mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 05:07:36 +03:00
add support for ChaCha20 header protection
This commit is contained in:
parent
33b74fca79
commit
fa89ec345a
6 changed files with 398 additions and 285 deletions
2
go.mod
2
go.mod
|
@ -3,9 +3,11 @@ module github.com/lucas-clemente/quic-go
|
||||||
go 1.13
|
go 1.13
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/alangpierce/go-forceexport v0.0.0-20160317203124-8f1d6941cd75
|
||||||
github.com/cheekybits/genny v1.0.0
|
github.com/cheekybits/genny v1.0.0
|
||||||
github.com/golang/mock v1.2.0
|
github.com/golang/mock v1.2.0
|
||||||
github.com/golang/protobuf v1.3.0
|
github.com/golang/protobuf v1.3.0
|
||||||
|
github.com/marten-seemann/chacha20 v0.2.0
|
||||||
github.com/marten-seemann/qpack v0.1.0
|
github.com/marten-seemann/qpack v0.1.0
|
||||||
github.com/marten-seemann/qtls v0.4.0
|
github.com/marten-seemann/qtls v0.4.0
|
||||||
github.com/onsi/ginkgo v1.7.0
|
github.com/onsi/ginkgo v1.7.0
|
||||||
|
|
4
go.sum
4
go.sum
|
@ -1,3 +1,5 @@
|
||||||
|
github.com/alangpierce/go-forceexport v0.0.0-20160317203124-8f1d6941cd75 h1:3ILjVyslFbc4jl1w5TWuvvslFD/nDfR2H8tVaMVLrEY=
|
||||||
|
github.com/alangpierce/go-forceexport v0.0.0-20160317203124-8f1d6941cd75/go.mod h1:uAXEEpARkRhCZfEvy/y0Jcc888f9tHCc1W7/UeEtreE=
|
||||||
github.com/cheekybits/genny v1.0.0 h1:uGGa4nei+j20rOSeDeP5Of12XVm7TGUd4dJA9RDitfE=
|
github.com/cheekybits/genny v1.0.0 h1:uGGa4nei+j20rOSeDeP5Of12XVm7TGUd4dJA9RDitfE=
|
||||||
github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ=
|
github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ=
|
||||||
github.com/fsnotify/fsnotify v1.4.7 h1:IXs+QLmnXW2CcXuY+8Mzv/fWEsPGWxqefPtCP5CnV9I=
|
github.com/fsnotify/fsnotify v1.4.7 h1:IXs+QLmnXW2CcXuY+8Mzv/fWEsPGWxqefPtCP5CnV9I=
|
||||||
|
@ -9,6 +11,8 @@ github.com/golang/protobuf v1.3.0 h1:kbxbvI4Un1LUWKxufD+BiE6AEExYYgkQLQmLFqA1LFk
|
||||||
github.com/golang/protobuf v1.3.0/go.mod h1:Qd/q+1AKNOZr9uGQzbzCmRO6sUih6GTPZv6a1/R87v0=
|
github.com/golang/protobuf v1.3.0/go.mod h1:Qd/q+1AKNOZr9uGQzbzCmRO6sUih6GTPZv6a1/R87v0=
|
||||||
github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
|
github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI=
|
||||||
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU=
|
||||||
|
github.com/marten-seemann/chacha20 v0.2.0 h1:f40vqzzx+3GdOmzQoItkLX5WLvHgPgyYqFFIO5Gh4hQ=
|
||||||
|
github.com/marten-seemann/chacha20 v0.2.0/go.mod h1:HSdjFau7GzYRj+ahFNwsO3ouVJr1HFkWoEwNDb4TMtE=
|
||||||
github.com/marten-seemann/qpack v0.1.0 h1:/0M7lkda/6mus9B8u34Asqm8ZhHAAt9Ho0vniNuVSVg=
|
github.com/marten-seemann/qpack v0.1.0 h1:/0M7lkda/6mus9B8u34Asqm8ZhHAAt9Ho0vniNuVSVg=
|
||||||
github.com/marten-seemann/qpack v0.1.0/go.mod h1:LFt1NU/Ptjip0C2CPkhimBz5CGE3WGDAUWqna+CNTrI=
|
github.com/marten-seemann/qpack v0.1.0/go.mod h1:LFt1NU/Ptjip0C2CPkhimBz5CGE3WGDAUWqna+CNTrI=
|
||||||
github.com/marten-seemann/qtls v0.4.0 h1:HM9ftULNeuhGiCliIfPKvp5VDJw6pvi/Ghq6PYf7B0E=
|
github.com/marten-seemann/qtls v0.4.0 h1:HM9ftULNeuhGiCliIfPKvp5VDJw6pvi/Ghq6PYf7B0E=
|
||||||
|
|
|
@ -4,12 +4,19 @@ import (
|
||||||
"crypto/aes"
|
"crypto/aes"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = Describe("AEAD", func() {
|
var _ = Describe("AEAD", func() {
|
||||||
|
for i := range cipherSuites {
|
||||||
|
cs := cipherSuites[i]
|
||||||
|
|
||||||
|
Context(fmt.Sprintf("using %s", cs.name), func() {
|
||||||
|
suite := cs.suite
|
||||||
|
|
||||||
getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) {
|
getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) {
|
||||||
key := make([]byte, 16)
|
key := make([]byte, 16)
|
||||||
hpKey := make([]byte, 16)
|
hpKey := make([]byte, 16)
|
||||||
|
@ -20,8 +27,8 @@ var _ = Describe("AEAD", func() {
|
||||||
aead, err := cipher.NewGCM(block)
|
aead, err := cipher.NewGCM(block)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
|
||||||
return newLongHeaderSealer(aead, newHeaderProtector(aesSuite, key, true)),
|
return newLongHeaderSealer(aead, newHeaderProtector(suite, key, true)),
|
||||||
newLongHeaderOpener(aead, newAESHeaderProtector(aesSuite, key, true))
|
newLongHeaderOpener(aead, newHeaderProtector(suite, key, true))
|
||||||
}
|
}
|
||||||
|
|
||||||
Context("message encryption", func() {
|
Context("message encryption", func() {
|
||||||
|
@ -84,3 +91,5 @@ var _ = Describe("AEAD", func() {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
|
@ -2,7 +2,9 @@ package handshake
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto"
|
"crypto"
|
||||||
|
"crypto/cipher"
|
||||||
|
|
||||||
|
"github.com/alangpierce/go-forceexport"
|
||||||
"github.com/golang/mock/gomock"
|
"github.com/golang/mock/gomock"
|
||||||
"github.com/marten-seemann/qtls"
|
"github.com/marten-seemann/qtls"
|
||||||
|
|
||||||
|
@ -27,9 +29,48 @@ var _ = AfterEach(func() {
|
||||||
mockCtrl.Finish()
|
mockCtrl.Finish()
|
||||||
})
|
})
|
||||||
|
|
||||||
var aesSuite = &qtls.CipherSuiteTLS13{
|
var aeadChaCha20Poly1305 func(key, nonceMask []byte) cipher.AEAD
|
||||||
|
|
||||||
|
var cipherSuites = []struct {
|
||||||
|
name string
|
||||||
|
suite *qtls.CipherSuiteTLS13
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "TLS_AES_128_GCM_SHA256",
|
||||||
|
suite: &qtls.CipherSuiteTLS13{
|
||||||
ID: qtls.TLS_AES_128_GCM_SHA256,
|
ID: qtls.TLS_AES_128_GCM_SHA256,
|
||||||
KeyLen: 16,
|
KeyLen: 16,
|
||||||
AEAD: qtls.AEADAESGCMTLS13,
|
AEAD: qtls.AEADAESGCMTLS13,
|
||||||
Hash: crypto.SHA256,
|
Hash: crypto.SHA256,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "TLS_AES_256_GCM_SHA384",
|
||||||
|
suite: &qtls.CipherSuiteTLS13{
|
||||||
|
ID: qtls.TLS_AES_256_GCM_SHA384,
|
||||||
|
KeyLen: 32,
|
||||||
|
AEAD: qtls.AEADAESGCMTLS13,
|
||||||
|
Hash: crypto.SHA384,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "TLS_CHACHA20_POLY1305_SHA256",
|
||||||
|
suite: &qtls.CipherSuiteTLS13{
|
||||||
|
ID: qtls.TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
KeyLen: 32,
|
||||||
|
AEAD: nil, // will be set by init
|
||||||
|
Hash: crypto.SHA256,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
if err := forceexport.GetFunc(&aeadChaCha20Poly1305, "github.com/marten-seemann/qtls.aeadChaCha20Poly1305"); err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
for _, s := range cipherSuites {
|
||||||
|
if s.suite.ID == qtls.TLS_CHACHA20_POLY1305_SHA256 {
|
||||||
|
s.suite.AEAD = aeadChaCha20Poly1305
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/marten-seemann/chacha20"
|
||||||
"github.com/marten-seemann/qtls"
|
"github.com/marten-seemann/qtls"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -18,8 +19,7 @@ func newHeaderProtector(suite *qtls.CipherSuiteTLS13, trafficSecret []byte, isLo
|
||||||
case qtls.TLS_AES_128_GCM_SHA256, qtls.TLS_AES_256_GCM_SHA384:
|
case qtls.TLS_AES_128_GCM_SHA256, qtls.TLS_AES_256_GCM_SHA384:
|
||||||
return newAESHeaderProtector(suite, trafficSecret, isLongHeader)
|
return newAESHeaderProtector(suite, trafficSecret, isLongHeader)
|
||||||
case qtls.TLS_CHACHA20_POLY1305_SHA256:
|
case qtls.TLS_CHACHA20_POLY1305_SHA256:
|
||||||
// TODO: implement ChaCha header protection
|
return newChaChaHeaderProtector(suite, trafficSecret, isLongHeader)
|
||||||
fallthrough
|
|
||||||
default:
|
default:
|
||||||
panic(fmt.Sprintf("Invalid cipher suite id: %d", suite.ID))
|
panic(fmt.Sprintf("Invalid cipher suite id: %d", suite.ID))
|
||||||
}
|
}
|
||||||
|
@ -69,3 +69,51 @@ func (p *aesHeaderProtector) apply(sample []byte, firstByte *byte, hdrBytes []by
|
||||||
hdrBytes[i] ^= p.mask[i+1]
|
hdrBytes[i] ^= p.mask[i+1]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type chachaHeaderProtector struct {
|
||||||
|
mask [5]byte
|
||||||
|
|
||||||
|
key [32]byte
|
||||||
|
sampleBuf [16]byte
|
||||||
|
isLongHeader bool
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ headerProtector = &chachaHeaderProtector{}
|
||||||
|
|
||||||
|
func newChaChaHeaderProtector(suite *qtls.CipherSuiteTLS13, trafficSecret []byte, isLongHeader bool) headerProtector {
|
||||||
|
hpKey := qtls.HkdfExpandLabel(suite.Hash, trafficSecret, []byte{}, "quic hp", suite.KeyLen)
|
||||||
|
|
||||||
|
p := &chachaHeaderProtector{
|
||||||
|
isLongHeader: isLongHeader,
|
||||||
|
}
|
||||||
|
copy(p.key[:], hpKey)
|
||||||
|
return p
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *chachaHeaderProtector) DecryptHeader(sample []byte, firstByte *byte, hdrBytes []byte) {
|
||||||
|
p.apply(sample, firstByte, hdrBytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *chachaHeaderProtector) EncryptHeader(sample []byte, firstByte *byte, hdrBytes []byte) {
|
||||||
|
p.apply(sample, firstByte, hdrBytes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *chachaHeaderProtector) apply(sample []byte, firstByte *byte, hdrBytes []byte) {
|
||||||
|
if len(sample) < len(p.mask) {
|
||||||
|
panic("invalid sample size")
|
||||||
|
}
|
||||||
|
for i := 0; i < 5; i++ {
|
||||||
|
p.mask[i] = 0
|
||||||
|
}
|
||||||
|
copy(p.sampleBuf[:], sample)
|
||||||
|
chacha20.XORKeyStream(p.mask[:], p.mask[:], &p.sampleBuf, &p.key)
|
||||||
|
|
||||||
|
if p.isLongHeader {
|
||||||
|
*firstByte ^= p.mask[0] & 0xf
|
||||||
|
} else {
|
||||||
|
*firstByte ^= p.mask[0] & 0x1f
|
||||||
|
}
|
||||||
|
for i := range hdrBytes {
|
||||||
|
hdrBytes[i] ^= p.mask[i+1]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -2,6 +2,7 @@ package handshake
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -13,6 +14,12 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = Describe("Updatable AEAD", func() {
|
var _ = Describe("Updatable AEAD", func() {
|
||||||
|
for i := range cipherSuites {
|
||||||
|
cs := cipherSuites[i]
|
||||||
|
|
||||||
|
Context(fmt.Sprintf("using %s", cs.name), func() {
|
||||||
|
suite := cs.suite
|
||||||
|
|
||||||
getPeers := func(rttStats *congestion.RTTStats) (client, server *updatableAEAD) {
|
getPeers := func(rttStats *congestion.RTTStats) (client, server *updatableAEAD) {
|
||||||
trafficSecret1 := make([]byte, 16)
|
trafficSecret1 := make([]byte, 16)
|
||||||
trafficSecret2 := make([]byte, 16)
|
trafficSecret2 := make([]byte, 16)
|
||||||
|
@ -21,10 +28,10 @@ var _ = Describe("Updatable AEAD", func() {
|
||||||
|
|
||||||
client = newUpdatableAEAD(rttStats, utils.DefaultLogger)
|
client = newUpdatableAEAD(rttStats, utils.DefaultLogger)
|
||||||
server = newUpdatableAEAD(rttStats, utils.DefaultLogger)
|
server = newUpdatableAEAD(rttStats, utils.DefaultLogger)
|
||||||
client.SetReadKey(aesSuite, trafficSecret2)
|
client.SetReadKey(suite, trafficSecret2)
|
||||||
client.SetWriteKey(aesSuite, trafficSecret1)
|
client.SetWriteKey(suite, trafficSecret1)
|
||||||
server.SetReadKey(aesSuite, trafficSecret1)
|
server.SetReadKey(suite, trafficSecret1)
|
||||||
server.SetWriteKey(aesSuite, trafficSecret2)
|
server.SetWriteKey(suite, trafficSecret2)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -246,3 +253,5 @@ var _ = Describe("Updatable AEAD", func() {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue