TLSEvaluationTests.swift 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531
  1. //
  2. // TLSEvaluationTests.swift
  3. //
  4. // Copyright (c) 2014-2018 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. static let rootCA = TestCertificates.certificate(filename: "expired.badssl.com-root-ca")
  29. static let intermediateCA1 = TestCertificates.certificate(filename: "expired.badssl.com-intermediate-ca-1")
  30. static let intermediateCA2 = TestCertificates.certificate(filename: "expired.badssl.com-intermediate-ca-2")
  31. static let leaf = TestCertificates.certificate(filename: "expired.badssl.com-leaf")
  32. static func certificate(filename: String) -> SecCertificate {
  33. class Locator {}
  34. let filePath = Bundle(for: Locator.self).path(forResource: filename, ofType: "cer")!
  35. let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
  36. let certificate = SecCertificateCreateWithData(nil, data as CFData)!
  37. return certificate
  38. }
  39. }
  40. // MARK: -
  41. final class TLSEvaluationExpiredLeafCertificateTestCase: BaseTestCase {
  42. private let expiredURLString = "https://expired.badssl.com/"
  43. private let expiredHost = "expired.badssl.com"
  44. private let revokedURLString = "https://revoked.badssl.com"
  45. private let revokedHost = "revoked.badssl.com"
  46. private var configuration: URLSessionConfiguration!
  47. // MARK: Setup and Teardown
  48. override func setUp() {
  49. super.setUp()
  50. configuration = URLSessionConfiguration.ephemeral
  51. configuration.urlCache = nil
  52. configuration.urlCredentialStorage = nil
  53. }
  54. // MARK: Default Behavior Tests
  55. func testThatExpiredCertificateRequestFailsWithNoServerTrustPolicy() {
  56. // Given
  57. let expectation = self.expectation(description: "\(expiredURLString)")
  58. let manager = Session(configuration: configuration)
  59. var error: AFError?
  60. // When
  61. manager.request(expiredURLString)
  62. .response { resp in
  63. error = resp.error
  64. expectation.fulfill()
  65. }
  66. waitForExpectations(timeout: timeout, handler: nil)
  67. // Then
  68. XCTAssertNotNil(error)
  69. if let error = error?.underlyingError as? URLError {
  70. XCTAssertEqual(error.code, .serverCertificateUntrusted)
  71. } else if let error = error?.underlyingError as NSError? {
  72. XCTAssertEqual(error.domain, kCFErrorDomainCFNetwork as String)
  73. XCTAssertEqual(error.code, Int(CFNetworkErrors.cfErrorHTTPSProxyConnectionFailure.rawValue))
  74. } else {
  75. XCTFail("error should be a URLError or NSError from CFNetwork")
  76. }
  77. }
  78. func disabled_testRevokedCertificateRequestBehaviorWithNoServerTrustPolicy() {
  79. // Disabled due to the instability of due revocation testing of default evaluation from all platforms. This
  80. // test is left for debugging purposes only. Should not be committed into the test suite while enabled.
  81. // Given
  82. let expectation = self.expectation(description: "\(revokedURLString)")
  83. let manager = Session(configuration: configuration)
  84. var error: Error?
  85. // When
  86. manager.request(revokedURLString)
  87. .response { resp in
  88. error = resp.error
  89. expectation.fulfill()
  90. }
  91. waitForExpectations(timeout: timeout, handler: nil)
  92. // Then
  93. if #available(iOS 10.1, macOS 10.12, tvOS 10.1, *) {
  94. // Apple appears to have started revocation tests as part of default evaluation in 10.1
  95. XCTAssertNotNil(error)
  96. } else {
  97. XCTAssertNil(error)
  98. }
  99. }
  100. // MARK: Server Trust Policy - Perform Default Tests
  101. func testThatExpiredCertificateRequestFailsWithDefaultServerTrustPolicy() {
  102. // Given
  103. let evaluators = [expiredHost: DefaultTrustEvaluator(validateHost: true)]
  104. let manager = Session(configuration: configuration,
  105. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  106. let expectation = self.expectation(description: "\(expiredURLString)")
  107. var error: AFError?
  108. // When
  109. manager.request(expiredURLString)
  110. .response { resp in
  111. error = resp.error
  112. expectation.fulfill()
  113. }
  114. waitForExpectations(timeout: timeout, handler: nil)
  115. // Then
  116. XCTAssertNotNil(error, "error should not be nil")
  117. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  118. if case let .serverTrustEvaluationFailed(reason)? = error {
  119. XCTAssertTrue(reason.isHostValidationFailed, "should be .hostValidationFailed")
  120. } else {
  121. XCTFail("error should be .serverTrustEvaluationFailed")
  122. }
  123. }
  124. func disabled_testRevokedCertificateRequestBehaviorWithDefaultServerTrustPolicy() {
  125. // Disabled due to the instability of due revocation testing of default evaluation from all platforms. This
  126. // test is left for debugging purposes only. Should not be committed into the test suite while enabled.
  127. // Given
  128. let defaultPolicy = DefaultTrustEvaluator()
  129. let evaluators = [revokedHost: defaultPolicy]
  130. let manager = Session(configuration: configuration,
  131. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  132. let expectation = self.expectation(description: "\(revokedURLString)")
  133. var error: Error?
  134. // When
  135. manager.request(revokedURLString)
  136. .response { resp in
  137. error = resp.error
  138. expectation.fulfill()
  139. }
  140. waitForExpectations(timeout: timeout, handler: nil)
  141. // Then
  142. if #available(iOS 10.1, macOS 10.12, tvOS 10.1, *) {
  143. // Apple appears to have started revocation tests as part of default evaluation in 10.1
  144. XCTAssertNotNil(error)
  145. } else {
  146. XCTAssertNil(error)
  147. }
  148. }
  149. // MARK: Server Trust Policy - Perform Revoked Tests
  150. func testThatExpiredCertificateRequestFailsWithRevokedServerTrustPolicy() {
  151. // Given
  152. let policy = RevocationTrustEvaluator()
  153. let evaluators = [expiredHost: policy]
  154. let manager = Session(configuration: configuration,
  155. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  156. let expectation = self.expectation(description: "\(expiredURLString)")
  157. var error: AFError?
  158. // When
  159. manager.request(expiredURLString)
  160. .response { resp in
  161. error = resp.error
  162. expectation.fulfill()
  163. }
  164. waitForExpectations(timeout: timeout, handler: nil)
  165. // Then
  166. XCTAssertNotNil(error, "error should not be nil")
  167. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  168. if case let .serverTrustEvaluationFailed(reason)? = error {
  169. XCTAssertTrue(reason.isDefaultEvaluationFailed, "should be .defaultEvaluationFailed")
  170. } else {
  171. XCTFail("error should be .serverTrustEvaluationFailed")
  172. }
  173. }
  174. func testThatRevokedCertificateRequestFailsWithRevokedServerTrustPolicy() {
  175. // Given
  176. let policy = RevocationTrustEvaluator()
  177. let evaluators = [revokedHost: policy]
  178. let manager = Session(configuration: configuration,
  179. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  180. let expectation = self.expectation(description: "\(revokedURLString)")
  181. var error: AFError?
  182. // When
  183. manager.request(revokedURLString)
  184. .response { resp in
  185. error = resp.error
  186. expectation.fulfill()
  187. }
  188. waitForExpectations(timeout: timeout, handler: nil)
  189. // Then
  190. XCTAssertNotNil(error, "error should not be nil")
  191. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  192. if case let .serverTrustEvaluationFailed(reason)? = error {
  193. // Test seems flaky and can result in either of these failures, perhaps due to the OS actually checking?
  194. XCTAssertTrue(reason.isDefaultEvaluationFailed || reason.isRevocationCheckFailed,
  195. "should be .defaultEvaluationFailed or .revocationCheckFailed")
  196. } else {
  197. XCTFail("error should be .serverTrustEvaluationFailed")
  198. }
  199. }
  200. // MARK: Server Trust Policy - Certificate Pinning Tests
  201. func testThatExpiredCertificateRequestFailsWhenPinningLeafCertificateWithCertificateChainValidation() {
  202. // Given
  203. let certificates = [TestCertificates.leaf]
  204. let evaluators = [expiredHost: PinnedCertificatesTrustEvaluator(certificates: certificates)]
  205. let manager = Session(configuration: configuration,
  206. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  207. let expectation = self.expectation(description: "\(expiredURLString)")
  208. var error: AFError?
  209. // When
  210. manager.request(expiredURLString)
  211. .response { resp in
  212. error = resp.error
  213. expectation.fulfill()
  214. }
  215. waitForExpectations(timeout: timeout, handler: nil)
  216. // Then
  217. XCTAssertNotNil(error, "error should not be nil")
  218. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  219. if case let .serverTrustEvaluationFailed(reason)? = error {
  220. XCTAssertTrue(reason.isDefaultEvaluationFailed, "should be .defaultEvaluationFailed")
  221. } else {
  222. XCTFail("error should be .serverTrustEvaluationFailed")
  223. }
  224. }
  225. func testThatExpiredCertificateRequestFailsWhenPinningAllCertificatesWithCertificateChainValidation() {
  226. // Given
  227. let certificates = [TestCertificates.leaf,
  228. TestCertificates.intermediateCA1,
  229. TestCertificates.intermediateCA2,
  230. TestCertificates.rootCA]
  231. let evaluators = [expiredHost: PinnedCertificatesTrustEvaluator(certificates: certificates)]
  232. let manager = Session(configuration: configuration,
  233. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  234. let expectation = self.expectation(description: "\(expiredURLString)")
  235. var error: AFError?
  236. // When
  237. manager.request(expiredURLString)
  238. .response { resp in
  239. error = resp.error
  240. expectation.fulfill()
  241. }
  242. waitForExpectations(timeout: timeout, handler: nil)
  243. // Then
  244. XCTAssertNotNil(error, "error should not be nil")
  245. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  246. if case let .serverTrustEvaluationFailed(reason)? = error {
  247. XCTAssertTrue(reason.isDefaultEvaluationFailed, "should be .defaultEvaluationFailed")
  248. } else {
  249. XCTFail("error should be .serverTrustEvaluationFailed")
  250. }
  251. }
  252. func testThatExpiredCertificateRequestSucceedsWhenPinningLeafCertificateWithoutCertificateChainOrHostValidation() {
  253. // Given
  254. let certificates = [TestCertificates.leaf]
  255. let evaluators = [expiredHost: PinnedCertificatesTrustEvaluator(certificates: certificates, performDefaultValidation: false, validateHost: false)]
  256. let manager = Session(configuration: configuration,
  257. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  258. let expectation = self.expectation(description: "\(expiredURLString)")
  259. var error: Error?
  260. // When
  261. manager.request(expiredURLString)
  262. .response { resp in
  263. error = resp.error
  264. expectation.fulfill()
  265. }
  266. waitForExpectations(timeout: timeout, handler: nil)
  267. // Then
  268. XCTAssertNil(error, "error should be nil")
  269. }
  270. func testThatExpiredCertificateRequestSucceedsWhenPinningIntermediateCACertificateWithoutCertificateChainOrHostValidation() {
  271. // Given
  272. let certificates = [TestCertificates.intermediateCA2]
  273. let evaluators = [expiredHost: PinnedCertificatesTrustEvaluator(certificates: certificates, performDefaultValidation: false, validateHost: false)]
  274. let manager = Session(configuration: configuration,
  275. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  276. let expectation = self.expectation(description: "\(expiredURLString)")
  277. var error: Error?
  278. // When
  279. manager.request(expiredURLString)
  280. .response { resp in
  281. error = resp.error
  282. expectation.fulfill()
  283. }
  284. waitForExpectations(timeout: timeout, handler: nil)
  285. // Then
  286. XCTAssertNil(error, "error should be nil")
  287. }
  288. func testThatExpiredCertificateRequestSucceedsWhenPinningRootCACertificateWithoutCertificateChainValidation() {
  289. // Given
  290. let certificates = [TestCertificates.rootCA]
  291. let evaluators = [expiredHost: PinnedCertificatesTrustEvaluator(certificates: certificates, performDefaultValidation: false)]
  292. let manager = Session(configuration: configuration,
  293. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  294. let expectation = self.expectation(description: "\(expiredURLString)")
  295. var error: Error?
  296. // When
  297. manager.request(expiredURLString)
  298. .response { resp in
  299. error = resp.error
  300. expectation.fulfill()
  301. }
  302. waitForExpectations(timeout: timeout, handler: nil)
  303. // Then
  304. if #available(iOS 10.1, macOS 10.12.0, tvOS 10.1, *) {
  305. XCTAssertNotNil(error, "error should not be nil")
  306. } else {
  307. XCTAssertNil(error, "error should be nil")
  308. }
  309. }
  310. // MARK: Server Trust Policy - Public Key Pinning Tests
  311. func testThatExpiredCertificateRequestFailsWhenPinningLeafPublicKeyWithCertificateChainValidation() {
  312. // Given
  313. let keys = [TestCertificates.leaf].af.publicKeys
  314. let evaluators = [expiredHost: PublicKeysTrustEvaluator(keys: keys)]
  315. let manager = Session(configuration: configuration,
  316. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  317. let expectation = self.expectation(description: "\(expiredURLString)")
  318. var error: AFError?
  319. // When
  320. manager.request(expiredURLString)
  321. .response { resp in
  322. error = resp.error
  323. expectation.fulfill()
  324. }
  325. waitForExpectations(timeout: timeout, handler: nil)
  326. // Then
  327. XCTAssertNotNil(error, "error should not be nil")
  328. XCTAssertEqual(error?.isServerTrustEvaluationError, true)
  329. if case let .serverTrustEvaluationFailed(reason)? = error {
  330. XCTAssertTrue(reason.isDefaultEvaluationFailed, "should be .defaultEvaluationFailed")
  331. } else {
  332. XCTFail("error should be .serverTrustEvaluationFailed")
  333. }
  334. }
  335. func testThatExpiredCertificateRequestSucceedsWhenPinningLeafPublicKeyWithoutCertificateChainOrHostValidation() {
  336. // Given
  337. let keys = [TestCertificates.leaf].af.publicKeys
  338. let evaluators = [expiredHost: PublicKeysTrustEvaluator(keys: keys, performDefaultValidation: false, validateHost: false)]
  339. let manager = Session(configuration: configuration,
  340. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  341. let expectation = self.expectation(description: "\(expiredURLString)")
  342. var error: Error?
  343. // When
  344. manager.request(expiredURLString)
  345. .response { resp in
  346. error = resp.error
  347. expectation.fulfill()
  348. }
  349. waitForExpectations(timeout: timeout, handler: nil)
  350. // Then
  351. XCTAssertNil(error, "error should be nil")
  352. }
  353. func testThatExpiredCertificateRequestSucceedsWhenPinningIntermediateCAPublicKeyWithoutCertificateChainOrHostValidation() {
  354. // Given
  355. let keys = [TestCertificates.intermediateCA2].af.publicKeys
  356. let evaluators = [expiredHost: PublicKeysTrustEvaluator(keys: keys, performDefaultValidation: false, validateHost: false)]
  357. let manager = Session(configuration: configuration,
  358. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  359. let expectation = self.expectation(description: "\(expiredURLString)")
  360. var error: Error?
  361. // When
  362. manager.request(expiredURLString)
  363. .response { resp in
  364. error = resp.error
  365. expectation.fulfill()
  366. }
  367. waitForExpectations(timeout: timeout, handler: nil)
  368. // Then
  369. XCTAssertNil(error, "error should be nil")
  370. }
  371. func testThatExpiredCertificateRequestSucceedsWhenPinningRootCAPublicKeyWithoutCertificateChainValidation() {
  372. // Given
  373. let keys = [TestCertificates.rootCA].af.publicKeys
  374. let evaluators = [expiredHost: PublicKeysTrustEvaluator(keys: keys, performDefaultValidation: false, validateHost: false)]
  375. let manager = Session(configuration: configuration,
  376. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  377. let expectation = self.expectation(description: "\(expiredURLString)")
  378. var error: Error?
  379. // When
  380. manager.request(expiredURLString)
  381. .response { resp in
  382. error = resp.error
  383. expectation.fulfill()
  384. }
  385. waitForExpectations(timeout: timeout, handler: nil)
  386. // Then
  387. if #available(iOS 10.1, macOS 10.12.0, tvOS 10.1, *) {
  388. XCTAssertNotNil(error, "error should not be nil")
  389. } else {
  390. XCTAssertNil(error, "error should be nil")
  391. }
  392. }
  393. // MARK: Server Trust Policy - Disabling Evaluation Tests
  394. func testThatExpiredCertificateRequestSucceedsWhenDisablingEvaluation() {
  395. // Given
  396. let evaluators = [expiredHost: DisabledEvaluator()]
  397. let manager = Session(configuration: configuration,
  398. serverTrustManager: ServerTrustManager(evaluators: evaluators))
  399. let expectation = self.expectation(description: "\(expiredURLString)")
  400. var error: Error?
  401. // When
  402. manager.request(expiredURLString)
  403. .response { resp in
  404. error = resp.error
  405. expectation.fulfill()
  406. }
  407. waitForExpectations(timeout: timeout, handler: nil)
  408. // Then
  409. XCTAssertNil(error, "error should be nil")
  410. }
  411. }