test_socks.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504
  1. # Copyright (c) Twisted Matrix Laboratories.
  2. # See LICENSE for details.
  3. """
  4. Tests for L{twisted.protocol.socks}, an implementation of the SOCKSv4 and
  5. SOCKSv4a protocols.
  6. """
  7. import struct, socket
  8. from twisted.internet import defer, address
  9. from twisted.internet.error import DNSLookupError
  10. from twisted.python.compat import iterbytes
  11. from twisted.protocols import socks
  12. from twisted.test import proto_helpers
  13. from twisted.trial import unittest
  14. class StringTCPTransport(proto_helpers.StringTransport):
  15. stringTCPTransport_closing = False
  16. peer = None
  17. def getPeer(self):
  18. return self.peer
  19. def getHost(self):
  20. return address.IPv4Address('TCP', '2.3.4.5', 42)
  21. def loseConnection(self):
  22. self.stringTCPTransport_closing = True
  23. class FakeResolverReactor:
  24. """
  25. Bare-bones reactor with deterministic behavior for the resolve method.
  26. """
  27. def __init__(self, names):
  28. """
  29. @type names: L{dict} containing L{str} keys and L{str} values.
  30. @param names: A hostname to IP address mapping. The IP addresses are
  31. stringified dotted quads.
  32. """
  33. self.names = names
  34. def resolve(self, hostname):
  35. """
  36. Resolve a hostname by looking it up in the C{names} dictionary.
  37. """
  38. try:
  39. return defer.succeed(self.names[hostname])
  40. except KeyError:
  41. return defer.fail(
  42. DNSLookupError("FakeResolverReactor couldn't find " +
  43. hostname.decode("utf-8")))
  44. class SOCKSv4Driver(socks.SOCKSv4):
  45. # last SOCKSv4Outgoing instantiated
  46. driver_outgoing = None
  47. # last SOCKSv4IncomingFactory instantiated
  48. driver_listen = None
  49. def connectClass(self, host, port, klass, *args):
  50. # fake it
  51. proto = klass(*args)
  52. proto.transport = StringTCPTransport()
  53. proto.transport.peer = address.IPv4Address('TCP', host, port)
  54. proto.connectionMade()
  55. self.driver_outgoing = proto
  56. return defer.succeed(proto)
  57. def listenClass(self, port, klass, *args):
  58. # fake it
  59. factory = klass(*args)
  60. self.driver_listen = factory
  61. if port == 0:
  62. port = 1234
  63. return defer.succeed(('6.7.8.9', port))
  64. class ConnectTests(unittest.TestCase):
  65. """
  66. Tests for SOCKS and SOCKSv4a connect requests using the L{SOCKSv4} protocol.
  67. """
  68. def setUp(self):
  69. self.sock = SOCKSv4Driver()
  70. self.sock.transport = StringTCPTransport()
  71. self.sock.connectionMade()
  72. self.sock.reactor = FakeResolverReactor({b"localhost":"127.0.0.1"})
  73. def tearDown(self):
  74. outgoing = self.sock.driver_outgoing
  75. if outgoing is not None:
  76. self.assertTrue(outgoing.transport.stringTCPTransport_closing,
  77. "Outgoing SOCKS connections need to be closed.")
  78. def test_simple(self):
  79. self.sock.dataReceived(
  80. struct.pack('!BBH', 4, 1, 34)
  81. + socket.inet_aton('1.2.3.4')
  82. + b'fooBAR'
  83. + b'\0')
  84. sent = self.sock.transport.value()
  85. self.sock.transport.clear()
  86. self.assertEqual(sent,
  87. struct.pack('!BBH', 0, 90, 34)
  88. + socket.inet_aton('1.2.3.4'))
  89. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  90. self.assertIsNotNone(self.sock.driver_outgoing)
  91. # pass some data through
  92. self.sock.dataReceived(b'hello, world')
  93. self.assertEqual(self.sock.driver_outgoing.transport.value(),
  94. b'hello, world')
  95. # the other way around
  96. self.sock.driver_outgoing.dataReceived(b'hi there')
  97. self.assertEqual(self.sock.transport.value(), b'hi there')
  98. self.sock.connectionLost('fake reason')
  99. def test_socks4aSuccessfulResolution(self):
  100. """
  101. If the destination IP address has zeros for the first three octets and
  102. non-zero for the fourth octet, the client is attempting a v4a
  103. connection. A hostname is specified after the user ID string and the
  104. server connects to the address that hostname resolves to.
  105. @see: U{http://en.wikipedia.org/wiki/SOCKS#SOCKS_4a_protocol}
  106. """
  107. # send the domain name "localhost" to be resolved
  108. clientRequest = (
  109. struct.pack('!BBH', 4, 1, 34)
  110. + socket.inet_aton('0.0.0.1')
  111. + b'fooBAZ\0'
  112. + b'localhost\0')
  113. # Deliver the bytes one by one to exercise the protocol's buffering
  114. # logic. FakeResolverReactor's resolve method is invoked to "resolve"
  115. # the hostname.
  116. for byte in iterbytes(clientRequest):
  117. self.sock.dataReceived(byte)
  118. sent = self.sock.transport.value()
  119. self.sock.transport.clear()
  120. # Verify that the server responded with the address which will be
  121. # connected to.
  122. self.assertEqual(
  123. sent,
  124. struct.pack('!BBH', 0, 90, 34) + socket.inet_aton('127.0.0.1'))
  125. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  126. self.assertIsNotNone(self.sock.driver_outgoing)
  127. # Pass some data through and verify it is forwarded to the outgoing
  128. # connection.
  129. self.sock.dataReceived(b'hello, world')
  130. self.assertEqual(
  131. self.sock.driver_outgoing.transport.value(), b'hello, world')
  132. # Deliver some data from the output connection and verify it is
  133. # passed along to the incoming side.
  134. self.sock.driver_outgoing.dataReceived(b'hi there')
  135. self.assertEqual(self.sock.transport.value(), b'hi there')
  136. self.sock.connectionLost('fake reason')
  137. def test_socks4aFailedResolution(self):
  138. """
  139. Failed hostname resolution on a SOCKSv4a packet results in a 91 error
  140. response and the connection getting closed.
  141. """
  142. # send the domain name "failinghost" to be resolved
  143. clientRequest = (
  144. struct.pack('!BBH', 4, 1, 34)
  145. + socket.inet_aton('0.0.0.1')
  146. + b'fooBAZ\0'
  147. + b'failinghost\0')
  148. # Deliver the bytes one by one to exercise the protocol's buffering
  149. # logic. FakeResolverReactor's resolve method is invoked to "resolve"
  150. # the hostname.
  151. for byte in iterbytes(clientRequest):
  152. self.sock.dataReceived(byte)
  153. # Verify that the server responds with a 91 error.
  154. sent = self.sock.transport.value()
  155. self.assertEqual(
  156. sent,
  157. struct.pack('!BBH', 0, 91, 0) + socket.inet_aton('0.0.0.0'))
  158. # A failed resolution causes the transport to drop the connection.
  159. self.assertTrue(self.sock.transport.stringTCPTransport_closing)
  160. self.assertIsNone(self.sock.driver_outgoing)
  161. def test_accessDenied(self):
  162. self.sock.authorize = lambda code, server, port, user: 0
  163. self.sock.dataReceived(
  164. struct.pack('!BBH', 4, 1, 4242)
  165. + socket.inet_aton('10.2.3.4')
  166. + b'fooBAR'
  167. + b'\0')
  168. self.assertEqual(self.sock.transport.value(),
  169. struct.pack('!BBH', 0, 91, 0)
  170. + socket.inet_aton('0.0.0.0'))
  171. self.assertTrue(self.sock.transport.stringTCPTransport_closing)
  172. self.assertIsNone(self.sock.driver_outgoing)
  173. def test_eofRemote(self):
  174. self.sock.dataReceived(
  175. struct.pack('!BBH', 4, 1, 34)
  176. + socket.inet_aton('1.2.3.4')
  177. + b'fooBAR'
  178. + b'\0')
  179. self.sock.transport.clear()
  180. # pass some data through
  181. self.sock.dataReceived(b'hello, world')
  182. self.assertEqual(self.sock.driver_outgoing.transport.value(),
  183. b'hello, world')
  184. # now close it from the server side
  185. self.sock.driver_outgoing.transport.loseConnection()
  186. self.sock.driver_outgoing.connectionLost('fake reason')
  187. def test_eofLocal(self):
  188. self.sock.dataReceived(
  189. struct.pack('!BBH', 4, 1, 34)
  190. + socket.inet_aton('1.2.3.4')
  191. + b'fooBAR'
  192. + b'\0')
  193. self.sock.transport.clear()
  194. # pass some data through
  195. self.sock.dataReceived(b'hello, world')
  196. self.assertEqual(self.sock.driver_outgoing.transport.value(),
  197. b'hello, world')
  198. # now close it from the client side
  199. self.sock.connectionLost('fake reason')
  200. class BindTests(unittest.TestCase):
  201. """
  202. Tests for SOCKS and SOCKSv4a bind requests using the L{SOCKSv4} protocol.
  203. """
  204. def setUp(self):
  205. self.sock = SOCKSv4Driver()
  206. self.sock.transport = StringTCPTransport()
  207. self.sock.connectionMade()
  208. self.sock.reactor = FakeResolverReactor({b"localhost":"127.0.0.1"})
  209. ## def tearDown(self):
  210. ## # TODO ensure the listen port is closed
  211. ## listen = self.sock.driver_listen
  212. ## if listen is not None:
  213. ## self.assert_(incoming.transport.stringTCPTransport_closing,
  214. ## "Incoming SOCKS connections need to be closed.")
  215. def test_simple(self):
  216. self.sock.dataReceived(
  217. struct.pack('!BBH', 4, 2, 34)
  218. + socket.inet_aton('1.2.3.4')
  219. + b'fooBAR'
  220. + b'\0')
  221. sent = self.sock.transport.value()
  222. self.sock.transport.clear()
  223. self.assertEqual(sent,
  224. struct.pack('!BBH', 0, 90, 1234)
  225. + socket.inet_aton('6.7.8.9'))
  226. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  227. self.assertIsNotNone(self.sock.driver_listen)
  228. # connect
  229. incoming = self.sock.driver_listen.buildProtocol(('1.2.3.4', 5345))
  230. self.assertIsNotNone(incoming)
  231. incoming.transport = StringTCPTransport()
  232. incoming.connectionMade()
  233. # now we should have the second reply packet
  234. sent = self.sock.transport.value()
  235. self.sock.transport.clear()
  236. self.assertEqual(sent,
  237. struct.pack('!BBH', 0, 90, 0)
  238. + socket.inet_aton('0.0.0.0'))
  239. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  240. # pass some data through
  241. self.sock.dataReceived(b'hello, world')
  242. self.assertEqual(incoming.transport.value(),
  243. b'hello, world')
  244. # the other way around
  245. incoming.dataReceived(b'hi there')
  246. self.assertEqual(self.sock.transport.value(), b'hi there')
  247. self.sock.connectionLost('fake reason')
  248. def test_socks4a(self):
  249. """
  250. If the destination IP address has zeros for the first three octets and
  251. non-zero for the fourth octet, the client is attempting a v4a
  252. connection. A hostname is specified after the user ID string and the
  253. server connects to the address that hostname resolves to.
  254. @see: U{http://en.wikipedia.org/wiki/SOCKS#SOCKS_4a_protocol}
  255. """
  256. # send the domain name "localhost" to be resolved
  257. clientRequest = (
  258. struct.pack('!BBH', 4, 2, 34)
  259. + socket.inet_aton('0.0.0.1')
  260. + b'fooBAZ\0'
  261. + b'localhost\0')
  262. # Deliver the bytes one by one to exercise the protocol's buffering
  263. # logic. FakeResolverReactor's resolve method is invoked to "resolve"
  264. # the hostname.
  265. for byte in iterbytes(clientRequest):
  266. self.sock.dataReceived(byte)
  267. sent = self.sock.transport.value()
  268. self.sock.transport.clear()
  269. # Verify that the server responded with the address which will be
  270. # connected to.
  271. self.assertEqual(
  272. sent,
  273. struct.pack('!BBH', 0, 90, 1234) + socket.inet_aton('6.7.8.9'))
  274. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  275. self.assertIsNotNone(self.sock.driver_listen)
  276. # connect
  277. incoming = self.sock.driver_listen.buildProtocol(('127.0.0.1', 5345))
  278. self.assertIsNotNone(incoming)
  279. incoming.transport = StringTCPTransport()
  280. incoming.connectionMade()
  281. # now we should have the second reply packet
  282. sent = self.sock.transport.value()
  283. self.sock.transport.clear()
  284. self.assertEqual(sent,
  285. struct.pack('!BBH', 0, 90, 0)
  286. + socket.inet_aton('0.0.0.0'))
  287. self.assertIsNot(
  288. self.sock.transport.stringTCPTransport_closing, None)
  289. # Deliver some data from the output connection and verify it is
  290. # passed along to the incoming side.
  291. self.sock.dataReceived(b'hi there')
  292. self.assertEqual(incoming.transport.value(), b'hi there')
  293. # the other way around
  294. incoming.dataReceived(b'hi there')
  295. self.assertEqual(self.sock.transport.value(), b'hi there')
  296. self.sock.connectionLost('fake reason')
  297. def test_socks4aFailedResolution(self):
  298. """
  299. Failed hostname resolution on a SOCKSv4a packet results in a 91 error
  300. response and the connection getting closed.
  301. """
  302. # send the domain name "failinghost" to be resolved
  303. clientRequest = (
  304. struct.pack('!BBH', 4, 2, 34)
  305. + socket.inet_aton('0.0.0.1')
  306. + b'fooBAZ\0'
  307. + b'failinghost\0')
  308. # Deliver the bytes one by one to exercise the protocol's buffering
  309. # logic. FakeResolverReactor's resolve method is invoked to "resolve"
  310. # the hostname.
  311. for byte in iterbytes(clientRequest):
  312. self.sock.dataReceived(byte)
  313. # Verify that the server responds with a 91 error.
  314. sent = self.sock.transport.value()
  315. self.assertEqual(
  316. sent,
  317. struct.pack('!BBH', 0, 91, 0) + socket.inet_aton('0.0.0.0'))
  318. # A failed resolution causes the transport to drop the connection.
  319. self.assertTrue(self.sock.transport.stringTCPTransport_closing)
  320. self.assertIsNone(self.sock.driver_outgoing)
  321. def test_accessDenied(self):
  322. self.sock.authorize = lambda code, server, port, user: 0
  323. self.sock.dataReceived(
  324. struct.pack('!BBH', 4, 2, 4242)
  325. + socket.inet_aton('10.2.3.4')
  326. + b'fooBAR'
  327. + b'\0')
  328. self.assertEqual(self.sock.transport.value(),
  329. struct.pack('!BBH', 0, 91, 0)
  330. + socket.inet_aton('0.0.0.0'))
  331. self.assertTrue(self.sock.transport.stringTCPTransport_closing)
  332. self.assertIsNone(self.sock.driver_listen)
  333. def test_eofRemote(self):
  334. self.sock.dataReceived(
  335. struct.pack('!BBH', 4, 2, 34)
  336. + socket.inet_aton('1.2.3.4')
  337. + b'fooBAR'
  338. + b'\0')
  339. sent = self.sock.transport.value()
  340. self.sock.transport.clear()
  341. # connect
  342. incoming = self.sock.driver_listen.buildProtocol(('1.2.3.4', 5345))
  343. self.assertIsNotNone(incoming)
  344. incoming.transport = StringTCPTransport()
  345. incoming.connectionMade()
  346. # now we should have the second reply packet
  347. sent = self.sock.transport.value()
  348. self.sock.transport.clear()
  349. self.assertEqual(sent,
  350. struct.pack('!BBH', 0, 90, 0)
  351. + socket.inet_aton('0.0.0.0'))
  352. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  353. # pass some data through
  354. self.sock.dataReceived(b'hello, world')
  355. self.assertEqual(incoming.transport.value(),
  356. b'hello, world')
  357. # now close it from the server side
  358. incoming.transport.loseConnection()
  359. incoming.connectionLost('fake reason')
  360. def test_eofLocal(self):
  361. self.sock.dataReceived(
  362. struct.pack('!BBH', 4, 2, 34)
  363. + socket.inet_aton('1.2.3.4')
  364. + b'fooBAR'
  365. + b'\0')
  366. sent = self.sock.transport.value()
  367. self.sock.transport.clear()
  368. # connect
  369. incoming = self.sock.driver_listen.buildProtocol(('1.2.3.4', 5345))
  370. self.assertIsNotNone(incoming)
  371. incoming.transport = StringTCPTransport()
  372. incoming.connectionMade()
  373. # now we should have the second reply packet
  374. sent = self.sock.transport.value()
  375. self.sock.transport.clear()
  376. self.assertEqual(sent,
  377. struct.pack('!BBH', 0, 90, 0)
  378. + socket.inet_aton('0.0.0.0'))
  379. self.assertFalse(self.sock.transport.stringTCPTransport_closing)
  380. # pass some data through
  381. self.sock.dataReceived(b'hello, world')
  382. self.assertEqual(incoming.transport.value(),
  383. b'hello, world')
  384. # now close it from the client side
  385. self.sock.connectionLost('fake reason')
  386. def test_badSource(self):
  387. self.sock.dataReceived(
  388. struct.pack('!BBH', 4, 2, 34)
  389. + socket.inet_aton('1.2.3.4')
  390. + b'fooBAR'
  391. + b'\0')
  392. sent = self.sock.transport.value()
  393. self.sock.transport.clear()
  394. # connect from WRONG address
  395. incoming = self.sock.driver_listen.buildProtocol(('1.6.6.6', 666))
  396. self.assertIsNone(incoming)
  397. # Now we should have the second reply packet and it should
  398. # be a failure. The connection should be closing.
  399. sent = self.sock.transport.value()
  400. self.sock.transport.clear()
  401. self.assertEqual(sent,
  402. struct.pack('!BBH', 0, 91, 0)
  403. + socket.inet_aton('0.0.0.0'))
  404. self.assertTrue(self.sock.transport.stringTCPTransport_closing)