@@ -912,17 +912,6 @@ AT_CHECK_UNQUOTED(
912
912
[[@<:@{"rows":@<:@{"private_key":"$PKIDIR/testpki-privkey2.pem"}@:>@}@:>@
913
913
]], [ignore])
914
914
915
- # Check that, when the server has TLSv1.2+ and the client has
916
- # TLSv1.1, connection fails.
917
- AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1]), [1], [stdout], [stderr])
918
- cat stderr > output
919
- AT_CHECK_UNQUOTED(
920
- [sed -n "/failed to connect/s/ (.*)//p" output], [0],
921
- [ovsdb-client: failed to connect to "ssl:127.0.0.1:$SSL_PORT"
922
- ],
923
- [ignore])
924
- AT_CHECK([grep -q 'TLSv1.1 protocol is deprecated' output])
925
- AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.1' stderr])
926
915
# Check that when ciphers are not compatible, a negotiation
927
916
# failure occurs.
928
917
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2], [ECDHE-ECDSA-AES256-GCM-SHA384]),
@@ -954,22 +943,100 @@ AT_CHECK_UNQUOTED(
954
943
AT_CHECK([grep -q -E "(sslv3|ssl/tls) alert handshake failure" output])
955
944
956
945
# Checking parsing of different protocol ranges.
957
- AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1,TLSv1.3]), [0], [stdout], [stderr])
958
- AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
959
- AT_CHECK([grep -q \
960
- 'TLSv1.2 is not configured, but will be enabled anyway' stderr])
961
- AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1-TLSv1.3]), [0], [stdout], [stderr])
962
- AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
963
- AT_CHECK([grep -q 'will be enabled anyway' stderr], [1])
964
- AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3-TLSv1.1]), [0], [stdout], [stderr])
965
- AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
966
- AT_CHECK([grep -q 'will be enabled anyway' stderr], [1])
946
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2,TLSv1.3]), [0], [stdout], [stderr])
947
+ AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
948
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2-TLSv1.3]), [0], [stdout], [stderr])
949
+ AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
950
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3-TLSv1.2]), [0], [stdout], [stderr])
951
+ AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
967
952
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3+]), [0], [stdout], [stderr])
968
953
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.3 or later' stderr])
969
954
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2-TLSv1.3,TLSv1.3+]), [0], [stdout], [stderr])
970
955
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
971
956
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2+TLSv1.3]), [0], [stdout], [stderr])
972
957
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
958
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1+]), [0], [stdout], [stderr])
959
+ AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
960
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1]), [0], [stdout], [stderr])
961
+ AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
962
+
963
+ OVSDB_SERVER_SHUTDOWN(["
964
+ /stream_ssl|WARN/d
965
+ /Protocol error/d
966
+ "])
967
+ AT_CLEANUP
968
+
969
+ AT_SETUP([SSL/TLS db: implementation (TLSv1.3 only)])
970
+ AT_KEYWORDS([ovsdb server positive ssl tls $5])
971
+ AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
972
+ # For this test, we pass PKIDIR through a ovsdb-tool transact and
973
+ # msys on Windows does not convert the path style automatically.
974
+ # So, do that forcefully with a 'pwd -W' (called through pwd() function).
975
+ PKIDIR="$(cd $abs_top_builddir/tests && pwd)"
976
+ AT_SKIP_IF([expr "$PKIDIR" : ".*[[ '\"
977
+ \\]]"])
978
+ AT_DATA([schema],
979
+ [[{"name": "mydb",
980
+ "tables": {
981
+ "SSL": {
982
+ "columns": {
983
+ "private_key": {"type": "string"},
984
+ "certificate": {"type": "string"},
985
+ "ca_cert": {"type": "string"},
986
+ "ssl_protocols" : {"type": "string"},
987
+ "ssl_ciphers" : {"type" : "string"},
988
+ "ssl_ciphersuites" : {"type": "string"}
989
+ }}}}
990
+ ]])
991
+ AT_CHECK([ovsdb-tool create db schema], [0], [stdout], [ignore])
992
+ AT_CHECK(
993
+ [[ovsdb-tool transact db \
994
+ '["mydb",
995
+ {"op": "insert",
996
+ "table": "SSL",
997
+ "row": {"private_key": "'"$PKIDIR/testpki-privkey2.pem"'",
998
+ "certificate": "'"$PKIDIR/testpki-cert2.pem"'",
999
+ "ca_cert": "'"$PKIDIR/testpki-cacert.pem"'",
1000
+ "ssl_protocols": "'"TLSv1.3"'"
1001
+ }}]']],
1002
+ [0], [ignore], [ignore])
1003
+ on_exit 'kill `cat *.pid`'
1004
+ AT_CHECK(
1005
+ [ovsdb-server --log-file --detach --no-chdir --pidfile \
1006
+ --private-key=db:mydb,SSL,private_key \
1007
+ --certificate=db:mydb,SSL,certificate \
1008
+ --ca-cert=db:mydb,SSL,ca_cert \
1009
+ --ssl-protocols=db:mydb,SSL,ssl_protocols \
1010
+ --ssl-ciphers=db:mydb,SSL,ssl_ciphers \
1011
+ --ssl-ciphersuites=db:mydb,SSL,ssl_ciphersuites \
1012
+ --remote=pssl:0:127.0.0.1 db],
1013
+ [0], [ignore], [ignore])
1014
+ PARSE_LISTENING_PORT([ovsdb-server.log], [SSL_PORT])
1015
+
1016
+ # SSL_OVSDB_CLIENT(PROTOCOL)
1017
+ m4_define([SSL_OVSDB_CLIENT], [dnl
1018
+ ovsdb-client -vconsole:stream_ssl:dbg \
1019
+ --private-key=$PKIDIR/testpki-privkey.pem \
1020
+ --certificate=$PKIDIR/testpki-cert.pem \
1021
+ --ca-cert=$PKIDIR/testpki-cacert.pem \
1022
+ --ssl-protocols=[$1] \
1023
+ transact ssl:127.0.0.1:$SSL_PORT \
1024
+ '[[["mydb",
1025
+ {"op": "select",
1026
+ "table": "SSL",
1027
+ "where": [],
1028
+ "columns": ["private_key"]}]]]'])
1029
+
1030
+ # Check that, when the server has TLSv1.3 and the client has
1031
+ # TLSv1.2, connection fails.
1032
+ AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2]), [1], [stdout], [stderr])
1033
+ cat stderr > output
1034
+ AT_CHECK_UNQUOTED(
1035
+ [sed -n "/failed to connect/s/ (.*)//p" output], [0],
1036
+ [ovsdb-client: failed to connect to "ssl:127.0.0.1:$SSL_PORT"
1037
+ ],
1038
+ [ignore])
1039
+ AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.2' stderr])
973
1040
974
1041
OVSDB_SERVER_SHUTDOWN(["
975
1042
/stream_ssl|WARN/d
0 commit comments