Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rotate roots per spec #143

Merged
merged 58 commits into from
Sep 17, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
58 commits
Select commit Hold shift + click to select a range
612bb21
update roots
hosseinsia Aug 10, 2021
0eadd6f
removing some debugging comments
hosseinsia Aug 10, 2021
429f285
removing duplicate code for getLocalRootMeta by calling it from getLo…
hosseinsia Aug 10, 2021
3cb1a91
fix based on the reviews.
hosseinsia Aug 12, 2021
65ba0e6
enable an arbitrary root verify another root (use case: n verify n+1)…
hosseinsia Aug 16, 2021
db4f2f5
check non root metadata, refactor test, address comments
hosseinsia Aug 23, 2021
79015d6
updated according to the comments
hosseinsia Aug 26, 2021
fd3d340
remove persistent metadata is the keys have changed.
hosseinsia Aug 27, 2021
0bea98a
removing the unused ErrWrongRootVersion
hosseinsia Aug 27, 2021
9d5a91a
add DeleteMeta to the LocalStore interface and implemenet in MemoryLo…
hosseinsia Aug 30, 2021
f21b3aa
delete (instead of setting to an empty raw message) the top-level met…
hosseinsia Aug 30, 2021
d3c530b
add test fixtures for fast forward attack recovery.
hosseinsia Sep 1, 2021
48c1746
test for fast forward attack recovery
hosseinsia Sep 1, 2021
f0ad38e
addressed several comments.
hosseinsia Sep 3, 2021
c34393a
addressed more comments. Set the rootVersion in loadAndVerifyLocalRoo…
hosseinsia Sep 4, 2021
caa02e0
Fixed a buggy test.
hosseinsia Sep 4, 2021
80c4246
fix comment typos
hosseinsia Sep 4, 2021
b670942
fix race condition related to the expired check.
hosseinsia Sep 7, 2021
a632c52
fix race condition related to the expired check.
hosseinsia Sep 7, 2021
b2489e1
kill unmarshalIgnoreExpired.
hosseinsia Sep 7, 2021
31a0aad
add test for root update for client version above 1.
hosseinsia Sep 7, 2021
8ed506c
add test for root update for client version greater than 1.
hosseinsia Sep 7, 2021
3accd78
update the VerifyIgnoreExpiredCheck method signature and add test for…
hosseinsia Sep 7, 2021
b84bac0
Avoid mocking IsExpired in the tests. Instead update test fixtured to…
hosseinsia Sep 8, 2021
1466b03
remove commented code
hosseinsia Sep 8, 2021
381cf45
update fixtures and clarify test comments.
hosseinsia Sep 10, 2021
717a30d
updating the comments based on the feedbacks.
hosseinsia Sep 10, 2021
f3116af
update roots
hosseinsia Aug 10, 2021
a27e4ba
removing some debugging comments
hosseinsia Aug 10, 2021
8565549
removing duplicate code for getLocalRootMeta by calling it from getLo…
hosseinsia Aug 10, 2021
fe99b01
fix based on the reviews.
hosseinsia Aug 12, 2021
2162d8e
enable an arbitrary root verify another root (use case: n verify n+1)…
hosseinsia Aug 16, 2021
d66bf74
check non root metadata, refactor test, address comments
hosseinsia Aug 23, 2021
3be509a
updated according to the comments
hosseinsia Aug 26, 2021
68165bc
remove persistent metadata is the keys have changed.
hosseinsia Aug 27, 2021
9b09c52
removing the unused ErrWrongRootVersion
hosseinsia Aug 27, 2021
42f234a
delete (instead of setting to an empty raw message) the top-level met…
hosseinsia Aug 30, 2021
f4435ba
add test fixtures for fast forward attack recovery.
hosseinsia Sep 1, 2021
c5ab46b
test for fast forward attack recovery
hosseinsia Sep 1, 2021
0a3186c
addressed several comments.
hosseinsia Sep 3, 2021
74ff44a
addressed more comments. Set the rootVersion in loadAndVerifyLocalRoo…
hosseinsia Sep 4, 2021
3747c88
Fixed a buggy test.
hosseinsia Sep 4, 2021
2a735ea
fix comment typos
hosseinsia Sep 4, 2021
3e5557b
Update client/client_test.go
hosseinsia Sep 4, 2021
ab81279
Update client/client_test.go
hosseinsia Sep 4, 2021
c3e4817
fix race condition related to the expired check.
hosseinsia Sep 7, 2021
0f72725
fix race condition related to the expired check.
hosseinsia Sep 7, 2021
3505474
kill unmarshalIgnoreExpired.
hosseinsia Sep 7, 2021
1e7d10f
add test for root update for client version above 1.
hosseinsia Sep 7, 2021
1a51430
add test for root update for client version greater than 1.
hosseinsia Sep 7, 2021
32ebe0a
update the VerifyIgnoreExpiredCheck method signature and add test for…
hosseinsia Sep 7, 2021
9681093
Avoid mocking IsExpired in the tests. Instead update test fixtured to…
hosseinsia Sep 8, 2021
0f5fe0e
remove commented code
hosseinsia Sep 8, 2021
79e0bc6
update fixtures and clarify test comments.
hosseinsia Sep 10, 2021
ba6ffde
updating the comments based on the feedbacks.
hosseinsia Sep 10, 2021
bdb5cee
rebase and update test cases to long expiration (10 years from now), …
hosseinsia Sep 12, 2021
45675bf
add test cases for (1) when there is no local root, (2) there is a lo…
hosseinsia Sep 16, 2021
d04805c
remove the 'previous' of test folders
hosseinsia Sep 16, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
405 changes: 290 additions & 115 deletions client/client.go

Large diffs are not rendered by default.

209 changes: 202 additions & 7 deletions client/client_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,14 +3,18 @@ package client
import (
"bytes"
"encoding/json"
"errors"
"fmt"
"io"
"io/ioutil"
"net"
"net/http"
"os"
"path/filepath"
"testing"
"time"

"github.com/stretchr/testify/assert"
cjson "github.com/tent/canonical-json-go"
tuf "github.com/theupdateframework/go-tuf"
"github.com/theupdateframework/go-tuf/data"
Expand Down Expand Up @@ -298,7 +302,7 @@ func (s *ClientSuite) TestNoChangeUpdate(c *C) {
_, err := client.Update()
c.Assert(err, IsNil)
_, err = client.Update()
c.Assert(IsLatestSnapshot(err), Equals, true)
c.Assert(err, IsNil)
}

func (s *ClientSuite) TestNewTimestamp(c *C) {
Expand All @@ -308,7 +312,7 @@ func (s *ClientSuite) TestNewTimestamp(c *C) {
c.Assert(s.repo.Timestamp(), IsNil)
s.syncRemote(c)
_, err := client.Update()
c.Assert(IsLatestSnapshot(err), Equals, true)
c.Assert(err, IsNil)
c.Assert(client.timestampVer > version, Equals, true)
}

Expand Down Expand Up @@ -360,6 +364,187 @@ func (s *ClientSuite) TestNewRoot(c *C) {
}
}

// startTUFRepoServer starts a HTTP server to serve a TUF Repo.
func startTUFRepoServer(baseDir string, relPath string) (net.Listener, error) {
serverDir := filepath.Join(baseDir, relPath)
l, err := net.Listen("tcp", "127.0.0.1:0")
go http.Serve(l, http.FileServer(http.Dir(serverDir)))
return l, err
}

// newClientWithMeta creates new client and sets the root metadata for it.
func newClientWithMeta(baseDir string, relPath string, serverAddr string) (*Client, error) {
initialStateDir := filepath.Join(baseDir, relPath)
opts := &HTTPRemoteOptions{
MetadataPath: "metadata",
TargetsPath: "targets",
}

remote, err := HTTPRemoteStore(fmt.Sprintf("http://%s/", serverAddr), opts, nil)
if err != nil {
return nil, err
}
c := NewClient(MemoryLocalStore(), remote)
for _, m := range []string{"root.json", "snapshot.json", "timestamp.json", "targets.json"} {
if _, err := os.Stat(initialStateDir + "/" + m); err == nil {
metadataJSON, err := ioutil.ReadFile(initialStateDir + "/" + m)
if err != nil {
return nil, err
}
c.local.SetMeta(m, metadataJSON)
}
}
return c, nil
}

func initRootTest(c *C, baseDir string) (*Client, func() error) {
l, err := startTUFRepoServer(baseDir, "server")
c.Assert(err, IsNil)
tufClient, err := newClientWithMeta(baseDir, "client/metadata/current", l.Addr().String())
c.Assert(err, IsNil)
return tufClient, l.Close
}

func (s *ClientSuite) TestUpdateRoots(c *C) {
var tests = []struct {
fixturePath string
expectedError error
expectedVersions map[string]int
}{
// Succeeds when there is no root update.
{"testdata/Published1Time", nil, map[string]int{"root": 1, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Succeeds when client only has root.json
{"testdata/Published1Time_client_root_only", nil, map[string]int{"root": 1, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Succeeds updating root from version 1 to version 2.
{"testdata/Published2Times_keyrotated", nil, map[string]int{"root": 2, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Succeeds updating root from version 1 to version 2 when the client's initial root version is expired.
{"testdata/Published2Times_keyrotated_initialrootexpired", nil, map[string]int{"root": 2, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Succeeds updating root from version 1 to version 3 when versions 1 and 2 are expired.
{"testdata/Published3Times_keyrotated_initialrootsexpired", nil, map[string]int{"root": 3, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Succeeds updating root from version 2 to version 3.
{"testdata/Published3Times_keyrotated_initialrootsexpired_clientversionis2", nil, map[string]int{"root": 3, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Fails updating root from version 1 to version 3 when versions 1 and 3 are expired but version 2 is not expired.
{"testdata/Published3Times_keyrotated_latestrootexpired", ErrDecodeFailed{File: "root.json", Err: verify.ErrExpired{}}, map[string]int{"root": 2, "timestamp": 1, "snapshot": 1, "targets": 1}},
// Fails updating root from version 1 to version 2 when old root 1 did not sign off on it (nth root didn't sign off n+1).
{"testdata/Published2Times_keyrotated_invalidOldRootSignature", errors.New("tuf: signature verification failed"), map[string]int{}},
// Fails updating root from version 1 to version 2 when the new root 2 did not sign itself (n+1th root didn't sign off n+1)
{"testdata/Published2Times_keyrotated_invalidNewRootSignature", errors.New("tuf: signature verification failed"), map[string]int{}},
// Fails updating root to 2.root.json when the value of the version field inside it is 1 (rollback attack prevention).
{"testdata/Published1Time_backwardRootVersion", verify.ErrWrongVersion(verify.ErrWrongVersion{Given: 1, Expected: 2}), map[string]int{}},
// Fails updating root to 2.root.json when the value of the version field inside it is 3 (rollforward attack prevention).
{"testdata/Published3Times_keyrotated_forwardRootVersion", verify.ErrWrongVersion(verify.ErrWrongVersion{Given: 3, Expected: 2}), map[string]int{}},
// Fails updating when there is no local trusted root.
{"testdata/Published1Time_client_no_root", errors.New("tuf: no root keys found in local meta store"), map[string]int{}},

// snapshot role key rotation increase the snapshot and timestamp.
{"testdata/Published2Times_snapshot_keyrotated", nil, map[string]int{"root": 2, "timestamp": 2, "snapshot": 2, "targets": 1}},
// targets role key rotation increase the snapshot, timestamp, and targets.
{"testdata/Published2Times_targets_keyrotated", nil, map[string]int{"root": 2, "timestamp": 2, "snapshot": 2, "targets": 2}},
// timestamp role key rotation increase the timestamp.
{"testdata/Published2Times_timestamp_keyrotated", nil, map[string]int{"root": 2, "timestamp": 2, "snapshot": 1, "targets": 1}},
}

for _, test := range tests {
tufClient, closer := initRootTest(c, test.fixturePath)
_, err := tufClient.Update()
if test.expectedError == nil {
c.Assert(err, IsNil)
// Check if the root.json is being saved in non-volatile storage.
tufClient.getLocalMeta()
versionMethods := map[string]int{"root": tufClient.rootVer,
"timestamp": tufClient.timestampVer,
"snapshot": tufClient.snapshotVer,
"targets": tufClient.targetsVer}
for m, v := range test.expectedVersions {
assert.Equal(c, v, versionMethods[m])
}
} else {
// For backward compatibility, the update root returns
// ErrDecodeFailed that wraps the verify.ErrExpired.
if _, ok := test.expectedError.(ErrDecodeFailed); ok {
decodeErr, ok := err.(ErrDecodeFailed)
c.Assert(ok, Equals, true)
c.Assert(decodeErr.File, Equals, "root.json")
_, ok = decodeErr.Err.(verify.ErrExpired)
c.Assert(ok, Equals, true)
} else {
assert.Equal(c, test.expectedError, err)
}
}
closer()
}
}

func (s *ClientSuite) TestFastForwardAttackRecovery(c *C) {
var tests = []struct {
fixturePath string
expectMetaDeleted map[string]bool
}{
// Each of the following test cases each has a two sets of TUF metadata:
// (1) client's initial, and (2) server's current.
// The naming format is PublishedTwiceMultiKeysadd_X_revoke_Y_threshold_Z_ROLE
// The client includes TUF metadata before key rotation for TUF ROLE with X keys.
// The server includes updated TUF metadata after key rotation. The
// rotation involves revoking Y keys from the initial keys.
// For each test, the TUF client's will be initialized to the client files.
// The test checks whether the client is able to update itself properly.

// Fast-forward recovery is not needed if less than threshold keys are revoked.
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_2_threshold_4_root",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": false, "targets.json": false}},
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_2_threshold_4_snapshot",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": false, "targets.json": false}},
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_2_threshold_4_targets",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": false, "targets.json": false}},
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_2_threshold_4_timestamp",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": false, "targets.json": false}},

// Fast-forward recovery not needed if root keys are revoked, even when the threshold number of root keys are revoked.
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_4_threshold_4_root",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": false, "targets.json": false}},

// Delete snapshot and timestamp metadata if a threshold number of snapshot keys are revoked.
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_4_threshold_4_snapshot",
map[string]bool{"root.json": false, "timestamp.json": true, "snapshot.json": true, "targets.json": false}},
// Delete targets and snapshot metadata if a threshold number of targets keys are revoked.
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_4_threshold_4_targets",
map[string]bool{"root.json": false, "timestamp.json": false, "snapshot.json": true, "targets.json": true}},
// Delete timestamp metadata if a threshold number of timestamp keys are revoked.
{"testdata/PublishedTwiceMultiKeysadd_9_revoke_4_threshold_4_timestamp",
map[string]bool{"root.json": false, "timestamp.json": true, "snapshot.json": false, "targets.json": false}},
}
for _, test := range tests {
tufClient, closer := initRootTest(c, test.fixturePath)
c.Assert(tufClient.updateRoots(), IsNil)
m, err := tufClient.local.GetMeta()
c.Assert(err, IsNil)
for md, deleted := range test.expectMetaDeleted {
if deleted {
if _, ok := m[md]; ok {
c.Fatalf("Metadata %s is not deleted!", md)
}
} else {
if _, ok := m[md]; !ok {
c.Fatalf("Metadata %s deleted!", md)
}
}
}
closer()
}

}

func (s *ClientSuite) TestUpdateRace(c *C) {
// Tests race condition for the client update. You need to run the test with -race flag:
// go test -race
for i := 0; i < 2; i++ {
go func() {
c := NewClient(MemoryLocalStore(), newFakeRemoteStore())
c.Update()
}()
}
}

func (s *ClientSuite) TestNewTargets(c *C) {
client := s.newClient(c)
files, err := client.Update()
Expand Down Expand Up @@ -552,25 +737,31 @@ func (s *ClientSuite) TestUpdateLocalRootExpired(c *C) {

// add soon to expire root.json to local storage
s.genKeyExpired(c, "timestamp")
c.Assert(s.repo.Snapshot(), IsNil)
c.Assert(s.repo.Timestamp(), IsNil)
c.Assert(s.repo.Commit(), IsNil)
s.syncLocal(c)

// add far expiring root.json to remote storage
s.genKey(c, "timestamp")
s.addRemoteTarget(c, "bar.txt")
c.Assert(s.repo.Snapshot(), IsNil)
c.Assert(s.repo.Timestamp(), IsNil)
c.Assert(s.repo.Commit(), IsNil)
s.syncRemote(c)

const expectedRootVersion = 3

// check the update downloads the non expired remote root.json and
// restarts itself, thus successfully updating
s.withMetaExpired(func() {
err := client.getLocalMeta()
if _, ok := err.(verify.ErrExpired); !ok {
c.Fatalf("expected err to have type signed.ErrExpired, got %T", err)
}

client := NewClient(s.local, s.remote)
_, err = client.Update()
c.Assert(err, IsNil)
c.Assert(client.rootVer, Equals, expectedRootVersion)
})
}

Expand All @@ -587,6 +778,7 @@ func (s *ClientSuite) TestUpdateRemoteExpired(c *C) {

c.Assert(s.repo.SnapshotWithExpires(s.expiredTime), IsNil)
c.Assert(s.repo.Timestamp(), IsNil)
c.Assert(s.repo.Commit(), IsNil)
s.syncRemote(c)
s.withMetaExpired(func() {
_, err := client.Update()
Expand Down Expand Up @@ -619,14 +811,18 @@ func (s *ClientSuite) TestUpdateLocalRootExpiredKeyChange(c *C) {

// add soon to expire root.json to local storage
s.genKeyExpired(c, "timestamp")
c.Assert(s.repo.Snapshot(), IsNil)
c.Assert(s.repo.Timestamp(), IsNil)
c.Assert(s.repo.Commit(), IsNil)
s.syncLocal(c)

// replace all keys
newKeyIDs := make(map[string][]string)
for role, ids := range s.keyIDs {
c.Assert(s.repo.RevokeKey(role, ids[0]), IsNil)
newKeyIDs[role] = s.genKey(c, role)
if role != "snapshot" && role != "timestamp" && role != "targets" {
c.Assert(s.repo.RevokeKey(role, ids[0]), IsNil)
newKeyIDs[role] = s.genKey(c, role)
}
}

// update metadata
Expand Down Expand Up @@ -704,7 +900,6 @@ func (s *ClientSuite) TestUpdateReplayAttack(c *C) {
c.Assert(s.repo.Timestamp(), IsNil)
s.syncRemote(c)
_, err := client.Update()
c.Assert(IsLatestSnapshot(err), Equals, true)
c.Assert(client.timestampVer > version, Equals, true)

// replace remote timestamp.json with the old one
Expand Down
17 changes: 7 additions & 10 deletions client/interop_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import (
"net/http"
"os"
"path/filepath"
"strconv"

"github.com/theupdateframework/go-tuf/data"
"github.com/theupdateframework/go-tuf/util"
Expand Down Expand Up @@ -130,14 +131,12 @@ func newTestCase(c *C, name string, consistentSnapshot bool, options *HTTPRemote
func (t *testCase) run(c *C) {
c.Logf("test case: %s consistent-snapshot: %t", t.name, t.consistentSnapshot)

init := true
for _, stepName := range t.testSteps {
t.runStep(c, stepName, init)
init = false
t.runStep(c, stepName)
}
}

func (t *testCase) runStep(c *C, stepName string, init bool) {
func (t *testCase) runStep(c *C, stepName string) {
c.Logf("step: %s", stepName)

addr, cleanup := startFileServer(c, t.testDir)
Expand All @@ -147,17 +146,15 @@ func (t *testCase) runStep(c *C, stepName string, init bool) {
c.Assert(err, IsNil)

client := NewClient(t.local, remote)

// initiate a client with the root keys
if init {
keys := getKeys(c, remote)
c.Assert(client.Init(keys, 1), IsNil)
}
keys := getKeys(c, remote)
c.Assert(client.Init(keys, 1), IsNil)

// check update returns the correct updated targets
files, err := client.Update()
c.Assert(err, IsNil)
c.Assert(files, HasLen, 1)
l, _ := strconv.Atoi(stepName)
c.Assert(files, HasLen, l+1)

targetName := stepName
t.targets[targetName] = []byte(targetName)
Expand Down
4 changes: 4 additions & 0 deletions client/leveldbstore/leveldbstore.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,10 @@ func (f *fileLocalStore) SetMeta(name string, meta json.RawMessage) error {
return f.db.Put([]byte(name), []byte(meta), nil)
}

func (f *fileLocalStore) DeleteMeta(name string) error {
return f.db.Delete([]byte(name), nil)
}

func (f *fileLocalStore) Close() error {
if err := f.db.Close(); err != nil {
return err
Expand Down
29 changes: 29 additions & 0 deletions client/leveldbstore/leveldbstore_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -48,3 +48,32 @@ func (LocalStoreSuite) TestFileLocalStore(c *C) {
c.Assert(err, IsNil)
assertGet(meta{"root.json": rootJSON, "targets.json": targetsJSON})
}

func (LocalStoreSuite) TestDeleteMeta(c *C) {
tmp := c.MkDir()
path := filepath.Join(tmp, "tuf.db")
store, err := FileLocalStore(path)
c.Assert(err, IsNil)

type meta map[string]json.RawMessage

assertGet := func(expected meta) {
actual, err := store.GetMeta()
c.Assert(err, IsNil)
c.Assert(meta(actual), DeepEquals, expected)
}

// initial GetMeta should return empty meta
assertGet(meta{})

// SetMeta should persist
rootJSON := []byte(`{"_type":"Root"}`)
c.Assert(store.SetMeta("root.json", rootJSON), IsNil)
assertGet(meta{"root.json": rootJSON})

store.DeleteMeta("root.json")
m, _ := store.GetMeta()
if _, ok := m["root.json"]; ok {
c.Fatalf("Metadata is not deleted!")
}
}
5 changes: 5 additions & 0 deletions client/local_store.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,3 +18,8 @@ func (m memoryLocalStore) SetMeta(name string, meta json.RawMessage) error {
m[name] = meta
return nil
}

func (m memoryLocalStore) DeleteMeta(name string) error {
delete(m, name)
return nil
}
Loading