From 3d0386f27ca66379acf50199e1d1298386eeeeb8 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Mon, 6 May 2024 02:55:53 +0200 Subject: Adding upstream version 3.2.1. Signed-off-by: Daniel Baumann --- daemon/tls.c | 1282 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 1282 insertions(+) create mode 100644 daemon/tls.c (limited to 'daemon/tls.c') diff --git a/daemon/tls.c b/daemon/tls.c new file mode 100644 index 0000000..fd7fac5 --- /dev/null +++ b/daemon/tls.c @@ -0,0 +1,1282 @@ +/* + * Copyright (C) 2016 American Civil Liberties Union (ACLU) + * 2016-2018 CZ.NIC, z.s.p.o + * + * Initial Author: Daniel Kahn Gillmor + * Ondřej Surý + * + * This program is free software: you can redistribute it and/or modify it under + * the terms of the GNU General Public License as published by the Free + * Software Foundation, either version 3 of the License, or (at your option) + * any later version. + * + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for + * more details. + * + * You should have received a copy of the GNU General Public License along with + * this program. If not, see . + */ + +#include +#include +#include +#include +#include + +#include +#include +#include + +#include "contrib/ucw/lib.h" +#include "contrib/base64.h" +#include "daemon/io.h" +#include "daemon/tls.h" +#include "daemon/worker.h" +#include "daemon/session.h" + +#define EPHEMERAL_CERT_EXPIRATION_SECONDS_RENEW_BEFORE 60*60*24*7 +#define GNUTLS_PIN_MIN_VERSION 0x030400 + +/** @internal Debugging facility. */ +#ifdef DEBUG +#define DEBUG_MSG(...) kr_log_verbose("[tls] " __VA_ARGS__) +#else +#define DEBUG_MSG(...) +#endif + +struct async_write_ctx { + uv_write_t write_req; + struct tls_common_ctx *t; + char buf[]; +}; + +static char const server_logstring[] = "tls"; +static char const client_logstring[] = "tls_client"; + +static int client_verify_certificate(gnutls_session_t tls_session); + +/** + * Set mandatory security settings from + * https://tools.ietf.org/html/draft-ietf-dprive-dtls-and-tls-profiles-11#section-9 + * Performance optimizations are not implemented at the moment. + */ +static int kres_gnutls_set_priority(gnutls_session_t session) { + static const char * const priorities = + "NORMAL:" /* GnuTLS defaults */ + "-VERS-TLS1.0:-VERS-TLS1.1:" /* TLS 1.2 and higher */ + /* Some distros by default allow features that are considered + * too insecure nowadays, so let's disable them explicitly. */ + "-VERS-SSL3.0:-ARCFOUR-128:-COMP-ALL:+COMP-NULL"; + const char *errpos = NULL; + int err = gnutls_priority_set_direct(session, priorities, &errpos); + if (err != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] setting priority '%s' failed at character %zd (...'%s') with %s (%d)\n", + priorities, errpos - priorities, errpos, gnutls_strerror_name(err), err); + } + return err; +} + +static ssize_t kres_gnutls_pull(gnutls_transport_ptr_t h, void *buf, size_t len) +{ + struct tls_common_ctx *t = (struct tls_common_ctx *)h; + assert(t != NULL); + + ssize_t avail = t->nread - t->consumed; + DEBUG_MSG("[%s] pull wanted: %zu available: %zu\n", + t->client_side ? "tls_client" : "tls", len, avail); + if (t->nread <= t->consumed) { + errno = EAGAIN; + return -1; + } + + ssize_t transfer = MIN(avail, len); + memcpy(buf, t->buf + t->consumed, transfer); + t->consumed += transfer; + return transfer; +} + +static void on_write_complete(uv_write_t *req, int status) +{ + assert(req->data != NULL); + struct async_write_ctx *async_ctx = (struct async_write_ctx *)req->data; + struct tls_common_ctx *t = async_ctx->t; + assert(t->write_queue_size); + t->write_queue_size -= 1; + free(req->data); +} + +static bool stream_queue_is_empty(struct tls_common_ctx *t) +{ + return (t->write_queue_size == 0); +} + +static ssize_t kres_gnutls_vec_push(gnutls_transport_ptr_t h, const giovec_t * iov, int iovcnt) +{ + struct tls_common_ctx *t = (struct tls_common_ctx *)h; + + if (t == NULL) { + errno = EFAULT; + return -1; + } + + if (iovcnt == 0) { + return 0; + } + + assert(t->session); + uv_stream_t *handle = (uv_stream_t *)session_get_handle(t->session); + assert(handle && handle->type == UV_TCP); + + /* + * This is a little bit complicated. There are two different writes: + * 1. Immediate, these don't need to own the buffered data and return immediately + * 2. Asynchronous, these need to own the buffers until the write completes + * In order to avoid copying the buffer, an immediate write is tried first if possible. + * If it isn't possible to write the data without queueing, an asynchronous write + * is created (with copied buffered data). + */ + + size_t total_len = 0; + uv_buf_t uv_buf[iovcnt]; + for (int i = 0; i < iovcnt; ++i) { + uv_buf[i].base = iov[i].iov_base; + uv_buf[i].len = iov[i].iov_len; + total_len += iov[i].iov_len; + } + + /* Try to perform the immediate write first to avoid copy */ + int ret = 0; + if (stream_queue_is_empty(t)) { + ret = uv_try_write(handle, uv_buf, iovcnt); + DEBUG_MSG("[%s] push %zu <%p> = %d\n", + t->client_side ? "tls_client" : "tls", total_len, h, ret); + /* from libuv documentation - + uv_try_write will return either: + > 0: number of bytes written (can be less than the supplied buffer size). + < 0: negative error code (UV_EAGAIN is returned if no data can be sent immediately). + */ + if (ret == total_len) { + /* All the data were buffered by libuv. + * Return. */ + return ret; + } + + if (ret < 0 && ret != UV_EAGAIN) { + /* uv_try_write() has returned error code other then UV_EAGAIN. + * Return. */ + ret = -1; + errno = EIO; + return ret; + } + /* Since we are here expression below is true + * (ret != total_len) && (ret >= 0 || ret == UV_EAGAIN) + * or the same + * (ret != total_len && ret >= 0) || (ret != total_len && ret == UV_EAGAIN) + * i.e. either occurs partial write or UV_EAGAIN. + * Proceed and copy data amount to owned memory and perform async write. + */ + if (ret == UV_EAGAIN) { + /* No data were buffered, so we must buffer all the data. */ + ret = 0; + } + } + + /* Fallback when the queue is full, and it's not possible to do an immediate write */ + char *p = malloc(sizeof(struct async_write_ctx) + total_len - ret); + if (p != NULL) { + struct async_write_ctx *async_ctx = (struct async_write_ctx *)p; + /* Save pointer to session tls context */ + async_ctx->t = t; + char *buf = async_ctx->buf; + /* Skip data written in the partial write */ + size_t to_skip = ret; + /* Copy the buffer into owned memory */ + size_t off = 0; + for (int i = 0; i < iovcnt; ++i) { + if (to_skip > 0) { + /* Ignore current buffer if it's all skipped */ + if (to_skip >= uv_buf[i].len) { + to_skip -= uv_buf[i].len; + continue; + } + /* Skip only part of the buffer */ + uv_buf[i].base += to_skip; + uv_buf[i].len -= to_skip; + to_skip = 0; + } + memcpy(buf + off, uv_buf[i].base, uv_buf[i].len); + off += uv_buf[i].len; + } + uv_buf[0].base = buf; + uv_buf[0].len = off; + + /* Create an asynchronous write request */ + uv_write_t *write_req = &async_ctx->write_req; + memset(write_req, 0, sizeof(uv_write_t)); + write_req->data = p; + + /* Perform an asynchronous write with a callback */ + if (uv_write(write_req, handle, uv_buf, 1, on_write_complete) == 0) { + ret = total_len; + t->write_queue_size += 1; + } else { + free(p); + errno = EIO; + ret = -1; + } + } else { + errno = ENOMEM; + ret = -1; + } + + DEBUG_MSG("[%s] queued %zu <%p> = %d\n", + t->client_side ? "tls_client" : "tls", total_len, h, ret); + + return ret; +} + +/** Perform TLS handshake and handle error codes according to the documentation. + * See See https://gnutls.org/manual/html_node/TLS-handshake.html#TLS-handshake + * The function returns kr_ok() or success or non fatal error, kr_error(EAGAIN) on blocking, or kr_error(EIO) on fatal error. + */ +static int tls_handshake(struct tls_common_ctx *ctx, tls_handshake_cb handshake_cb) { + struct session *session = ctx->session; + const char *logstring = ctx->client_side ? client_logstring : server_logstring; + + int err = gnutls_handshake(ctx->tls_session); + if (err == GNUTLS_E_SUCCESS) { + /* Handshake finished, return success */ + ctx->handshake_state = TLS_HS_DONE; + struct sockaddr *peer = session_get_peer(session); + kr_log_verbose("[%s] TLS handshake with %s has completed\n", + logstring, kr_straddr(peer)); + if (handshake_cb) { + if (handshake_cb(session, 0) != kr_ok()) { + return kr_error(EIO); + } + } + } else if (err == GNUTLS_E_AGAIN) { + return kr_error(EAGAIN); + } else if (gnutls_error_is_fatal(err)) { + /* Fatal errors, return error as it's not recoverable */ + kr_log_verbose("[%s] gnutls_handshake failed: %s (%d)\n", + logstring, + gnutls_strerror_name(err), err); + if (handshake_cb) { + handshake_cb(session, -1); + } + return kr_error(EIO); + } else if (err == GNUTLS_E_WARNING_ALERT_RECEIVED) { + /* Handle warning when in verbose mode */ + const char *alert_name = gnutls_alert_get_name(gnutls_alert_get(ctx->tls_session)); + if (alert_name != NULL) { + struct sockaddr *peer = session_get_peer(session); + kr_log_verbose("[%s] TLS alert from %s received: %s\n", + logstring, kr_straddr(peer), alert_name); + } + } + return kr_ok(); +} + + +struct tls_ctx_t *tls_new(struct worker_ctx *worker) +{ + assert(worker != NULL); + assert(worker->engine != NULL); + + struct network *net = &worker->engine->net; + if (!net->tls_credentials) { + net->tls_credentials = tls_get_ephemeral_credentials(worker->engine); + if (!net->tls_credentials) { + kr_log_error("[tls] X.509 credentials are missing, and ephemeral credentials failed; no TLS\n"); + return NULL; + } + kr_log_info("[tls] Using ephemeral TLS credentials:\n"); + tls_credentials_log_pins(net->tls_credentials); + } + + time_t now = time(NULL); + if (net->tls_credentials->valid_until != GNUTLS_X509_NO_WELL_DEFINED_EXPIRATION) { + if (net->tls_credentials->ephemeral_servicename) { + /* ephemeral cert: refresh if due to expire within a week */ + if (now >= net->tls_credentials->valid_until - EPHEMERAL_CERT_EXPIRATION_SECONDS_RENEW_BEFORE) { + struct tls_credentials *newcreds = tls_get_ephemeral_credentials(worker->engine); + if (newcreds) { + tls_credentials_release(net->tls_credentials); + net->tls_credentials = newcreds; + kr_log_info("[tls] Renewed expiring ephemeral X.509 cert\n"); + } else { + kr_log_error("[tls] Failed to renew expiring ephemeral X.509 cert, using existing one\n"); + } + } + } else { + /* non-ephemeral cert: warn once when certificate expires */ + if (now >= net->tls_credentials->valid_until) { + kr_log_error("[tls] X.509 certificate has expired!\n"); + net->tls_credentials->valid_until = GNUTLS_X509_NO_WELL_DEFINED_EXPIRATION; + } + } + } + + struct tls_ctx_t *tls = calloc(1, sizeof(struct tls_ctx_t)); + if (tls == NULL) { + kr_log_error("[tls] failed to allocate TLS context\n"); + return NULL; + } + + int err = gnutls_init(&tls->c.tls_session, GNUTLS_SERVER | GNUTLS_NONBLOCK); + if (err != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] gnutls_init(): %s (%d)\n", gnutls_strerror_name(err), err); + tls_free(tls); + return NULL; + } + tls->credentials = tls_credentials_reserve(net->tls_credentials); + err = gnutls_credentials_set(tls->c.tls_session, GNUTLS_CRD_CERTIFICATE, + tls->credentials->credentials); + if (err != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] gnutls_credentials_set(): %s (%d)\n", gnutls_strerror_name(err), err); + tls_free(tls); + return NULL; + } + if (kres_gnutls_set_priority(tls->c.tls_session) != GNUTLS_E_SUCCESS) { + tls_free(tls); + return NULL; + } + + tls->c.worker = worker; + tls->c.client_side = false; + + gnutls_transport_set_pull_function(tls->c.tls_session, kres_gnutls_pull); + gnutls_transport_set_vec_push_function(tls->c.tls_session, kres_gnutls_vec_push); + gnutls_transport_set_ptr(tls->c.tls_session, tls); + + if (net->tls_session_ticket_ctx) { + tls_session_ticket_enable(net->tls_session_ticket_ctx, + tls->c.tls_session); + } + + return tls; +} + +void tls_close(struct tls_common_ctx *ctx) +{ + if (ctx == NULL || ctx->tls_session == NULL) { + return; + } + + assert(ctx->session); + + if (ctx->handshake_state == TLS_HS_DONE) { + const struct sockaddr *peer = session_get_peer(ctx->session); + kr_log_verbose("[%s] closing tls connection to `%s`\n", + ctx->client_side ? "tls_client" : "tls", + kr_straddr(peer)); + ctx->handshake_state = TLS_HS_CLOSING; + gnutls_bye(ctx->tls_session, GNUTLS_SHUT_RDWR); + } +} + +void tls_free(struct tls_ctx_t *tls) +{ + if (!tls) { + return; + } + + if (tls->c.tls_session) { + /* Don't terminate TLS connection, just tear it down */ + gnutls_deinit(tls->c.tls_session); + tls->c.tls_session = NULL; + } + + tls_credentials_release(tls->credentials); + free(tls); +} + +int tls_write(uv_write_t *req, uv_handle_t *handle, knot_pkt_t *pkt, uv_write_cb cb) +{ + if (!pkt || !handle || !handle->data) { + return kr_error(EINVAL); + } + + struct session *s = handle->data; + struct tls_common_ctx *tls_ctx = session_tls_get_common_ctx(s); + + assert (tls_ctx); + assert (session_flags(s)->outgoing == tls_ctx->client_side); + + const uint16_t pkt_size = htons(pkt->size); + const char *logstring = tls_ctx->client_side ? client_logstring : server_logstring; + gnutls_session_t tls_session = tls_ctx->tls_session; + + gnutls_record_cork(tls_session); + ssize_t count = 0; + if ((count = gnutls_record_send(tls_session, &pkt_size, sizeof(pkt_size)) < 0) || + (count = gnutls_record_send(tls_session, pkt->wire, pkt->size) < 0)) { + kr_log_error("[%s] gnutls_record_send failed: %s (%zd)\n", + logstring, gnutls_strerror_name(count), count); + return kr_error(EIO); + } + + const ssize_t submitted = sizeof(pkt_size) + pkt->size; + + int ret = gnutls_record_uncork(tls_session, GNUTLS_RECORD_WAIT); + if (ret < 0) { + if (!gnutls_error_is_fatal(ret)) { + return kr_error(EAGAIN); + } else { + kr_log_error("[%s] gnutls_record_uncork failed: %s (%d)\n", + logstring, gnutls_strerror_name(ret), ret); + return kr_error(EIO); + } + } + + if (ret != submitted) { + kr_log_error("[%s] gnutls_record_uncork didn't send all data (%d of %zd)\n", + logstring, ret, submitted); + return kr_error(EIO); + } + + /* The data is now accepted in gnutls internal buffers, the message can be treated as sent */ + req->handle = (uv_stream_t *)handle; + cb(req, 0); + + return kr_ok(); +} + +ssize_t tls_process_input_data(struct session *s, const uint8_t *buf, ssize_t nread) +{ + struct tls_common_ctx *tls_p = session_tls_get_common_ctx(s); + if (!tls_p) { + return kr_error(ENOSYS); + } + + assert(tls_p->session == s); + const bool ok = tls_p->recv_buf == buf && nread <= sizeof(tls_p->recv_buf); + if (!ok) { + assert(false); + /* don't risk overflowing the buffer if we have a mistake somewhere */ + return kr_error(EINVAL); + } + + const char *logstring = tls_p->client_side ? client_logstring : server_logstring; + + tls_p->buf = buf; + tls_p->nread = nread >= 0 ? nread : 0; + tls_p->consumed = 0; + + /* Ensure TLS handshake is performed before receiving data. + * See https://www.gnutls.org/manual/html_node/TLS-handshake.html */ + while (tls_p->handshake_state <= TLS_HS_IN_PROGRESS) { + int err = tls_handshake(tls_p, tls_p->handshake_cb); + if (err == kr_error(EAGAIN)) { + return 0; /* Wait for more data */ + } else if (err != kr_ok()) { + return err; + } + } + + /* See https://gnutls.org/manual/html_node/Data-transfer-and-termination.html#Data-transfer-and-termination */ + ssize_t submitted = 0; + uint8_t *wire_buf = session_wirebuf_get_free_start(s); + size_t wire_buf_size = session_wirebuf_get_free_size(s); + while (true) { + ssize_t count = gnutls_record_recv(tls_p->tls_session, wire_buf, wire_buf_size); + if (count == GNUTLS_E_AGAIN) { + break; /* No data available */ + } else if (count == GNUTLS_E_INTERRUPTED) { + continue; + } else if (count == GNUTLS_E_REHANDSHAKE) { + /* See https://www.gnutls.org/manual/html_node/Re_002dauthentication.html */ + struct sockaddr *peer = session_get_peer(s); + kr_log_verbose("[%s] TLS rehandshake with %s has started\n", + logstring, kr_straddr(peer)); + tls_set_hs_state(tls_p, TLS_HS_IN_PROGRESS); + int err = kr_ok(); + while (tls_p->handshake_state <= TLS_HS_IN_PROGRESS) { + err = tls_handshake(tls_p, tls_p->handshake_cb); + if (err == kr_error(EAGAIN)) { + break; + } else if (err != kr_ok()) { + return err; + } + } + if (err == kr_error(EAGAIN)) { + /* pull function is out of data */ + break; + } + /* There are can be data available, check it. */ + continue; + } else if (count < 0) { + kr_log_verbose("[%s] gnutls_record_recv failed: %s (%zd)\n", + logstring, gnutls_strerror_name(count), count); + return kr_error(EIO); + } else if (count == 0) { + break; + } + DEBUG_MSG("[%s] received %zd data\n", logstring, count); + wire_buf += count; + wire_buf_size -= count; + submitted += count; + if (wire_buf_size == 0 && tls_p->consumed != tls_p->nread) { + /* session buffer is full + * whereas not all the data were consumed */ + return kr_error(ENOSPC); + } + } + /* Here all data must be consumed. */ + if (tls_p->consumed != tls_p->nread) { + /* Something went wrong, better return error. + * This is most probably due to gnutls_record_recv() did not + * consume all available network data by calling kres_gnutls_pull(). + * TODO assess the need for buffering of data amount. + */ + return kr_error(ENOSPC); + } + return submitted; +} + +#if GNUTLS_VERSION_NUMBER >= GNUTLS_PIN_MIN_VERSION + +/* + DNS-over-TLS Out of band key-pinned authentication profile uses the + same form of pins as HPKP: + + e.g. pin-sha256="FHkyLhvI0n70E47cJlRTamTrnYVcsYdjUGbr79CfAVI=" + + DNS-over-TLS OOB key-pins: https://tools.ietf.org/html/rfc7858#appendix-A + HPKP pin reference: https://tools.ietf.org/html/rfc7469#appendix-A +*/ +#define PINLEN (((32) * 8 + 4)/6) + 3 + 1 + +/* out must be at least PINLEN octets long */ +static int get_oob_key_pin(gnutls_x509_crt_t crt, char *outchar, ssize_t outchar_len) +{ + int err; + gnutls_pubkey_t key; + gnutls_datum_t datum = { .size = 0 }; + + if ((err = gnutls_pubkey_init(&key)) != GNUTLS_E_SUCCESS) { + return err; + } + + if ((err = gnutls_pubkey_import_x509(key, crt, 0)) != GNUTLS_E_SUCCESS) { + goto leave; + } else { + if ((err = gnutls_pubkey_export2(key, GNUTLS_X509_FMT_DER, &datum)) != GNUTLS_E_SUCCESS) { + goto leave; + } else { + uint8_t raw_pin[32]; + if ((err = gnutls_hash_fast(GNUTLS_DIG_SHA256, datum.data, datum.size, raw_pin)) != GNUTLS_E_SUCCESS) { + goto leave; + } else { + base64_encode(raw_pin, sizeof(raw_pin), (uint8_t *)outchar, outchar_len); + } + } + } +leave: + gnutls_free(datum.data); + gnutls_pubkey_deinit(key); + return err; +} + +void tls_credentials_log_pins(struct tls_credentials *tls_credentials) +{ + for (int index = 0;; index++) { + int err; + gnutls_x509_crt_t *certs = NULL; + unsigned int cert_count = 0; + + if ((err = gnutls_certificate_get_x509_crt(tls_credentials->credentials, index, &certs, &cert_count)) != GNUTLS_E_SUCCESS) { + if (err != GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) { + kr_log_error("[tls] could not get X.509 certificates (%d) %s\n", err, gnutls_strerror_name(err)); + } + return; + } + + for (int i = 0; i < cert_count; i++) { + char pin[PINLEN] = { 0 }; + if ((err = get_oob_key_pin(certs[i], pin, sizeof(pin))) != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] could not calculate RFC 7858 OOB key-pin from cert %d (%d) %s\n", i, err, gnutls_strerror_name(err)); + } else { + kr_log_info("[tls] RFC 7858 OOB key-pin (%d): pin-sha256=\"%s\"\n", i, pin); + } + gnutls_x509_crt_deinit(certs[i]); + } + gnutls_free(certs); + } +} +#else +void tls_credentials_log_pins(struct tls_credentials *tls_credentials) +{ + kr_log_error("[tls] could not calculate RFC 7858 OOB key-pin; GnuTLS 3.4.0+ required\n"); +} +#endif + +static int str_replace(char **where_ptr, const char *with) +{ + char *copy = with ? strdup(with) : NULL; + if (with && !copy) { + return kr_error(ENOMEM); + } + + free(*where_ptr); + *where_ptr = copy; + return kr_ok(); +} + +static time_t _get_end_entity_expiration(gnutls_certificate_credentials_t creds) +{ + gnutls_datum_t data; + gnutls_x509_crt_t cert = NULL; + int err; + time_t ret = GNUTLS_X509_NO_WELL_DEFINED_EXPIRATION; + + if ((err = gnutls_certificate_get_crt_raw(creds, 0, 0, &data)) != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] failed to get cert to check expiration: (%d) %s\n", + err, gnutls_strerror_name(err)); + goto done; + } + if ((err = gnutls_x509_crt_init(&cert)) != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] failed to initialize cert: (%d) %s\n", + err, gnutls_strerror_name(err)); + goto done; + } + if ((err = gnutls_x509_crt_import(cert, &data, GNUTLS_X509_FMT_DER)) != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] failed to construct cert while checking expiration: (%d) %s\n", + err, gnutls_strerror_name(err)); + goto done; + } + + ret = gnutls_x509_crt_get_expiration_time (cert); + done: + /* do not free data; g_c_get_crt_raw() says to treat it as + * constant. */ + gnutls_x509_crt_deinit(cert); + return ret; +} + +int tls_certificate_set(struct network *net, const char *tls_cert, const char *tls_key) +{ + if (!net) { + return kr_error(EINVAL); + } + + struct tls_credentials *tls_credentials = calloc(1, sizeof(*tls_credentials)); + if (tls_credentials == NULL) { + return kr_error(ENOMEM); + } + + int err = 0; + if ((err = gnutls_certificate_allocate_credentials(&tls_credentials->credentials)) != GNUTLS_E_SUCCESS) { + kr_log_error("[tls] gnutls_certificate_allocate_credentials() failed: (%d) %s\n", + err, gnutls_strerror_name(err)); + tls_credentials_free(tls_credentials); + return kr_error(ENOMEM); + } + if ((err = gnutls_certificate_set_x509_system_trust(tls_credentials->credentials)) < 0) { + if (err != GNUTLS_E_UNIMPLEMENTED_FEATURE) { + kr_log_error("[tls] warning: gnutls_certificate_set_x509_system_trust() failed: (%d) %s\n", + err, gnutls_strerror_name(err)); + tls_credentials_free(tls_credentials); + return err; + } + } + + if ((str_replace(&tls_credentials->tls_cert, tls_cert) != 0) || + (str_replace(&tls_credentials->tls_key, tls_key) != 0)) { + tls_credentials_free(tls_credentials); + return kr_error(ENOMEM); + } + + if ((err = gnutls_certificate_set_x509_key_file(tls_credentials->credentials, + tls_cert, tls_key, GNUTLS_X509_FMT_PEM)) != GNUTLS_E_SUCCESS) { + tls_credentials_free(tls_credentials); + kr_log_error("[tls] gnutls_certificate_set_x509_key_file(%s,%s) failed: %d (%s)\n", + tls_cert, tls_key, err, gnutls_strerror_name(err)); + return kr_error(EINVAL); + } + /* record the expiration date: */ + tls_credentials->valid_until = _get_end_entity_expiration(tls_credentials->credentials); + + /* Exchange the x509 credentials */ + struct tls_credentials *old_credentials = net->tls_credentials; + + /* Start using the new x509_credentials */ + net->tls_credentials = tls_credentials; + tls_credentials_log_pins(net->tls_credentials); + + if (old_credentials) { + err = tls_credentials_release(old_credentials); + if (err != kr_error(EBUSY)) { + return err; + } + } + + return kr_ok(); +} + +struct tls_credentials *tls_credentials_reserve(struct tls_credentials *tls_credentials) { + if (!tls_credentials) { + return NULL; + } + tls_credentials->count++; + return tls_credentials; +} + +int tls_credentials_release(struct tls_credentials *tls_credentials) { + if (!tls_credentials) { + return kr_error(EINVAL); + } + if (--tls_credentials->count < 0) { + tls_credentials_free(tls_credentials); + } else { + return kr_error(EBUSY); + } + return kr_ok(); +} + +void tls_credentials_free(struct tls_credentials *tls_credentials) { + if (!tls_credentials) { + return; + } + + if (tls_credentials->credentials) { + gnutls_certificate_free_credentials(tls_credentials->credentials); + } + if (tls_credentials->tls_cert) { + free(tls_credentials->tls_cert); + } + if (tls_credentials->tls_key) { + free(tls_credentials->tls_key); + } + if (tls_credentials->ephemeral_servicename) { + free(tls_credentials->ephemeral_servicename); + } + free(tls_credentials); +} + +static int client_paramlist_entry_free(struct tls_client_paramlist_entry *entry) +{ + DEBUG_MSG("freeing TLS parameters %p\n", (void *)entry); + + while (entry->ca_files.len > 0) { + if (entry->ca_files.at[0] != NULL) { + free((void *)entry->ca_files.at[0]); + } + array_del(entry->ca_files, 0); + } + + while (entry->hostnames.len > 0) { + if (entry->hostnames.at[0] != NULL) { + free((void *)entry->hostnames.at[0]); + } + array_del(entry->hostnames, 0); + } + + while (entry->pins.len > 0) { + if (entry->pins.at[0] != NULL) { + free((void *)entry->pins.at[0]); + } + array_del(entry->pins, 0); + } + + array_clear(entry->ca_files); + array_clear(entry->hostnames); + array_clear(entry->pins); + + if (entry->credentials) { + gnutls_certificate_free_credentials(entry->credentials); + } + + if (entry->session_data.data) { + gnutls_free(entry->session_data.data); + } + + free(entry); + + return 0; +} + +static void client_paramlist_entry_ref(struct tls_client_paramlist_entry *entry) +{ + if (entry != NULL) { + entry->refs += 1; + } +} + +static void client_paramlist_entry_unref(struct tls_client_paramlist_entry *entry) +{ + if (entry != NULL) { + assert(entry->refs > 0); + entry->refs -= 1; + + /* Last reference frees the object */ + if (entry->refs == 0) { + client_paramlist_entry_free(entry); + } + } +} + +static int client_paramlist_entry_clear(const char *k, void *v, void *baton) +{ + struct tls_client_paramlist_entry *entry = (struct tls_client_paramlist_entry *)v; + return client_paramlist_entry_free(entry); +} + +struct tls_client_paramlist_entry *tls_client_try_upgrade(map_t *tls_client_paramlist, + const struct sockaddr *addr) +{ + /* Opportunistic upgrade from port 53 -> 853 */ + if (kr_inaddr_port(addr) != KR_DNS_PORT) { + return NULL; + } + + static char key[INET6_ADDRSTRLEN + 6]; + size_t keylen = sizeof(key); + if (kr_inaddr_str(addr, key, &keylen) != 0) { + return NULL; + } + + /* Rewrite 053 -> 853 */ + memcpy(key + keylen - 4, "853", 3); + + return map_get(tls_client_paramlist, key); +} + +int tls_client_params_clear(map_t *tls_client_paramlist, const char *addr, uint16_t port) +{ + if (!tls_client_paramlist || !addr) { + return kr_error(EINVAL); + } + + /* Parameters are OK */ + + char key[INET6_ADDRSTRLEN + 6]; + size_t keylen = sizeof(key); + if (kr_straddr_join(addr, port, key, &keylen) != kr_ok()) { + return kr_error(EINVAL); + } + + struct tls_client_paramlist_entry *entry = map_get(tls_client_paramlist, key); + if (entry != NULL) { + client_paramlist_entry_clear(NULL, (void *)entry, NULL); + map_del(tls_client_paramlist, key); + } + + return kr_ok(); +} + +int tls_client_params_set(map_t *tls_client_paramlist, + const char *addr, uint16_t port, + const char *param, tls_client_param_t param_type) +{ + if (!tls_client_paramlist || !addr) { + return kr_error(EINVAL); + } + + /* TLS_CLIENT_PARAM_CA can be empty */ + if (param_type == TLS_CLIENT_PARAM_HOSTNAME || + param_type == TLS_CLIENT_PARAM_PIN) { + if (param == NULL || param[0] == 0) { + return kr_error(EINVAL); + } + } + + /* Parameters are OK */ + + char key[INET6_ADDRSTRLEN + 6]; + size_t keylen = sizeof(key); + if (kr_straddr_join(addr, port, key, &keylen) != kr_ok()) { + kr_log_error("[tls_client] warning: '%s' is not a valid ip address, ignoring\n", addr); + return kr_ok(); + } + + bool is_first_entry = false; + struct tls_client_paramlist_entry *entry = map_get(tls_client_paramlist, key); + if (entry == NULL) { + entry = calloc(1, sizeof(struct tls_client_paramlist_entry)); + if (entry == NULL) { + return kr_error(ENOMEM); + } + is_first_entry = true; + int ret = gnutls_certificate_allocate_credentials(&entry->credentials); + if (ret != GNUTLS_E_SUCCESS) { + free(entry); + kr_log_error("[tls_client] error: gnutls_certificate_allocate_credentials() fails (%s)\n", + gnutls_strerror_name(ret)); + return kr_error(ENOMEM); + } + gnutls_certificate_set_verify_function(entry->credentials, client_verify_certificate); + client_paramlist_entry_ref(entry); + } + + int ret = kr_ok(); + + if (param_type == TLS_CLIENT_PARAM_HOSTNAME) { + const char *hostname = param; + bool already_exists = false; + for (size_t i = 0; i < entry->hostnames.len; ++i) { + if (strcmp(entry->hostnames.at[i], hostname) == 0) { + kr_log_error("[tls_client] error: hostname '%s' for address '%s' already was set, ignoring\n", hostname, key); + already_exists = true; + break; + } + } + if (!already_exists) { + const char *value = strdup(hostname); + if (!value) { + ret = kr_error(ENOMEM); + } else if (array_push(entry->hostnames, value) < 0) { + free ((void *)value); + ret = kr_error(ENOMEM); + } + } + } else if (param_type == TLS_CLIENT_PARAM_CA) { + /* Import ca files only when hostname is already set */ + if (entry->hostnames.len == 0) { + return kr_error(ENOENT); + } + const char *ca_file = param; + bool already_exists = false; + for (size_t i = 0; i < entry->ca_files.len; ++i) { + const char *imported_ca = entry->ca_files.at[i]; + if (imported_ca[0] == 0 && (ca_file == NULL || ca_file[0] == 0)) { + kr_log_error("[tls_client] error: system ca for address '%s' already was set, ignoring\n", key); + already_exists = true; + break; + } else if (strcmp(imported_ca, ca_file) == 0) { + kr_log_error("[tls_client] error: ca file '%s' for address '%s' already was set, ignoring\n", ca_file, key); + already_exists = true; + break; + } + } + if (!already_exists) { + const char *value = strdup(ca_file != NULL ? ca_file : ""); + if (!value) { + ret = kr_error(ENOMEM); + } else if (array_push(entry->ca_files, value) < 0) { + free ((void *)value); + ret = kr_error(ENOMEM); + } else if (value[0] == 0) { + int res = gnutls_certificate_set_x509_system_trust (entry->credentials); + if (res <= 0) { + kr_log_error("[tls_client] failed to import certs from system store (%s)\n", + gnutls_strerror_name(res)); + /* value will be freed at cleanup */ + ret = kr_error(EINVAL); + } else { + kr_log_verbose("[tls_client] imported %d certs from system store\n", res); + } + } else { + int res = gnutls_certificate_set_x509_trust_file(entry->credentials, value, + GNUTLS_X509_FMT_PEM); + if (res <= 0) { + kr_log_error("[tls_client] failed to import certificate file '%s' (%s)\n", + value, gnutls_strerror_name(res)); + /* value will be freed at cleanup */ + ret = kr_error(EINVAL); + } else { + kr_log_verbose("[tls_client] imported %d certs from file '%s'\n", + res, value); + + } + } + } + } else if (param_type == TLS_CLIENT_PARAM_PIN) { + const char *pin = param; + for (size_t i = 0; i < entry->pins.len; ++i) { + if (strcmp(entry->pins.at[i], pin) == 0) { + kr_log_error("[tls_client] warning: pin '%s' for address '%s' already was set, ignoring\n", pin, key); + return kr_ok(); + } + } + const void *value = strdup(pin); + if (!value) { + ret = kr_error(ENOMEM); + } else if (array_push(entry->pins, value) < 0) { + free ((void *)value); + ret = kr_error(ENOMEM); + } + } + + if ((ret == kr_ok()) && is_first_entry) { + bool fail = (map_set(tls_client_paramlist, key, entry) != 0); + if (fail) { + ret = kr_error(ENOMEM); + } + } + + if ((ret != kr_ok()) && is_first_entry) { + client_paramlist_entry_unref(entry); + } + + return ret; +} + +int tls_client_params_free(map_t *tls_client_paramlist) +{ + if (!tls_client_paramlist) { + return kr_error(EINVAL); + } + + map_walk(tls_client_paramlist, client_paramlist_entry_clear, NULL); + map_clear(tls_client_paramlist); + + return kr_ok(); +} + +static int client_verify_certificate(gnutls_session_t tls_session) +{ + struct tls_client_ctx_t *ctx = gnutls_session_get_ptr(tls_session); + assert(ctx->params != NULL); + + if (ctx->params->pins.len == 0 && ctx->params->ca_files.len == 0) { + return GNUTLS_E_SUCCESS; + } + + gnutls_certificate_type_t cert_type = gnutls_certificate_type_get(tls_session); + if (cert_type != GNUTLS_CRT_X509) { + kr_log_error("[tls_client] invalid certificate type %i has been received\n", + cert_type); + return GNUTLS_E_CERTIFICATE_ERROR; + } + unsigned int cert_list_size = 0; + const gnutls_datum_t *cert_list = + gnutls_certificate_get_peers(tls_session, &cert_list_size); + if (cert_list == NULL || cert_list_size == 0) { + kr_log_error("[tls_client] empty certificate list\n"); + return GNUTLS_E_CERTIFICATE_ERROR; + } + +#if GNUTLS_VERSION_NUMBER >= GNUTLS_PIN_MIN_VERSION + if (ctx->params->pins.len == 0) { + DEBUG_MSG("[tls_client] skipping certificate PIN check\n"); + goto skip_pins; + } + + for (int i = 0; i < cert_list_size; i++) { + gnutls_x509_crt_t cert; + int ret = gnutls_x509_crt_init(&cert); + if (ret != GNUTLS_E_SUCCESS) { + return ret; + } + + ret = gnutls_x509_crt_import(cert, &cert_list[i], GNUTLS_X509_FMT_DER); + if (ret != GNUTLS_E_SUCCESS) { + gnutls_x509_crt_deinit(cert); + return ret; + } + + char cert_pin[PINLEN] = { 0 }; + ret = get_oob_key_pin(cert, cert_pin, sizeof(cert_pin)); + + gnutls_x509_crt_deinit(cert); + + if (ret != GNUTLS_E_SUCCESS) { + return ret; + } + + DEBUG_MSG("[tls_client] received pin : %s\n", cert_pin); + for (size_t j = 0; j < ctx->params->pins.len; ++j) { + const char *pin = ctx->params->pins.at[j]; + bool match = (strcmp(cert_pin, pin) == 0); + DEBUG_MSG("[tls_client] configured pin: %s matches? %s\n", + pin, match ? "yes" : "no"); + if (match) { + return GNUTLS_E_SUCCESS; + } + } + } + + /* pins were set, but no one was not matched */ + kr_log_error("[tls_client] certificate PIN check failed\n"); +#else + if (ctx->params->pins.len != 0) { + kr_log_error("[tls_client] newer gnutls is required to use PIN check\n"); + return GNUTLS_E_CERTIFICATE_ERROR; + } +#endif + +skip_pins: + + if (ctx->params->ca_files.len == 0) { + DEBUG_MSG("[tls_client] empty CA files list\n"); + return GNUTLS_E_CERTIFICATE_ERROR; + } + + if (ctx->params->hostnames.len == 0) { + DEBUG_MSG("[tls_client] empty hostname list\n"); + return GNUTLS_E_CERTIFICATE_ERROR; + } + + int ret; + unsigned int status; + for (size_t i = 0; i < ctx->params->hostnames.len; ++i) { + ret = gnutls_certificate_verify_peers3( + ctx->c.tls_session, + ctx->params->hostnames.at[i], + &status); + if ((ret == GNUTLS_E_SUCCESS) && (status == 0)) { + return GNUTLS_E_SUCCESS; + } + } + + if (ret == GNUTLS_E_SUCCESS) { + gnutls_datum_t msg; + ret = gnutls_certificate_verification_status_print( + status, gnutls_certificate_type_get(ctx->c.tls_session), &msg, 0); + if (ret == GNUTLS_E_SUCCESS) { + kr_log_error("[tls_client] failed to verify peer certificate: " + "%s\n", msg.data); + gnutls_free(msg.data); + } else { + kr_log_error("[tls_client] failed to verify peer certificate: " + "unable to print reason: %s (%s)\n", + gnutls_strerror(ret), gnutls_strerror_name(ret)); + } /* gnutls_certificate_verification_status_print end */ + } else { + kr_log_error("[tls_client] failed to verify peer certificate: " + "gnutls_certificate_verify_peers3 error: %s (%s)\n", + gnutls_strerror(ret), gnutls_strerror_name(ret)); + } /* gnutls_certificate_verify_peers3 end */ + return GNUTLS_E_CERTIFICATE_ERROR; +} + +struct tls_client_ctx_t *tls_client_ctx_new(struct tls_client_paramlist_entry *entry, + struct worker_ctx *worker) +{ + struct tls_client_ctx_t *ctx = calloc(1, sizeof (struct tls_client_ctx_t)); + if (!ctx) { + return NULL; + } + unsigned int flags = GNUTLS_CLIENT | GNUTLS_NONBLOCK +#ifdef GNUTLS_ENABLE_FALSE_START + | GNUTLS_ENABLE_FALSE_START +#endif + ; + int ret = gnutls_init(&ctx->c.tls_session, flags); + if (ret != GNUTLS_E_SUCCESS) { + tls_client_ctx_free(ctx); + return NULL; + } + + ret = kres_gnutls_set_priority(ctx->c.tls_session); + if (ret != GNUTLS_E_SUCCESS) { + tls_client_ctx_free(ctx); + return NULL; + } + + /* Must take a reference on parameters as the credentials are owned by it + * and must not be freed while the session is active. */ + client_paramlist_entry_ref(entry); + ctx->params = entry; + + ret = gnutls_credentials_set(ctx->c.tls_session, GNUTLS_CRD_CERTIFICATE, + entry->credentials); + if (ret != GNUTLS_E_SUCCESS) { + tls_client_ctx_free(ctx); + return NULL; + } + + ctx->c.worker = worker; + ctx->c.client_side = true; + + gnutls_transport_set_pull_function(ctx->c.tls_session, kres_gnutls_pull); + gnutls_transport_set_vec_push_function(ctx->c.tls_session, kres_gnutls_vec_push); + gnutls_transport_set_ptr(ctx->c.tls_session, ctx); + return ctx; +} + +void tls_client_ctx_free(struct tls_client_ctx_t *ctx) +{ + if (ctx == NULL) { + return; + } + + if (ctx->c.tls_session != NULL) { + gnutls_deinit(ctx->c.tls_session); + ctx->c.tls_session = NULL; + } + + /* Must decrease the refcount for referenced parameters */ + client_paramlist_entry_unref(ctx->params); + + free (ctx); +} + +int tls_pull_timeout_func(gnutls_transport_ptr_t h, unsigned int ms) +{ + struct tls_common_ctx *t = (struct tls_common_ctx *)h; + assert(t != NULL); + ssize_t avail = t->nread - t->consumed; + DEBUG_MSG("[%s] timeout check: available: %zu\n", + t->client_side ? "tls_client" : "tls", avail); + if (avail <= 0) { + errno = EAGAIN; + return -1; + } + return avail; +} + +int tls_client_connect_start(struct tls_client_ctx_t *client_ctx, + struct session *session, + tls_handshake_cb handshake_cb) +{ + if (session == NULL || client_ctx == NULL) { + return kr_error(EINVAL); + } + + assert(session_flags(session)->outgoing && session_get_handle(session)->type == UV_TCP); + + struct tls_common_ctx *ctx = &client_ctx->c; + + gnutls_session_set_ptr(ctx->tls_session, client_ctx); + gnutls_handshake_set_timeout(ctx->tls_session, ctx->worker->engine->net.tcp.tls_handshake_timeout); + gnutls_transport_set_pull_timeout_function(ctx->tls_session, tls_pull_timeout_func); + session_tls_set_client_ctx(session, client_ctx); + ctx->handshake_cb = handshake_cb; + ctx->handshake_state = TLS_HS_IN_PROGRESS; + ctx->session = session; + + struct tls_client_paramlist_entry *tls_params = client_ctx->params; + if (tls_params->session_data.data != NULL) { + gnutls_session_set_data(ctx->tls_session, tls_params->session_data.data, + tls_params->session_data.size); + } + + /* See https://www.gnutls.org/manual/html_node/Asynchronous-operation.html */ + while (ctx->handshake_state <= TLS_HS_IN_PROGRESS) { + int ret = tls_handshake(ctx, handshake_cb); + if (ret != kr_ok()) { + return ret; + } + } + return kr_ok(); +} + +tls_hs_state_t tls_get_hs_state(const struct tls_common_ctx *ctx) +{ + return ctx->handshake_state; +} + +int tls_set_hs_state(struct tls_common_ctx *ctx, tls_hs_state_t state) +{ + if (state >= TLS_HS_LAST) { + return kr_error(EINVAL); + } + ctx->handshake_state = state; + return kr_ok(); +} + +int tls_client_ctx_set_session(struct tls_client_ctx_t *ctx, struct session *session) +{ + if (!ctx) { + return kr_error(EINVAL); + } + ctx->c.session = session; + return kr_ok(); +} + +#undef DEBUG_MSG -- cgit v1.2.3