hash-of-wisdom/test/integration/slowloris_test.go

116 lines
3.1 KiB
Go
Raw Normal View History

2025-08-23 09:37:43 +03:00
package integration
import (
"net"
"testing"
"time"
"hash-of-wisdom/internal/server"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func TestSlowlorisProtection_SlowReader(t *testing.T) {
// Setup server with very short read timeout for testing
2025-08-23 12:12:45 +03:00
serverConfig := &server.Config{
Address: ":0",
Timeouts: server.TimeoutConfig{
Read: 100 * time.Millisecond,
Write: 5 * time.Second,
Connection: 15 * time.Second,
},
}
2025-08-23 09:37:43 +03:00
2025-08-23 12:12:45 +03:00
srv := setupTestServerWithConfig(t, serverConfig)
2025-08-23 09:37:43 +03:00
defer srv.Stop()
// Connect to server
conn, err := net.Dial("tcp", srv.Address())
require.NoError(t, err)
defer conn.Close()
// Send partial message header very slowly (slowloris attack)
_, err = conn.Write([]byte{0x01}) // Challenge request type
require.NoError(t, err)
// Wait longer than read timeout before sending length
time.Sleep(200 * time.Millisecond)
// Try to send more data - connection should be timed out
_, err = conn.Write([]byte{0x00, 0x00, 0x00, 0x00}) // Payload length
// Verify connection is closed by trying to read
buffer := make([]byte, 1024)
conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
_, err = conn.Read(buffer)
assert.Error(t, err, "Connection should be closed due to slow reading")
}
2025-08-23 12:12:45 +03:00
func TestSlowlorisProtection_SlowConnectionTimeout(t *testing.T) {
// Setup server with very short connection timeout for testing
serverConfig := &server.Config{
Address: ":0",
Timeouts: server.TimeoutConfig{
Read: 5 * time.Second,
Write: 5 * time.Second,
Connection: 200 * time.Millisecond,
},
}
2025-08-23 09:37:43 +03:00
2025-08-23 12:12:45 +03:00
srv := setupTestServerWithConfig(t, serverConfig)
2025-08-23 09:37:43 +03:00
defer srv.Stop()
2025-08-23 12:12:45 +03:00
// Connect to server but do nothing
2025-08-23 09:37:43 +03:00
conn, err := net.Dial("tcp", srv.Address())
require.NoError(t, err)
defer conn.Close()
2025-08-23 12:12:45 +03:00
// Wait longer than connection timeout
time.Sleep(300 * time.Millisecond)
2025-08-23 09:37:43 +03:00
2025-08-23 12:12:45 +03:00
// Try to read - connection should be closed
2025-08-23 09:37:43 +03:00
buffer := make([]byte, 1024)
2025-08-23 12:12:45 +03:00
conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
2025-08-23 09:37:43 +03:00
_, err = conn.Read(buffer)
assert.Error(t, err, "Connection should be closed due to connection timeout")
}
2025-08-23 12:12:45 +03:00
func TestSlowlorisProtection_MultipleSlowClients(t *testing.T) {
2025-08-23 09:37:43 +03:00
// Setup server with short timeouts
2025-08-23 12:12:45 +03:00
serverConfig := &server.Config{
Address: ":0",
Timeouts: server.TimeoutConfig{
Read: 1 * time.Second,
Write: 1 * time.Second,
Connection: 2 * time.Second,
},
}
2025-08-23 09:37:43 +03:00
2025-08-23 12:12:45 +03:00
srv := setupTestServerWithConfig(t, serverConfig)
2025-08-23 09:37:43 +03:00
defer srv.Stop()
2025-08-23 12:12:45 +03:00
// Create multiple slow connections
var connections []net.Conn
for i := 0; i < 5; i++ {
2025-08-23 09:37:43 +03:00
conn, err := net.Dial("tcp", srv.Address())
require.NoError(t, err)
2025-08-23 12:12:45 +03:00
connections = append(connections, conn)
// Send partial data on each connection
conn.Write([]byte{0x01}) // Challenge request type only
2025-08-23 09:37:43 +03:00
}
2025-08-23 12:12:45 +03:00
// Wait for timeouts to kick in
time.Sleep(1500 * time.Millisecond)
2025-08-23 09:37:43 +03:00
2025-08-23 12:12:45 +03:00
// All connections should be closed
buffer := make([]byte, 1024)
for i, conn := range connections {
conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
2025-08-23 09:37:43 +03:00
_, err := conn.Read(buffer)
2025-08-23 12:12:45 +03:00
assert.Error(t, err, "Connection %d should be closed", i)
conn.Close()
2025-08-23 09:37:43 +03:00
}
}