TLS testing: Allow hostapd to be used as a TLS testing tool

The internal TLS server implementation and RADIUS server implementation
in hostapd can be configured to allow EAP clients to be tested to
perform TLS validation steps correctly. This functionality is not
included in the default build; CONFIG_TESTING_OPTIONS=y in
hostapd/.config can be used to enable this.

When enabled, the RADIUS server will configure special TLS test modes
based on the received User-Name attribute value in this format:
<user>@test-tls-<id>.<rest-of-realm>. For example,
anonymous@test-tls-1.example.com. When this special format is used, TLS
test modes are enabled. For other cases, the RADIUS server works
normally.

The following TLS test cases are enabled in this commit:
1 - break verify_data in the server Finished message
2 - break signed_params hash in ServerKeyExchange
3 - break Signature in ServerKeyExchange

Correctly behaving TLS client must abort connection if any of these
failures is detected and as such, shall not transmit continue the
session.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2014-03-02 00:43:59 +02:00
parent 994afe3390
commit 390b92913a
12 changed files with 150 additions and 0 deletions

View file

@ -17,6 +17,7 @@
#include "eloop.h"
#include "eap_server/eap.h"
#include "ap/ap_config.h"
#include "crypto/tls.h"
#include "radius_server.h"
/**
@ -533,6 +534,51 @@ radius_server_new_session(struct radius_server_data *data,
}
#ifdef CONFIG_TESTING_OPTIONS
static void radius_server_testing_options_tls(struct radius_session *sess,
const char *tls,
struct eap_config *eap_conf)
{
int test = atoi(tls);
switch (test) {
case 1:
srv_log(sess, "TLS test - break VerifyData");
eap_conf->tls_test_flags = TLS_BREAK_VERIFY_DATA;
break;
case 2:
srv_log(sess, "TLS test - break ServerKeyExchange ServerParams hash");
eap_conf->tls_test_flags = TLS_BREAK_SRV_KEY_X_HASH;
break;
case 3:
srv_log(sess, "TLS test - break ServerKeyExchange ServerParams Signature");
eap_conf->tls_test_flags = TLS_BREAK_SRV_KEY_X_SIGNATURE;
break;
default:
srv_log(sess, "Unrecognized TLS test");
break;
}
}
#endif /* CONFIG_TESTING_OPTIONS */
static void radius_server_testing_options(struct radius_session *sess,
struct eap_config *eap_conf)
{
#ifdef CONFIG_TESTING_OPTIONS
const char *pos;
pos = os_strstr(sess->username, "@test-");
if (pos == NULL)
return;
pos += 6;
if (os_strncmp(pos, "tls-", 4) == 0)
radius_server_testing_options_tls(sess, pos + 4, eap_conf);
else
srv_log(sess, "Unrecognized test: %s", pos);
#endif /* CONFIG_TESTING_OPTIONS */
}
static struct radius_session *
radius_server_get_new_session(struct radius_server_data *data,
struct radius_client *client,
@ -605,6 +651,7 @@ radius_server_get_new_session(struct radius_server_data *data,
eap_conf.pwd_group = data->pwd_group;
eap_conf.server_id = (const u8 *) data->server_id;
eap_conf.server_id_len = os_strlen(data->server_id);
radius_server_testing_options(sess, &eap_conf);
sess->eap = eap_server_sm_init(sess, &radius_server_eapol_cb,
&eap_conf);
if (sess->eap == NULL) {