]> git.saurik.com Git - apple/security.git/blob - OSX/sec/securityd/Regressions/secd-668-ghosts.m
Security-58286.200.222.tar.gz
[apple/security.git] / OSX / sec / securityd / Regressions / secd-668-ghosts.m
1 /*
2 * Copyright (c) 2012-2016 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 //
25 // secd-668-ghosts.c
26 // sec
27 //
28
29 #include <CoreFoundation/CFDictionary.h>
30 #include <utilities/SecCFWrappers.h>
31
32 #include <Security/SecureObjectSync/SOSAccount.h>
33 #include <Security/SecureObjectSync/SOSAccountTrustClassic+Circle.h>
34
35 #include "secd_regressions.h"
36 #include "SOSAccountTesting.h"
37 #include "SecdTestKeychainUtilities.h"
38
39 /*
40 Make a circle with two peers - alice and bob(bob is iOS and serial#"abababababab")
41 have alice leave the circle
42 release bob, make a new bob - iOS and same serial number
43 try to join the circle - it should resetToOffering with ghost fix
44
45 For phase 1 we expect the ghostfix to work with iOS devices, but not with MacOSX devices.
46 */
47
48 static void hauntedCircle(SOSPeerInfoDeviceClass devClass, bool expectGhostBusted)
49 {
50 CFErrorRef error = NULL;
51 CFDataRef cfpassword = CFDataCreate(NULL, (uint8_t *) "FooFooFoo", 10);
52 CFStringRef cfaccount = CFSTR("test@test.org");
53 CFStringRef ghostSerialID = CFSTR("abababababab");
54 CFStringRef ghostIdsID = CFSTR("targetIDS");
55
56 CFMutableDictionaryRef changes = CFDictionaryCreateMutableForCFTypes(kCFAllocatorDefault);
57 SOSAccount* alice_account = CreateAccountForLocalChanges(CFSTR("Alice"), CFSTR("TestSource"));
58 SOSAccount* bob_account = SOSTestCreateAccountAsSerialClone(CFSTR("Bob"), devClass, ghostSerialID, ghostIdsID);
59
60 // Start Circle
61 ok(SOSTestStartCircleWithAccount(alice_account, changes, cfaccount, cfpassword), "Have Alice start a circle");
62 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 1, "updates");
63 ok(SOSTestJoinWithApproval(cfpassword, cfaccount, changes, alice_account, bob_account, KEEP_USERKEY, 2, false), "Bob Joins");
64
65 // Alice Leaves
66 ok( [alice_account.trust leaveCircle:alice_account err:&error], "Alice Leaves (%@)", error);
67 CFReleaseNull(error);
68 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 2, "updates");
69 accounts_agree("Alice bails", bob_account, alice_account);
70 is(countPeers(bob_account), 1, "There should only be 1 valid peer");
71 // We're dropping all peers that are in the circle - leaving a circle with only one peer - and that's a ghost
72
73 // Make new bob - same as the old bob except peerID
74
75 SOSAccount* bobFinal = SOSTestCreateAccountAsSerialClone(CFSTR("BobFinal"), devClass, ghostSerialID, ghostIdsID);
76 is(ProcessChangesUntilNoChange(changes, bobFinal, NULL), 1, "updates");
77
78 ok(SOSTestJoinWith(cfpassword, cfaccount, changes, bobFinal), "Application Made");
79 CFReleaseNull(cfpassword);
80
81 // Did ghostbuster work?
82 is(ProcessChangesUntilNoChange(changes, bobFinal, NULL), 2, "updates");
83 if(expectGhostBusted) { // ghostbusting is currently disabled for MacOSX Peers
84 ok([bobFinal isInCircle:NULL], "Bob is in");
85 } else {
86 ok(![bobFinal isInCircle:NULL], "Bob is not in");
87 }
88
89 is(countPeers(bobFinal), 1, "There should only be 1 valid peer");
90
91 CFReleaseNull(changes);
92
93 bob_account = nil;
94 alice_account = nil;
95 bobFinal = nil;
96 SOSTestCleanup();
97 }
98
99 static void multiBob(SOSPeerInfoDeviceClass devClass, bool expectGhostBusted, bool delayedPrivKey, bool pairJoin) {
100 CFErrorRef error = NULL;
101 CFDataRef cfpassword = CFDataCreate(NULL, (uint8_t *) "FooFooFoo", 10);
102 CFStringRef cfaccount = CFSTR("test@test.org");
103 CFStringRef ghostSerialID = CFSTR("abababababab");
104 CFStringRef ghostIdsID = CFSTR("targetIDS");
105
106 CFMutableDictionaryRef changes = CFDictionaryCreateMutableForCFTypes(kCFAllocatorDefault);
107 SOSAccount* alice_account = CreateAccountForLocalChanges(CFSTR("Alice"), CFSTR("TestSource"));
108
109 // Start Circle
110 ok(SOSAccountAssertUserCredentialsAndUpdate(alice_account, cfaccount, cfpassword, &error), "Credential setting (%@)", error);
111 is(ProcessChangesUntilNoChange(changes, alice_account, NULL), 1, "updates");
112
113 ok(SOSAccountResetToOffering_wTxn(alice_account, &error), "Reset to offering (%@)", error);
114 CFReleaseNull(error);
115
116 is(ProcessChangesUntilNoChange(changes, alice_account, NULL), 1, "updates");
117
118 SOSTestMakeGhostInCircle(CFSTR("Bob1"), devClass, ghostSerialID, ghostIdsID, cfpassword, cfaccount, changes, alice_account, 2);
119 SOSTestMakeGhostInCircle(CFSTR("Bob2"), devClass, ghostSerialID, ghostIdsID, cfpassword, cfaccount, changes, alice_account, 3);
120 SOSTestMakeGhostInCircle(CFSTR("Bob3"), devClass, ghostSerialID, ghostIdsID, cfpassword, cfaccount, changes, alice_account, 4);
121 SOSTestMakeGhostInCircle(CFSTR("Bob4"), devClass, ghostSerialID, ghostIdsID, cfpassword, cfaccount, changes, alice_account, 5);
122
123 SOSAccount* bobFinal_account = SOSTestCreateAccountAsSerialClone(CFSTR("BobFinal"), devClass, ghostSerialID, ghostIdsID);
124
125 if(pairJoin) {
126 SOSTestJoinThroughPiggyBack(cfpassword, cfaccount, changes, alice_account, bobFinal_account, KEEP_USERKEY, 6, true);
127 is(countPeers(bobFinal_account), 6, "Expect ghosts still in circle");
128 } else if(delayedPrivKey) {
129 SOSTestJoinWithApproval(cfpassword, cfaccount, changes, alice_account, bobFinal_account, DROP_USERKEY, 6, true);
130 is(countPeers(bobFinal_account), 6, "Expect ghosts still in circle");
131 } else {
132 SOSTestJoinWithApproval(cfpassword, cfaccount, changes, alice_account, bobFinal_account, KEEP_USERKEY, 2, true);
133 }
134
135 if(pairJoin || delayedPrivKey) { // this allows the ghostbusting to be done in a delayed fashion for the instances where that is proper
136 SOSAccountTryUserCredentials(bobFinal_account, cfaccount, cfpassword, &error);
137 ok(SOSTestChangeAccountDeviceName(bobFinal_account, CFSTR("ThereCanBeOnlyOneBob")), "force an unrelated circle change");
138 is(ProcessChangesUntilNoChange(changes, alice_account, bobFinal_account, NULL), 3, "updates");
139 }
140
141 CFReleaseNull(cfpassword);
142
143
144 ok([bobFinal_account isInCircle:NULL], "bobFinal_account is in");
145
146 is(countPeers(bobFinal_account), 2, "Expect ghostBobs to be gone");
147 is(countPeers(alice_account), 2, "Expect ghostBobs to be gone");
148 accounts_agree_internal("Alice and ThereCanBeOnlyOneBob are the only circle peers and they agree", alice_account, bobFinal_account, false);
149
150 CFReleaseNull(changes);
151
152 alice_account = nil;
153 bobFinal_account = nil;
154
155 SOSTestCleanup();
156 }
157
158 static void iosICloudIdentity() {
159 CFErrorRef error = NULL;
160 CFDataRef cfpassword = CFDataCreate(NULL, (uint8_t *) "FooFooFoo", 10);
161 CFStringRef cfaccount = CFSTR("test@test.org");
162 CFStringRef ghostIdsID = CFSTR("targetIDS");
163
164 CFMutableDictionaryRef changes = CFDictionaryCreateMutableForCFTypes(kCFAllocatorDefault);
165 SOSAccount* alice_account = CreateAccountForLocalChanges(CFSTR("Alice"), CFSTR("TestSource"));
166
167 // Start Circle
168 ok(SOSTestStartCircleWithAccount(alice_account, changes, cfaccount, cfpassword), "Have Alice start a circle");
169
170 SOSCircleRef circle = [alice_account.trust getCircle:NULL];
171 __block CFStringRef serial = NULL;
172 SOSCircleForEachActivePeer(circle, ^(SOSPeerInfoRef peer) {
173 if(SOSPeerInfoIsCloudIdentity(peer)) {
174 serial = SOSPeerInfoCopySerialNumber(peer);
175 }
176 });
177
178 SOSAccount* bob_account = SOSTestCreateAccountAsSerialClone(CFSTR("Bob"), SOSPeerInfo_iOS, serial, ghostIdsID);
179
180 is(ProcessChangesUntilNoChange(changes, alice_account, bob_account, NULL), 1, "updates");
181 ok(SOSTestJoinWithApproval(cfpassword, cfaccount, changes, alice_account, bob_account, KEEP_USERKEY, 2, false), "Bob Joins");
182 CFReleaseNull(cfpassword);
183
184 circle = [alice_account.trust getCircle:&error];
185 __block bool hasiCloudIdentity = false;
186 SOSCircleForEachActivePeer(circle, ^(SOSPeerInfoRef peer) {
187 if(SOSPeerInfoIsCloudIdentity(peer)) {
188 hasiCloudIdentity = true;
189 }
190 });
191
192 ok(hasiCloudIdentity, "GhostBusting didn't mess with the iCloud Identity");
193
194 CFReleaseNull(changes);
195 alice_account = nil;
196 SOSTestCleanup();
197 }
198
199 int secd_68_ghosts(int argc, char *const *argv)
200 {
201 plan_tests(573);
202
203 secd_test_setup_temp_keychain(__FUNCTION__, NULL);
204
205 hauntedCircle(SOSPeerInfo_iOS, true);
206 hauntedCircle(SOSPeerInfo_macOS, false);
207 multiBob(SOSPeerInfo_iOS, true, false, false);
208 multiBob(SOSPeerInfo_iOS, false, true, false);
209 multiBob(SOSPeerInfo_iOS, false, false, true); // piggyback join case
210
211 iosICloudIdentity();
212
213 return 0;
214 }