blob: 1b4257dcfa9e9f5d685a482b0731b7e0ef7f2eb5 [file] [log] [blame]
Ari Saha89831742015-06-26 10:31:48 -07001/*
Brian O'Connor4e33be22017-08-03 22:45:46 -07002 * Copyright 2015-present Open Networking Foundation
Ari Saha89831742015-06-26 10:31:48 -07003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Matteo Scandolocf847b82019-04-26 15:00:00 -070016package org.opencord.aaa.impl;
Ari Saha89831742015-06-26 10:31:48 -070017
Jonathan Hart092dfb22015-11-16 23:05:21 -080018import com.google.common.base.Charsets;
Ari Saha89831742015-06-26 10:31:48 -070019import org.junit.After;
20import org.junit.Before;
21import org.junit.Test;
Jonathan Hart5db44532018-07-12 18:13:54 -070022import org.onlab.junit.TestUtils;
Ray Milkey967776a2015-10-07 14:37:17 -070023import org.onlab.packet.BasePacket;
Ray Milkeyea366452015-09-30 10:56:43 -070024import org.onlab.packet.DeserializationException;
25import org.onlab.packet.EAP;
Ray Milkeyea366452015-09-30 10:56:43 -070026import org.onlab.packet.Ethernet;
Ray Milkeyea366452015-09-30 10:56:43 -070027import org.onlab.packet.IpAddress;
Ray Milkeyea366452015-09-30 10:56:43 -070028import org.onlab.packet.RADIUS;
29import org.onlab.packet.RADIUSAttribute;
Ray Milkeyea366452015-09-30 10:56:43 -070030import org.onosproject.core.CoreServiceAdapter;
Jonathan Hart5db44532018-07-12 18:13:54 -070031import org.onosproject.event.DefaultEventSinkRegistry;
32import org.onosproject.event.Event;
33import org.onosproject.event.EventDeliveryService;
34import org.onosproject.event.EventSink;
Ray Milkeyfcb623d2015-10-01 16:48:18 -070035import org.onosproject.net.config.Config;
36import org.onosproject.net.config.NetworkConfigRegistryAdapter;
Amit Ghoshc9ac1e52017-07-28 12:31:18 +010037import org.onosproject.net.packet.InboundPacket;
Matteo Scandolocf847b82019-04-26 15:00:00 -070038import org.opencord.aaa.AaaConfig;
Ray Milkeyea366452015-09-30 10:56:43 -070039
Jonathan Hart5db44532018-07-12 18:13:54 -070040import java.lang.reflect.Field;
Jonathan Hart092dfb22015-11-16 23:05:21 -080041import java.net.InetAddress;
42import java.net.UnknownHostException;
Ray Milkeyea366452015-09-30 10:56:43 -070043
Jonathan Hart5db44532018-07-12 18:13:54 -070044import static com.google.common.base.Preconditions.checkState;
Ray Milkeyea366452015-09-30 10:56:43 -070045import static org.hamcrest.Matchers.is;
46import static org.hamcrest.Matchers.notNullValue;
47import static org.junit.Assert.assertThat;
Ari Saha89831742015-06-26 10:31:48 -070048
49/**
50 * Set of tests of the ONOS application component.
51 */
Jonathan Hart092dfb22015-11-16 23:05:21 -080052public class AaaManagerTest extends AaaTestBase {
Ari Saha89831742015-06-26 10:31:48 -070053
Ray Milkey967776a2015-10-07 14:37:17 -070054 static final String BAD_IP_ADDRESS = "198.51.100.0";
Ari Saha89831742015-06-26 10:31:48 -070055
Jonathan Hart092dfb22015-11-16 23:05:21 -080056 private AaaManager aaaManager;
kartikey dubeye1545422019-05-22 12:53:45 +000057 private AaaStatisticsManager aaaStatisticsManager;
Ray Milkeyea366452015-09-30 10:56:43 -070058
Jonathan Hart092dfb22015-11-16 23:05:21 -080059 class AaaManagerWithoutRadiusServer extends AaaManager {
Amit Ghoshc9ac1e52017-07-28 12:31:18 +010060 protected void sendRadiusPacket(RADIUS radiusPacket, InboundPacket inPkt) {
Ray Milkey967776a2015-10-07 14:37:17 -070061 savePacket(radiusPacket);
62 }
Ray Milkeyea366452015-09-30 10:56:43 -070063 }
Ray Milkeyea366452015-09-30 10:56:43 -070064 /**
Ray Milkey967776a2015-10-07 14:37:17 -070065 * Mocks the AAAConfig class to force usage of an unroutable address for the
66 * RADIUS server.
Ray Milkeyea366452015-09-30 10:56:43 -070067 */
Jonathan Hart092dfb22015-11-16 23:05:21 -080068 static class MockAaaConfig extends AaaConfig {
Ray Milkeyea366452015-09-30 10:56:43 -070069 @Override
Ray Milkey967776a2015-10-07 14:37:17 -070070 public InetAddress radiusIp() {
Ray Milkeyea366452015-09-30 10:56:43 -070071 try {
Ray Milkey967776a2015-10-07 14:37:17 -070072 return InetAddress.getByName(BAD_IP_ADDRESS);
73 } catch (UnknownHostException ex) {
74 // can't happen
75 throw new IllegalStateException(ex);
Ray Milkeyea366452015-09-30 10:56:43 -070076 }
77 }
78 }
79
80 /**
Ray Milkeyfcb623d2015-10-01 16:48:18 -070081 * Mocks the network config registry.
82 */
83 @SuppressWarnings("unchecked")
84 private static final class TestNetworkConfigRegistry
85 extends NetworkConfigRegistryAdapter {
86 @Override
87 public <S, C extends Config<S>> C getConfig(S subject, Class<C> configClass) {
Jonathan Hart092dfb22015-11-16 23:05:21 -080088 AaaConfig aaaConfig = new MockAaaConfig();
Ray Milkey967776a2015-10-07 14:37:17 -070089 return (C) aaaConfig;
Ray Milkeyfcb623d2015-10-01 16:48:18 -070090 }
91 }
92
Jonathan Hart5db44532018-07-12 18:13:54 -070093 public static class TestEventDispatcher extends DefaultEventSinkRegistry
94 implements EventDeliveryService {
Jonathan Hart5db44532018-07-12 18:13:54 -070095 @Override
96 @SuppressWarnings("unchecked")
97 public synchronized void post(Event event) {
98 EventSink sink = getSink(event.getClass());
99 checkState(sink != null, "No sink for event %s", event);
100 sink.process(event);
101 }
102
103 @Override
104 public void setDispatchTimeLimit(long millis) {
105 }
106
107 @Override
108 public long getDispatchTimeLimit() {
109 return 0;
110 }
111 }
112
Ray Milkeyfcb623d2015-10-01 16:48:18 -0700113 /**
Ray Milkeyea366452015-09-30 10:56:43 -0700114 * Constructs an Ethernet packet containing a RADIUS challenge
115 * packet.
116 *
117 * @param challengeCode code to use in challenge packet
118 * @param challengeType type to use in challenge packet
119 * @return Ethernet packet
120 */
Jonathan Hart092dfb22015-11-16 23:05:21 -0800121 private RADIUS constructRadiusCodeAccessChallengePacket(byte challengeCode, byte challengeType) {
Ray Milkeyea366452015-09-30 10:56:43 -0700122
Ray Milkey967776a2015-10-07 14:37:17 -0700123 String challenge = "12345678901234567";
Ray Milkeyea366452015-09-30 10:56:43 -0700124
Shubham Sharma4900ce62019-06-19 14:18:50 +0000125 EAP eap = new EAP(challengeType, (byte) 4, challengeType,
Ray Milkeyea366452015-09-30 10:56:43 -0700126 challenge.getBytes(Charsets.US_ASCII));
Shubham Sharma4900ce62019-06-19 14:18:50 +0000127 eap.setIdentifier((byte) 4);
Ray Milkeyea366452015-09-30 10:56:43 -0700128
129 RADIUS radius = new RADIUS();
130 radius.setCode(challengeCode);
Shubham Sharma4900ce62019-06-19 14:18:50 +0000131 radius.setIdentifier((byte) 4);
Ray Milkeyea366452015-09-30 10:56:43 -0700132 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_STATE,
133 challenge.getBytes(Charsets.US_ASCII));
134
135 radius.setPayload(eap);
136 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_EAP_MESSAGE,
137 eap.serialize());
kartikey dubeye1545422019-05-22 12:53:45 +0000138 radius.setAttribute(RADIUSAttribute.RADIUS_ATTR_MESSAGE_AUTH,
139 aaaManager.radiusSecret.getBytes());
Ray Milkey967776a2015-10-07 14:37:17 -0700140 return radius;
Ray Milkeyea366452015-09-30 10:56:43 -0700141 }
142
Jonathan Hart5db44532018-07-12 18:13:54 -0700143 public static void injectEventDispatcher(Object manager, EventDeliveryService svc) {
144 Class mc = manager.getClass();
145 for (Field f : mc.getSuperclass().getDeclaredFields()) {
146 if (f.getType().equals(EventDeliveryService.class)) {
147 try {
148 TestUtils.setField(manager, f.getName(), svc);
149 } catch (TestUtils.TestUtilsException e) {
150 throw new IllegalArgumentException("Unable to inject reference", e);
151 }
152 break;
153 }
154 }
155 }
156
Ray Milkeyea366452015-09-30 10:56:43 -0700157 /**
158 * Sets up the services required by the AAA application.
159 */
Ari Saha89831742015-06-26 10:31:48 -0700160 @Before
161 public void setUp() {
Jonathan Hart092dfb22015-11-16 23:05:21 -0800162 aaaManager = new AaaManagerWithoutRadiusServer();
163 aaaManager.netCfgService = new TestNetworkConfigRegistry();
164 aaaManager.coreService = new CoreServiceAdapter();
165 aaaManager.packetService = new MockPacketService();
Amit Ghoshf739be52017-09-21 15:49:37 +0100166 aaaManager.deviceService = new TestDeviceService();
Gamze Abaka1cfdb192018-10-25 11:39:19 +0000167 aaaManager.sadisService = new MockSadisService();
kartikey dubeye1545422019-05-22 12:53:45 +0000168 aaaManager.cfgService = new MockCfgService();
169 aaaStatisticsManager = new AaaStatisticsManager();
Shubham Sharma4900ce62019-06-19 14:18:50 +0000170 aaaManager.radiusOperationalStatusService = new RadiusOperationalStatusManager();
kartikey dubeye1545422019-05-22 12:53:45 +0000171 TestUtils.setField(aaaStatisticsManager, "eventDispatcher", new TestEventDispatcher());
172 aaaStatisticsManager.activate();
173 aaaManager.aaaStatisticsManager = this.aaaStatisticsManager;
Jonathan Hart5db44532018-07-12 18:13:54 -0700174 TestUtils.setField(aaaManager, "eventDispatcher", new TestEventDispatcher());
kartikey dubeye1545422019-05-22 12:53:45 +0000175 aaaManager.activate(new AaaTestBase.MockComponentContext());
Ari Saha89831742015-06-26 10:31:48 -0700176 }
177
Ray Milkeyea366452015-09-30 10:56:43 -0700178 /**
179 * Tears down the AAA application.
180 */
Ari Saha89831742015-06-26 10:31:48 -0700181 @After
182 public void tearDown() {
kartikey dubeye1545422019-05-22 12:53:45 +0000183 aaaManager.deactivate(new AaaTestBase.MockComponentContext());
Ari Saha89831742015-06-26 10:31:48 -0700184 }
185
Ray Milkeyea366452015-09-30 10:56:43 -0700186 /**
187 * Extracts the RADIUS packet from a packet sent by the supplicant.
188 *
Ray Milkey967776a2015-10-07 14:37:17 -0700189 * @param radius RADIUS packet sent by the supplicant
Ray Milkeyea366452015-09-30 10:56:43 -0700190 * @throws DeserializationException if deserialization of the packet contents
191 * fails.
192 */
Jonathan Hart092dfb22015-11-16 23:05:21 -0800193 private void checkRadiusPacketFromSupplicant(RADIUS radius)
Ray Milkeyea366452015-09-30 10:56:43 -0700194 throws DeserializationException {
Ray Milkeyea366452015-09-30 10:56:43 -0700195 assertThat(radius, notNullValue());
Ray Milkeyea366452015-09-30 10:56:43 -0700196
Ray Milkey967776a2015-10-07 14:37:17 -0700197 EAP eap = radius.decapsulateMessage();
Ray Milkeyea366452015-09-30 10:56:43 -0700198 assertThat(eap, notNullValue());
Ray Milkeyea366452015-09-30 10:56:43 -0700199 }
200
201 /**
202 * Fetches the sent packet at the given index. The requested packet
203 * must be the last packet on the list.
204 *
205 * @param index index into sent packets array
206 * @return packet
207 */
Ray Milkey967776a2015-10-07 14:37:17 -0700208 private BasePacket fetchPacket(int index) {
209 BasePacket packet = savedPackets.get(index);
210 assertThat(packet, notNullValue());
211 return packet;
Ray Milkeyea366452015-09-30 10:56:43 -0700212 }
213
214 /**
215 * Tests the authentication path through the AAA application.
216 *
217 * @throws DeserializationException if packed deserialization fails.
218 */
Ari Saha89831742015-06-26 10:31:48 -0700219 @Test
Ray Milkey967776a2015-10-07 14:37:17 -0700220 public void testAuthentication() throws Exception {
Ray Milkeyea366452015-09-30 10:56:43 -0700221
222 // (1) Supplicant start up
223
224 Ethernet startPacket = constructSupplicantStartPacket();
225 sendPacket(startPacket);
226
Ray Milkey967776a2015-10-07 14:37:17 -0700227 Ethernet responsePacket = (Ethernet) fetchPacket(0);
Jonathan Hart092dfb22015-11-16 23:05:21 -0800228 checkRadiusPacket(aaaManager, responsePacket, EAP.ATTR_IDENTITY);
Ray Milkeyea366452015-09-30 10:56:43 -0700229
230 // (2) Supplicant identify
231
Shubham Sharma4900ce62019-06-19 14:18:50 +0000232 Ethernet identifyPacket = constructSupplicantIdentifyPacket(null, EAP.ATTR_IDENTITY, (byte) 3, null);
Ray Milkeyea366452015-09-30 10:56:43 -0700233 sendPacket(identifyPacket);
234
Ray Milkey967776a2015-10-07 14:37:17 -0700235 RADIUS radiusIdentifyPacket = (RADIUS) fetchPacket(1);
Ray Milkeyea366452015-09-30 10:56:43 -0700236
Jonathan Hart092dfb22015-11-16 23:05:21 -0800237 checkRadiusPacketFromSupplicant(radiusIdentifyPacket);
Ray Milkey967776a2015-10-07 14:37:17 -0700238
239 assertThat(radiusIdentifyPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
240 assertThat(new String(radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_USERNAME).getValue()),
241 is("testuser"));
Ray Milkeyea366452015-09-30 10:56:43 -0700242
243 IpAddress nasIp =
244 IpAddress.valueOf(IpAddress.Version.INET,
Ray Milkey967776a2015-10-07 14:37:17 -0700245 radiusIdentifyPacket.getAttribute(RADIUSAttribute.RADIUS_ATTR_NAS_IP)
Ray Milkeyea366452015-09-30 10:56:43 -0700246 .getValue());
Jonathan Hart092dfb22015-11-16 23:05:21 -0800247 assertThat(nasIp.toString(), is(aaaManager.nasIpAddress.getHostAddress()));
Ray Milkeyea366452015-09-30 10:56:43 -0700248
249 // State machine should have been created by now
250
251 StateMachine stateMachine =
Ray Milkey967776a2015-10-07 14:37:17 -0700252 StateMachine.lookupStateMachineBySessionId(SESSION_ID);
Ray Milkeyea366452015-09-30 10:56:43 -0700253 assertThat(stateMachine, notNullValue());
254 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
255
256 // (3) RADIUS MD5 challenge
257
Ray Milkey967776a2015-10-07 14:37:17 -0700258 RADIUS radiusCodeAccessChallengePacket =
Jonathan Hart092dfb22015-11-16 23:05:21 -0800259 constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_CHALLENGE, EAP.ATTR_MD5);
Amit Ghoshc9ac1e52017-07-28 12:31:18 +0100260 aaaManager.handleRadiusPacket(radiusCodeAccessChallengePacket);
Ray Milkeyea366452015-09-30 10:56:43 -0700261
Ray Milkey967776a2015-10-07 14:37:17 -0700262 Ethernet radiusChallengeMD5Packet = (Ethernet) fetchPacket(2);
Jonathan Hart092dfb22015-11-16 23:05:21 -0800263 checkRadiusPacket(aaaManager, radiusChallengeMD5Packet, EAP.ATTR_MD5);
Ray Milkeyea366452015-09-30 10:56:43 -0700264
265 // (4) Supplicant MD5 response
266
Ray Milkey967776a2015-10-07 14:37:17 -0700267 Ethernet md5RadiusPacket =
268 constructSupplicantIdentifyPacket(stateMachine,
269 EAP.ATTR_MD5,
270 stateMachine.challengeIdentifier(),
271 radiusChallengeMD5Packet);
Ray Milkeyea366452015-09-30 10:56:43 -0700272 sendPacket(md5RadiusPacket);
Ray Milkey967776a2015-10-07 14:37:17 -0700273
274 RADIUS responseMd5RadiusPacket = (RADIUS) fetchPacket(3);
275
Jonathan Hart092dfb22015-11-16 23:05:21 -0800276 checkRadiusPacketFromSupplicant(responseMd5RadiusPacket);
Shubham Sharma4900ce62019-06-19 14:18:50 +0000277 assertThat(responseMd5RadiusPacket.getIdentifier(), is((byte) 9));
Ray Milkeyea366452015-09-30 10:56:43 -0700278 assertThat(responseMd5RadiusPacket.getCode(), is(RADIUS.RADIUS_CODE_ACCESS_REQUEST));
279
280 // State machine should be in pending state
281
282 assertThat(stateMachine, notNullValue());
283 assertThat(stateMachine.state(), is(StateMachine.STATE_PENDING));
284
Ray Milkey967776a2015-10-07 14:37:17 -0700285 // (5) RADIUS Success
Ray Milkeyea366452015-09-30 10:56:43 -0700286
Ray Milkey967776a2015-10-07 14:37:17 -0700287 RADIUS successPacket =
Jonathan Hart092dfb22015-11-16 23:05:21 -0800288 constructRadiusCodeAccessChallengePacket(RADIUS.RADIUS_CODE_ACCESS_ACCEPT, EAP.SUCCESS);
Amit Ghoshc9ac1e52017-07-28 12:31:18 +0100289 aaaManager.handleRadiusPacket((successPacket));
Ray Milkey967776a2015-10-07 14:37:17 -0700290 Ethernet supplicantSuccessPacket = (Ethernet) fetchPacket(4);
Ray Milkeyea366452015-09-30 10:56:43 -0700291
Jonathan Hart092dfb22015-11-16 23:05:21 -0800292 checkRadiusPacket(aaaManager, supplicantSuccessPacket, EAP.SUCCESS);
Ray Milkeyea366452015-09-30 10:56:43 -0700293
294 // State machine should be in authorized state
295
296 assertThat(stateMachine, notNullValue());
297 assertThat(stateMachine.state(), is(StateMachine.STATE_AUTHORIZED));
Ray Milkey967776a2015-10-07 14:37:17 -0700298
Ari Saha89831742015-06-26 10:31:48 -0700299 }
Ray Milkeyfcb623d2015-10-01 16:48:18 -0700300
Ray Milkeyfcb623d2015-10-01 16:48:18 -0700301 /**
302 * Tests the default configuration.
303 */
304 @Test
305 public void testConfig() {
Jonathan Hart092dfb22015-11-16 23:05:21 -0800306 assertThat(aaaManager.nasIpAddress.getHostAddress(), is(AaaConfig.DEFAULT_NAS_IP));
307 assertThat(aaaManager.nasMacAddress, is(AaaConfig.DEFAULT_NAS_MAC));
308 assertThat(aaaManager.radiusIpAddress.getHostAddress(), is(BAD_IP_ADDRESS));
309 assertThat(aaaManager.radiusMacAddress, is(AaaConfig.DEFAULT_RADIUS_MAC));
Ray Milkeyfcb623d2015-10-01 16:48:18 -0700310 }
Ari Saha89831742015-06-26 10:31:48 -0700311}