_addr };
1076
1077 test::DnsTlsFrontend tls(listen_addr, listen_tls, listen_addr, listen_udp);
1078 ASSERT_TRUE(tls.startServer());
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001079 ASSERT_TRUE(SetResolversWithTls(servers, mDefaultSearchDomains, mDefaultParams_Binder, "",
1080 { base64Encode(tls.fingerprint()) }));
Ben Schwartze7601812017-04-28 16:38:29 -04001081
1082 // Wait for validation to complete.
1083 EXPECT_TRUE(tls.waitForQueries(1, 5000));
1084
1085 dns.clearQueries();
1086 addrinfo* result = nullptr;
1087 EXPECT_EQ(0, getaddrinfo("addrinfotls", nullptr, nullptr, &result));
1088 size_t found = GetNumQueries(dns, host_name);
1089 EXPECT_LE(1U, found);
1090 // Could be A or AAAA
1091 std::string result_str = ToString(result);
1092 EXPECT_TRUE(result_str == "1.2.3.4" || result_str == "::1.2.3.4")
1093 << ", result_str='" << result_str << "'";
1094 // TODO: Use ScopedAddrinfo or similar once it is available in a common header file.
1095 if (result) {
1096 freeaddrinfo(result);
1097 result = nullptr;
1098 }
1099 // Wait for both A and AAAA queries to get counted.
1100 EXPECT_TRUE(tls.waitForQueries(3, 5000));
1101
Ben Schwartz4204ecf2017-10-02 12:35:48 -04001102 // Clear TLS bit.
1103 ASSERT_TRUE(SetResolversForNetwork(servers, mDefaultSearchDomains, mDefaultParams_Binder));
Ben Schwartze7601812017-04-28 16:38:29 -04001104 tls.stopServer();
1105 dns.stopServer();
1106}