veyron/runtimes/google/ipc: The blessings the server is started with
are the its blessings FOREVER!
If one wants to use new blessings they need to create a new server
with those blessings.
Change-Id: I49a06b5cfe367d728f37c0b4dc43f4a4d7a4e808
diff --git a/runtimes/google/naming/namespace/all_test.go b/runtimes/google/naming/namespace/all_test.go
index 823b547..29e7bcc 100644
--- a/runtimes/google/naming/namespace/all_test.go
+++ b/runtimes/google/naming/namespace/all_test.go
@@ -715,23 +715,19 @@
}
// Intermediate mounttables should be authenticated.
- // Simulate an "attacker" by changing the blessings presented by this
- // intermediate mounttable (which will not be consistent with the
- // blessing pattern in the mount entry). A subtle annoyance here: This
- // "attack" is valid only until the child mounttable remounts itself.
- // Currently this remounting period is set to 1 minute (publishPeriod
- // in ipc/consts.go), but if that changes - then this test may need
- // to change as well.
- runMT(t, mtCtx, "mt")
- attacker, err := veyron2.GetPrincipal(mtCtx).BlessSelf("attacker")
- if err != nil {
- t.Fatal(err)
- }
+ mt := runMT(t, mtCtx, "mt")
+ // Mount a server on "mt".
if err := mount("mt/server", ep1, time.Minute, naming.ReplaceMountOpt(true)); err != nil {
t.Error(err)
- } else if err := veyron2.GetPrincipal(mtCtx).BlessingStore().SetDefault(attacker); err != nil {
+ }
+ // Imagine that the network address of "mt" has been taken over by an attacker. However, this attacker cannot
+ // mess with the mount entry for "mt". This would result in "mt" and its mount entry (in the global mounttable)
+ // having inconsistent blessings. Simulate this by explicitly changing the mount entry for "mt".
+ if err := veyron2.GetNamespace(mtCtx).Mount(mtCtx, "mt", mt.name, time.Minute, naming.ServesMountTableOpt(true), naming.MountedServerBlessingsOpt{"realmounttable"}, naming.ReplaceMountOpt(true)); err != nil {
t.Error(err)
- } else if e, err := resolve("mt/server", options.SkipResolveAuthorization{}); err != nil {
+ }
+
+ if e, err := resolve("mt/server", options.SkipResolveAuthorization{}); err != nil {
t.Errorf("Resolve should succeed when skipping server authorization. Got (%v, %v)", e, err)
} else if e, err := resolve("mt/server"); !verror.Is(err, verror.ErrNotTrusted.ID) {
t.Errorf("Resolve should have failed with %q because an attacker has taken over the intermediate mounttable. Got (%+v, errorid=%q:%v)", verror.ErrNotTrusted.ID, e, verror.ErrorID(err), err)