123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298 |
- import unittest
- from time import sleep
- import uuid
- import socket
- import requests
- import os
-
- TEST_SERVER = 'sovereign.local'
- TEST_ADDRESS = 'sovereign@sovereign.local'
- TEST_PASSWORD = 'foo'
- CA_BUNDLE = 'roles/common/files/wildcard_ca.pem'
-
-
- socket.setdefaulttimeout(5)
- os.environ['REQUESTS_CA_BUNDLE'] = CA_BUNDLE
-
-
- class SSHTests(unittest.TestCase):
- def test_ssh_banner(self):
- """SSH is responding with its banner"""
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.connect((TEST_SERVER, 22))
- data = s.recv(1024)
- s.close()
-
- self.assertRegexpMatches(data, '^SSH-2.0-OpenSSH')
-
-
- class WebTests(unittest.TestCase):
- def test_blog_http(self):
- """Blog is redirecting to https"""
- # FIXME: requests won't verify sovereign.local with *.sovereign.local cert
- r = requests.get('http://' + TEST_SERVER, verify=False)
-
- # We should be redirected to https
- self.assertEquals(r.history[0].status_code, 301)
- self.assertEquals(r.url, 'https://' + TEST_SERVER + '/')
-
- # 403 - Since there is no documents in the blog directory
- self.assertEquals(r.status_code, 403)
-
- def test_webmail_http(self):
- """Webmail is redirecting to https and displaying login page"""
- r = requests.get('http://mail.' + TEST_SERVER)
-
- # We should be redirected to https
- self.assertEquals(r.history[0].status_code, 301)
- self.assertEquals(r.url, 'https://mail.' + TEST_SERVER + '/')
-
- # 200 - We should be at the login page
- self.assertEquals(r.status_code, 200)
- self.assertIn(
- 'Welcome to Roundcube Webmail',
- r.content
- )
-
- def test_owncloud_http(self):
- """ownCloud is redirecting to https and displaying login page"""
- r = requests.get('http://cloud.' + TEST_SERVER)
-
- # We should be redirected to https
- self.assertEquals(r.history[0].status_code, 301)
- self.assertEquals(r.url, 'https://cloud.' + TEST_SERVER + '/')
-
- # 200 - We should be at the login page
- self.assertEquals(r.status_code, 200)
- self.assertIn(
- 'ownCloud',
- r.content
- )
-
- def test_znc_http(self):
- """ZNC web interface is displaying login page"""
- # FIXME: requests won't verify sovereign.local with *.sovereign.local cert
- r = requests.get('https://' + TEST_SERVER + ':6697', verify=False)
- self.assertEquals(r.status_code, 200)
- self.assertIn(
- "Welcome to ZNC's web interface!",
- r.content
- )
-
-
- class IRCTests(unittest.TestCase):
- def test_irc_auth(self):
- """ZNC is accepting encrypted logins"""
- import ssl
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- ssl_sock = ssl.wrap_socket(s, ca_certs=CA_BUNDLE, cert_reqs=ssl.CERT_REQUIRED)
- ssl_sock.connect((TEST_SERVER, 6697))
-
- # Check the encryption parameters
- cipher, version, bits = ssl_sock.cipher()
- self.assertEquals(cipher, 'AES256-SHA')
- self.assertEquals(version, 'TLSv1/SSLv3')
- self.assertEquals(bits, 256)
-
- # Login
- ssl_sock.send('CAP REQ sasl multi-prefix\r\n')
- ssl_sock.send('PASS foo\r\n')
- ssl_sock.send('NICK sovereign\r\n')
- ssl_sock.send('USER sovereign 0 * Sov\r\n')
-
- # Read until we see the ZNC banner (or timeout)
- while 1:
- r = ssl_sock.recv(1024)
- if 'Connected to ZNC' in r:
- break
-
-
- def new_message(from_email, to_email):
- """Creates an email (headers & body) with a random subject"""
- from email.mime.text import MIMEText
- msg = MIMEText('Testing')
- msg['Subject'] = uuid.uuid4().hex[:8]
- msg['From'] = from_email
- msg['To'] = to_email
- return msg.as_string(), msg['subject']
-
-
- class MailTests(unittest.TestCase):
- def assertEmailReceived(self, subject):
- """Connects with IMAP and asserts the existance of an email, then deletes it"""
- import imaplib
-
- sleep(1)
-
- # Login to IMAP
- m = imaplib.IMAP4_SSL(TEST_SERVER, 993)
- m.login(TEST_ADDRESS, TEST_PASSWORD)
- m.select()
-
- # Assert the message exist
- typ, data = m.search(None, '(SUBJECT \"{}\")'.format(subject))
- self.assertTrue(len(data[0].split()), 1)
-
- # Delete it & logout
- m.store(data[0].strip(), '+FLAGS', '\\Deleted')
- m.expunge()
- m.close()
- m.logout()
-
- def test_imap_requires_ssl(self):
- """IMAP without SSL is NOT available"""
- import imaplib
-
- with self.assertRaisesRegexp(socket.timeout, 'timed out'):
- imaplib.IMAP4(TEST_SERVER, 143)
-
- def test_smtps(self):
- """Email sent from an MUA via SMTPS is delivered"""
- import smtplib
- msg, subject = new_message(TEST_ADDRESS, 'root@sovereign.local')
- s = smtplib.SMTP_SSL(TEST_SERVER, 465)
- s.login(TEST_ADDRESS, TEST_PASSWORD)
- s.sendmail(TEST_ADDRESS, ['root@sovereign.local'], msg)
- s.quit()
- self.assertEmailReceived(subject)
-
- def test_smtps_requires_auth(self):
- """SMTPS with no authentication is rejected"""
- import smtplib
- s = smtplib.SMTP_SSL(TEST_SERVER, 465)
-
- with self.assertRaisesRegexp(smtplib.SMTPRecipientsRefused, 'Access denied'):
- s.sendmail(TEST_ADDRESS, ['root@sovereign.local'], 'Test')
-
- s.quit()
-
- def test_smtp(self):
- """Email sent from an MTA is delivered"""
- import smtplib
- msg, subject = new_message('someone@example.com', TEST_ADDRESS)
- s = smtplib.SMTP(TEST_SERVER, 25)
- s.sendmail('someone@example.com', [TEST_ADDRESS], msg)
- s.quit()
- self.assertEmailReceived(subject)
-
- def test_smtp_tls(self):
- """Email sent from an MTA via SMTP+TLS is delivered"""
- import smtplib
- msg, subject = new_message('someone@example.com', TEST_ADDRESS)
- s = smtplib.SMTP(TEST_SERVER, 25)
- s.starttls()
- s.sendmail('someone@example.com', [TEST_ADDRESS], msg)
- s.quit()
- self.assertEmailReceived(subject)
-
- def test_smtps_headers(self):
- """Email sent from an MUA has DKIM and TLS headers"""
- import smtplib
- import imaplib
-
- # Send a message to root
- msg, subject = new_message(TEST_ADDRESS, 'root@sovereign.local')
- s = smtplib.SMTP_SSL(TEST_SERVER, 465)
- s.login(TEST_ADDRESS, TEST_PASSWORD)
- s.sendmail(TEST_ADDRESS, ['root@sovereign.local'], msg)
- s.quit()
-
- sleep(1)
-
- # Get the message
- m = imaplib.IMAP4_SSL(TEST_SERVER, 993)
- m.login(TEST_ADDRESS, TEST_PASSWORD)
- m.select()
- _, res = m.search(None, '(SUBJECT \"{}\")'.format(subject))
- _, data = m.fetch(res[0], '(RFC822)')
-
- self.assertIn(
- 'DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sovereign.local;',
- data[0][1]
- )
-
- self.assertIn(
- '(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))',
- data[0][1]
- )
-
- # Clean up
- m.store(res[0].strip(), '+FLAGS', '\\Deleted')
- m.expunge()
- m.close()
- m.logout()
-
- def test_smtp_headers(self):
- """Email sent from an MTA via SMTP+TLS has X-DSPAM and TLS headers"""
- import smtplib
- import imaplib
-
- # Send a message to root
- msg, subject = new_message('someone@example.com', TEST_ADDRESS)
- s = smtplib.SMTP(TEST_SERVER, 25)
- s.starttls()
- s.sendmail('someone@example.com', [TEST_ADDRESS], msg)
- s.quit()
-
- sleep(1)
-
- # Get the message
- m = imaplib.IMAP4_SSL(TEST_SERVER, 993)
- m.login(TEST_ADDRESS, TEST_PASSWORD)
- m.select()
- _, res = m.search(None, '(SUBJECT \"{}\")'.format(subject))
- _, data = m.fetch(res[0], '(RFC822)')
-
- self.assertIn(
- 'X-DSPAM-Result: Innocent',
- data[0][1]
- )
-
- self.assertIn(
- '(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))',
- data[0][1]
- )
-
- # Clean up
- m.store(res[0].strip(), '+FLAGS', '\\Deleted')
- m.expunge()
- m.close()
- m.logout()
-
-
- class XMPPTests(unittest.TestCase):
- def test_xmpp_c2s(self):
- """Prosody is listening on 5222 for clients and requiring TLS"""
-
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.connect((TEST_SERVER, 5222))
-
- # Based off http://wiki.xmpp.org/web/Programming_Jabber_Clients
- s.send("<stream:stream xmlns:stream='http://etherx.jabber.org/streams' "
- "xmlns='jabber:client' to='sovereign.local' version='1.0'>")
-
- data = s.recv(1024)
- s.close()
-
- self.assertRegexpMatches(
- data,
- "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'><required/></starttls>"
- )
-
- def test_xmpp_s2s(self):
- """Prosody is listening on 5269 for servers"""
-
- s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- s.connect((TEST_SERVER, 5269))
-
- # Base off http://xmpp.org/extensions/xep-0114.html
- s.send("<stream:stream xmlns:stream='http://etherx.jabber.org/streams' "
- "xmlns='jabber:component:accept' to='sovereign.local'>")
-
- data = s.recv(1024)
- s.close()
-
- self.assertRegexpMatches(
- data,
- "from='sovereign.local'"
- )
|