summaryrefslogtreecommitdiffstats
path: root/modules/tls/tls_filter.h
blob: 4f3d38bbc13d8036673154b9ff2fd73c6ac22ca6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
/* Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
#ifndef tls_filter_h
#define tls_filter_h

#define TLS_FILTER_RAW    "TLS raw"

typedef struct tls_filter_ctx_t tls_filter_ctx_t;

struct tls_filter_ctx_t {
    conn_rec *c;                         /* connection this context is for */
    tls_conf_conn_t *cc;                 /* tls module configuration of connection */

    ap_filter_t *fin_ctx;                /* Apache's entry into the input filter chain */
    apr_bucket_brigade *fin_tls_bb;      /* TLS encrypted, incoming network data */
    apr_bucket_brigade *fin_tls_buffer_bb; /* TLS encrypted, incoming network data buffering */
    apr_bucket_brigade *fin_plain_bb;    /* decrypted, incoming traffic data */
    apr_off_t fin_bytes_in_rustls;       /* # of input TLS bytes in rustls_connection */
    apr_read_type_e fin_block;           /* Do we block on input reads or not? */

    ap_filter_t *fout_ctx;               /* Apache's entry into the output filter chain */
    char *fout_buf_plain;                /* a buffer to collect plain bytes for output */
    apr_size_t fout_buf_plain_len;       /* the amount of bytes in the buffer */
    apr_size_t fout_buf_plain_size;      /* the total size of the buffer */
    apr_bucket_brigade *fout_tls_bb;     /* TLS encrypted, outgoing network data */
    apr_off_t fout_bytes_in_rustls;      /* # of output plain bytes in rustls_connection */
    apr_off_t fout_bytes_in_tls_bb;      /* # of output tls bytes in our brigade */

    apr_size_t fin_max_in_rustls;         /* how much tls we like to read into rustls */
    apr_size_t fout_max_in_rustls;        /* how much plain bytes we like in rustls */
    apr_size_t fout_max_bucket_size;      /* how large bucket chunks we handle before splitting */
    apr_size_t fout_auto_flush_size;      /* on much outoing TLS data we flush to network */
};

/**
 * Register the in-/output filters for converting TLS to application data and vice versa.
 */
void tls_filter_register(apr_pool_t *pool);

/**
 * Initialize the pre_connection state. Install all filters.
 *
 * @return OK if TLS on connection is enabled, DECLINED otherwise
 */
int tls_filter_pre_conn_init(conn_rec *c);

/**
 * Initialize the connection for use, perform the TLS handshake.
 *
 * Any failure will lead to the connection becoming aborted.
 */
void tls_filter_conn_init(conn_rec *c);

/*
 * <https://tools.ietf.org/html/rfc8449> says:
 * "For large data transfers, small record sizes can materially affect performance."
 * and
 * "For TLS 1.2 and earlier, that limit is 2^14 octets. TLS 1.3 uses a limit of
 * 2^14+1 octets."
 * Maybe future TLS versions will raise that value, but for now these limits stand.
 * Given the choice, we would like rustls to provide traffic data in those chunks.
 */
#define TLS_PREF_PLAIN_CHUNK_SIZE       (16384)

/*
 * When retrieving TLS chunks for rustls, or providing it a buffer
 * to pass out TLS chunks (which are then bucketed and written to the
 * network filters), we ideally would do that in multiples of TLS
 * messages sizes.
 * That would be TLS_PREF_WRITE_SIZE + TLS Message Overhead, such as
 * MAC and padding. But these vary with protocol and ciphers chosen, so
 * we define something which should be "large enough", but not overly so.
 */
#define TLS_REC_EXTRA             (1024)
#define TLS_REC_MAX_SIZE   (TLS_PREF_PLAIN_CHUNK_SIZE + TLS_REC_EXTRA)

#endif /* tls_filter_h */