Skip to content

Commit 01a09a0

Browse files
toshiiwalex
authored andcommitted
Choose the highest TLS version
Please note that this is a stop-gap measure. Also add a basic SSL server test. Co-authored-by: alex <atoptsoglou@suse.com> Signed-off-by: IWAMOTO Toshihiro <iwamoto@valinux.co.jp> Signed-off-by: FUJITA Tomonori <fujita.tomonori@gmail.com>
1 parent 56e8fb3 commit 01a09a0

File tree

5 files changed

+132
-5
lines changed

5 files changed

+132
-5
lines changed

ryu/controller/controller.py

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -165,22 +165,37 @@ def stop_client_loop(self, addr):
165165

166166
def server_loop(self, ofp_tcp_listen_port, ofp_ssl_listen_port):
167167
if CONF.ctl_privkey is not None and CONF.ctl_cert is not None:
168+
if not hasattr(ssl, 'SSLContext'):
169+
# anything less than python 2.7.9 supports only TLSv1
170+
# or less, thus we choose TLSv1
171+
ssl_args = {'ssl_version': ssl.PROTOCOL_TLSv1}
172+
else:
173+
# from 2.7.9 and versions 3.4+ ssl context creation is
174+
# supported. Protocol_TLS from 2.7.13 and from 3.5.3
175+
# replaced SSLv23. Functionality is similar.
176+
if hasattr(ssl, 'PROTOCOL_TLS'):
177+
p = 'PROTOCOL_TLS'
178+
else:
179+
p = 'PROTOCOL_SSLv23'
180+
181+
ssl_args = {'ssl_ctx': ssl.SSLContext(getattr(ssl, p))}
182+
# Restrict non-safe versions
183+
ssl_args['ssl_ctx'].options |= ssl.OP_NO_SSLv3 | ssl.OP_NO_SSLv2
184+
168185
if CONF.ca_certs is not None:
169186
server = StreamServer((CONF.ofp_listen_host,
170187
ofp_ssl_listen_port),
171188
datapath_connection_factory,
172189
keyfile=CONF.ctl_privkey,
173190
certfile=CONF.ctl_cert,
174191
cert_reqs=ssl.CERT_REQUIRED,
175-
ca_certs=CONF.ca_certs,
176-
ssl_version=ssl.PROTOCOL_TLSv1)
192+
ca_certs=CONF.ca_certs, **ssl_args)
177193
else:
178194
server = StreamServer((CONF.ofp_listen_host,
179195
ofp_ssl_listen_port),
180196
datapath_connection_factory,
181197
keyfile=CONF.ctl_privkey,
182-
certfile=CONF.ctl_cert,
183-
ssl_version=ssl.PROTOCOL_TLSv1)
198+
certfile=CONF.ctl_cert, **ssl_args)
184199
else:
185200
server = StreamServer((CONF.ofp_listen_host,
186201
ofp_tcp_listen_port),

ryu/lib/hub.py

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@
4242
import ssl
4343
import socket
4444
import traceback
45+
import sys
4546

4647
getcurrent = eventlet.getcurrent
4748
patch = eventlet.monkey_patch
@@ -128,7 +129,17 @@ def __init__(self, listen_info, handle=None, backlog=None,
128129
if ssl_args:
129130
def wrap_and_handle(sock, addr):
130131
ssl_args.setdefault('server_side', True)
131-
handle(ssl.wrap_socket(sock, **ssl_args), addr)
132+
if 'ssl_ctx' in ssl_args:
133+
ctx = ssl_args.pop('ssl_ctx')
134+
ctx.load_cert_chain(ssl_args.pop('certfile'),
135+
ssl_args.pop('keyfile'))
136+
if 'cert_reqs' in ssl_args:
137+
ctx.verify_mode = ssl_args.pop('cert_reqs')
138+
if 'ca_certs' in ssl_args:
139+
ctx.load_verify_locations(ssl_args.pop('ca_certs'))
140+
handle(ctx.wrap_socket(sock, **ssl_args), addr)
141+
else:
142+
handle(ssl.wrap_socket(sock, **ssl_args), addr)
132143

133144
self.handle = wrap_and_handle
134145
else:

ryu/tests/unit/controller/cert.crt

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
-----BEGIN CERTIFICATE-----
2+
MIIDaDCCAlCgAwIBAgIJAKL09YuU92JPMA0GCSqGSIb3DQEBCwUAMEgxCzAJBgNV
3+
BAYTAkpQMRMwEQYDVQQIDApTb21lLVN0YXRlMSQwIgYDVQQKDBtSeXUgU0ROIEZy
4+
YW1ld29yayBDb21tdW5pdHkwIBcNMTkwMzI1MDE1NzQzWhgPMjI5MzAxMDYwMTU3
5+
NDNaMEgxCzAJBgNVBAYTAkpQMRMwEQYDVQQIDApTb21lLVN0YXRlMSQwIgYDVQQK
6+
DBtSeXUgU0ROIEZyYW1ld29yayBDb21tdW5pdHkwggEiMA0GCSqGSIb3DQEBAQUA
7+
A4IBDwAwggEKAoIBAQDLT29+6JwD75wH7gPVxU52hrysBfxE6WjyT/nT+aSIQmZu
8+
SU6/5hECOnV4YdyB7rxFu2WO2SD5PgeoHPBpTqtxrdTWoVOWVljnNcqEwSCS7bl9
9+
nbgX8uxCacg9qbFNJJRBAS0XQ2bSsD0GoOnhj3Olrz1u0wRIUqrR3A5giMbYwQPr
10+
S4cmkxfgp2uV+WCHk40WxZnGgWzIRhO11GK9CAGncncPYhj+23w+GFaHIf00TdV2
11+
JEvwLFuLf1EaewZ7rz8zf1sLHAxqx20A6VdledEpNAzt1L8goPhk1mHvRgUC7E2v
12+
FnSt1ePCJsVrvccudMdPBXSMfgJC2gmfdQefdSXRAgMBAAGjUzBRMB0GA1UdDgQW
13+
BBRjlXSQ2rVjwOr1io6iJyidmjCNfzAfBgNVHSMEGDAWgBRjlXSQ2rVjwOr1io6i
14+
JyidmjCNfzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCC1Uvo
15+
4PdC5YQSXkAhrxgVhexp87VVkoWwpno75hvfoCjtSkb7+cskvQbPM14zbjIUrsli
16+
qmTkjXyTUe8q5U06OitMAyM6qUvS0nFDi5aPQYV6N0XmJ+rV18prfQORyHvEmEyv
17+
nqHVPoQkmGPpJ8aOVrTlECyxG7wLI2UxBEB3Atk51QHzbGGLKW7g5tHY6J5cMe/9
18+
ydeClJk2/AXkoqWkbtJrbw46alH97CajuLn/4D9B/Rm+M1Kg48gze5zJ7+WrB0Jl
19+
pAhRqMM3upaOlXdeYDdNDgE0j/ulZGY2UssFIoHylcrb4QKQXjwqRXYhuuucJQJ3
20+
vsY4y1D/qps9llRL
21+
-----END CERTIFICATE-----

ryu/tests/unit/controller/cert.key

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
-----BEGIN PRIVATE KEY-----
2+
MIIEuwIBADANBgkqhkiG9w0BAQEFAASCBKUwggShAgEAAoIBAQDLT29+6JwD75wH
3+
7gPVxU52hrysBfxE6WjyT/nT+aSIQmZuSU6/5hECOnV4YdyB7rxFu2WO2SD5Pgeo
4+
HPBpTqtxrdTWoVOWVljnNcqEwSCS7bl9nbgX8uxCacg9qbFNJJRBAS0XQ2bSsD0G
5+
oOnhj3Olrz1u0wRIUqrR3A5giMbYwQPrS4cmkxfgp2uV+WCHk40WxZnGgWzIRhO1
6+
1GK9CAGncncPYhj+23w+GFaHIf00TdV2JEvwLFuLf1EaewZ7rz8zf1sLHAxqx20A
7+
6VdledEpNAzt1L8goPhk1mHvRgUC7E2vFnSt1ePCJsVrvccudMdPBXSMfgJC2gmf
8+
dQefdSXRAgMBAAECggEAcvPsB6Z/qB4Pa9Bg7LqNnaia/uy3cUND6lXb3MW3CK/6
9+
eHsMgqYTkd3502IJqpGQdCD70CPmZ+Zxr9UE/ZXUjAcMY3p952/U/o3EfwEvaMPu
10+
8B6AG1Jn0Tk8VdkffY2kIYkHtLKQbanmJ1xOQRG6AsEti/7V2gqbuOKiYmSTgbPG
11+
Upw9JNdtR6bZrGrrEXJbPCrSCej47MDyE+nt4zMIsqmY5IlbTMHcTKVDGeKbT9qT
12+
7/Uyg+Tb62eber9iQhE0OteLt2GwrJR5yZ5QKNKM4SPqwYlOvQ9z289eZMVU3uwI
13+
1NI1YRM5EMsdWrzFye7H/T/jsCaWrO0zmI/I4BMfEQKBgQDtUgPyY4PgVXVZ/hha
14+
l5pi66GQ79+6LJP3SHb3I6p0iULq3oV+onG0Ezvx2vc21sbuLEazNlJoXzEzSIVM
15+
/RjNJ9FsD/ENEuJedkspwtZZ4O4ZH6wKyHg/LCUly59ER37Ql/XwIX7adKCn7Z4d
16+
9xN3aQmPtLna/aIZ8HyptRpT9QKBgQDbUB67YXiIFY+k5cwtK0m8T3rY4WNpEwzr
17+
Y/1l+0EvXqCousU9MnLveyY8EcLDh5SnM0CvH4mFS8xL/r/kcUO9cHwuM+KZ77KN
18+
Ukp9CRT9raxDZY/F0FVuET4LrJNnekCMsOnMxO51il/AHcul7886sEirkB1dsXND
19+
nkh9h8g87QJ/cRikyN6j+kS/qCNvd7zH1lx0op2uAQs9eJsQFrbohKDlQwjIlZDU
20+
nvyLlLbFGV1BcD+pcb5xh0vWJppo7EexihNvug/e0FwvhNTa/QvdGvgWf+KYGotu
21+
wqxHB7wCKofn54CDs+xCh9kMtvqGX8FfhYiJBfMan0I//hydTEMCSQKBgEiv6E+g
22+
gYtQ4hf8FczOsRSZnxSstv8HUlvd+wlG2hbyHPtvU5nx04gt38E+/bdCg3FbGlAw
23+
eqrUMXTqjP0Q0SvDUVUa2zq76AjQwmFoli1x10tLKPieEQJ28oJ6Ayzjpus6Y3L7
24+
vjD02MFa3rkznxJLhPpfvGvmOVaq6km4rBQNAoGBALQGfaRiAtp6lSubi4Etdwtg
25+
Tps2o1SBXfzENpq6s99k+UdCBLh90uzuA897GClsUYeuAYUyxQP3otIZUuSjq/Ht
26+
JHYwT9QxOkSYrNCfQW/nF0CJjZ6TcvcFp8SdyUUbwCR2rkDK7LlMzxkfU3cCrwMP
27+
q51oIVlKjIxg86JJXrRQ
28+
-----END PRIVATE KEY-----

ryu/tests/unit/controller/test_controller.py

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@
2222

2323
import json
2424
import os
25+
import ssl
2526
import sys
2627
import warnings
2728
import logging
@@ -33,9 +34,11 @@
3334
from ryu.base import app_manager # To suppress cyclic import
3435
from ryu.controller import controller
3536
from ryu.controller import handler
37+
from ryu.lib import hub
3638
from ryu.ofproto import ofproto_v1_3_parser
3739
from ryu.ofproto import ofproto_v1_2_parser
3840
from ryu.ofproto import ofproto_v1_0_parser
41+
hub.patch()
3942

4043

4144
LOG = logging.getLogger('test_controller')
@@ -177,3 +180,52 @@ def recv(self, bufsize):
177180
self.assertEqual(state, handler.MAIN_DISPATCHER)
178181
self.assertEqual(kwargs, {})
179182
self.assertEqual(expected_json, output_json)
183+
184+
185+
class TestOpenFlowController(unittest.TestCase):
186+
"""
187+
Test cases for OpenFlowController
188+
"""
189+
@mock.patch("ryu.controller.controller.CONF")
190+
def _test_ssl(self, this_dir, port, conf_mock):
191+
conf_mock.ofp_ssl_listen_port = port
192+
conf_mock.ofp_listen_host = "127.0.0.1"
193+
conf_mock.ca_certs = None
194+
conf_mock.ctl_cert = os.path.join(this_dir, 'cert.crt')
195+
conf_mock.ctl_privkey = os.path.join(this_dir, 'cert.key')
196+
c = controller.OpenFlowController()
197+
c()
198+
199+
def test_ssl(self):
200+
"""Tests SSL server functionality."""
201+
# TODO: TLS version enforcement is necessary to avoid
202+
# vulnerable versions. Currently, this only tests TLS
203+
# connectivity.
204+
this_dir = os.path.dirname(sys.modules[__name__].__file__)
205+
saved_exception = None
206+
try:
207+
ssl_version = ssl.PROTOCOL_TLS
208+
except AttributeError:
209+
# For compatibility with older pythons.
210+
ssl_version = ssl.PROTOCOL_TLSv1
211+
for i in range(3):
212+
try:
213+
# Try a few times as this can fail with EADDRINUSE
214+
port = random.randint(5000, 10000)
215+
server = hub.spawn(self._test_ssl, this_dir, port)
216+
hub.sleep(1)
217+
client = hub.StreamClient(("127.0.0.1", port),
218+
timeout=5,
219+
ssl_version=ssl_version)
220+
if client.connect() is not None:
221+
break
222+
except Exception as e:
223+
saved_exception = e
224+
continue
225+
finally:
226+
try:
227+
hub.kill(server)
228+
except Exception:
229+
pass
230+
else:
231+
self.fail("Failed to connect: " + str(saved_exception))

0 commit comments

Comments
 (0)