2 * Copyright (c) 2013-2014 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 // secd60-account-cloud-exposure.c
31 #include <Security/SecBase.h>
32 #include <Security/SecItem.h>
34 #include <CoreFoundation/CFDictionary.h>
36 #include <Security/SecureObjectSync/SOSAccount.h>
37 #include <Security/SecureObjectSync/SOSPeerInfoPriv.h>
38 #include <Security/SecureObjectSync/SOSCloudCircle.h>
39 #include <Security/SecureObjectSync/SOSInternal.h>
40 #include <Security/SecureObjectSync/SOSUserKeygen.h>
41 #include <Security/SecureObjectSync/SOSTransport.h>
46 #include "secd_regressions.h"
47 #include "SOSTestDataSource.h"
49 #include "SOSRegressionUtilities.h"
50 #include <utilities/SecCFWrappers.h>
51 #include <Security/SecKeyPriv.h>
53 #include <securityd/SOSCloudCircleServer.h>
55 #include "SOSAccountTesting.h"
57 #include "SecdTestKeychainUtilities.h"
59 static int kTestTestCount
= 58;
61 static bool SOSAccountResetCircleToNastyOffering(SOSAccountRef account
, SecKeyRef userPriv
, SOSPeerInfoRef pi
, CFErrorRef
*error
) {
63 SecKeyRef userPub
= SecKeyCreatePublicFromPrivate(userPriv
);
65 require(SOSAccountHasCircle(account
, error
), fail
);
66 require(SOSAccountEnsureFullPeerAvailable(account
, error
), fail
);
69 //mygestalt = CFDictionaryCreateCopy(kCFAllocatorDefault, SOSPeerGetGestalt(SOSFullPeerInfoGetPeerInfo(account->my_identity)));
71 (void) SOSAccountResetAllRings(account
, error
);
73 SOSAccountModifyCircle(account
, error
, ^(SOSCircleRef circle
) {
75 CFErrorRef localError
= NULL
;
76 SOSFullPeerInfoRef iCloudfpi
= NULL
;
79 require_quiet(SOSCircleResetToEmpty(circle
, error
), err_out
);
80 require_quiet(SOSAccountAddiCloudIdentity(account
, circle
, userPriv
, error
), err_out
);
81 require_quiet(iCloudfpi
= SOSCircleCopyiCloudFullPeerInfoRef(circle
, error
), err_out
);
83 /* Add the defenders peerInfo to circle */
84 require_quiet(SOSCircleRequestReadmission(circle
, userPub
, pi
, error
), err_out
);
85 require_quiet(SOSCircleAcceptRequest(circle
, userPriv
, iCloudfpi
, pi
, error
), err_out
);
87 account
->departure_code
= kSOSNeverLeftCircle
;
90 account
->trusted_circle
= SOSCircleCopyCircle(kCFAllocatorDefault
, circle
, error
);
91 SOSAccountPublishCloudParameters(account
, NULL
);
92 account
->my_identity
= NULL
;
96 secerror("error resetting circle (%@) to offering: %@", circle
, localError
);
97 if (localError
&& error
&& *error
== NULL
) {
101 CFReleaseNull(localError
);
111 static bool SOSAccountResetToNastyOffering(SOSAccountRef account
, SOSPeerInfoRef pi
, CFErrorRef
* error
) {
112 SecKeyRef user_key
= SOSAccountGetPrivateCredential(account
, error
);
116 CFReleaseNull(account
->my_identity
);
118 return user_key
&& SOSAccountResetCircleToNastyOffering(account
, user_key
, pi
, error
);
121 static bool performiCloudIdentityAttack(SOSAccountRef attacker
, SOSAccountRef defender
, SOSAccountRef accomplice
, CFMutableDictionaryRef changes
) {
122 CFErrorRef error
= NULL
;
123 bool retval
= false; // false means the attack succeeds
124 CFArrayRef applicants
= NULL
;
126 /*----- Carole makes bogus circle with fake iCloud identity and Alice's peerInfo but only signed with fake iCloud identity -----*/
128 require_action_quiet(SOSAccountResetToNastyOffering(attacker
, SOSFullPeerInfoGetPeerInfo(defender
->my_identity
), &error
), testDone
, retval
= true);
129 CFReleaseNull(error
);
131 ProcessChangesUntilNoChange(changes
, defender
, accomplice
, attacker
, NULL
);
133 /*----- Now use our fake iCloud identity to get in to the circle for real -----*/
134 require_action_quiet(SOSAccountJoinCirclesAfterRestore_wTxn(attacker
, &error
), testDone
, retval
= true);
135 CFReleaseNull(error
);
136 require_action_quiet(countPeers(attacker
) == 2, testDone
, retval
= true);
138 /*----- Let's see if carole can get bob into the circle and have alice believe it -----*/
139 require_action_quiet(SOSAccountJoinCircles_wTxn(accomplice
, &error
), testDone
, retval
= true);
140 CFReleaseNull(error
);
142 ProcessChangesUntilNoChange(changes
, defender
, accomplice
, attacker
, NULL
);
144 applicants
= SOSAccountCopyApplicants(attacker
, &error
);
145 CFReleaseNull(error
);
147 if(CFArrayGetCount(applicants
) > 0) {
148 require_action_quiet(SOSAccountAcceptApplicants(attacker
, applicants
, &error
), testDone
, retval
= true);
151 ProcessChangesUntilNoChange(changes
, defender
, accomplice
, attacker
, NULL
);
153 require_action_quiet(countPeers(defender
) == 3, testDone
, retval
= true);
154 require_action_quiet(countPeers(accomplice
) == 3, testDone
, retval
= true);
155 require_action_quiet(countPeers(attacker
) == 3, testDone
, retval
= true);
158 CFReleaseNull(applicants
);
159 CFReleaseNull(error
);
163 static void tests(void)
165 CFErrorRef error
= NULL
;
166 CFDataRef cfpassword
= CFDataCreate(NULL
, (uint8_t *) "FooFooFoo", 10);
167 CFStringRef cfaccount
= CFSTR("test@test.org");
169 CFMutableDictionaryRef changes
= CFDictionaryCreateMutableForCFTypes(kCFAllocatorDefault
);
171 SOSAccountRef alice_account
= CreateAccountForLocalChanges( CFSTR("Alice"), CFSTR("TestSource"));
172 SOSAccountRef bob_account
= CreateAccountForLocalChanges(CFSTR("Bob"), CFSTR("TestSource"));
173 SOSAccountRef carole_account
= CreateAccountForLocalChanges(CFSTR("Carole"), CFSTR("TestSource"));
175 ok(SOSAccountAssertUserCredentialsAndUpdate(bob_account
, cfaccount
, cfpassword
, &error
), "Credential setting (%@)", error
);
177 // Bob wins writing at this point, feed the changes back to alice.
178 is(ProcessChangesUntilNoChange(changes
, alice_account
, bob_account
, carole_account
, NULL
), 1, "updates");
180 ok(SOSAccountAssertUserCredentialsAndUpdate(alice_account
, cfaccount
, cfpassword
, &error
), "Credential setting (%@)", error
);
181 CFReleaseNull(error
);
183 ok(SOSAccountAssertUserCredentialsAndUpdate(carole_account
, cfaccount
, cfpassword
, &error
), "Credential setting (%@)", error
);
184 CFReleaseNull(error
);
185 ok(SOSAccountResetToOffering_wTxn(alice_account
, &error
), "Reset to offering (%@)", error
);
186 CFReleaseNull(error
);
188 is(ProcessChangesUntilNoChange(changes
, alice_account
, bob_account
, carole_account
, NULL
), 2, "updates");
190 ok(SOSAccountJoinCircles_wTxn(bob_account
, &error
), "Bob Applies (%@)", error
);
191 CFReleaseNull(error
);
192 is(ProcessChangesUntilNoChange(changes
, alice_account
, bob_account
, carole_account
, NULL
), 2, "updates");
195 CFArrayRef applicants
= SOSAccountCopyApplicants(alice_account
, &error
);
197 ok(applicants
&& CFArrayGetCount(applicants
) == 1, "See one applicant %@ (%@)", applicants
, error
);
198 ok(SOSAccountAcceptApplicants(alice_account
, applicants
, &error
), "Alice accepts (%@)", error
);
199 CFReleaseNull(error
);
200 CFReleaseNull(applicants
);
203 is(ProcessChangesUntilNoChange(changes
, alice_account
, bob_account
, carole_account
, NULL
), 3, "updates");
205 accounts_agree("bob&alice pair", bob_account
, alice_account
);
208 ok(performiCloudIdentityAttack(carole_account
, alice_account
, bob_account
, changes
), "Attack is defeated");
210 CFReleaseNull(bob_account
);
211 CFReleaseNull(alice_account
);
212 CFReleaseNull(carole_account
);
213 CFReleaseNull(cfpassword
);
218 int secd_60_account_cloud_exposure(int argc
, char *const *argv
)
220 plan_tests(kTestTestCount
);
222 secd_test_setup_temp_keychain(__FUNCTION__
, NULL
);