mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: implement Certificate.SupportedSignatureAlgorithms
This will let applications stop crypto/tls from using a certificate key with an algorithm that is not supported by its crypto.Signer, like hardware backed keys that can't do RSA-PSS. Fixes #28660 Change-Id: I294cc06bddf813fff35c5107540c4a1788e1dace Reviewed-on: https://go-review.googlesource.com/c/go/+/205062 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
0e7f9b3702
commit
555e9b864b
4 changed files with 91 additions and 9 deletions
45
tls_test.go
45
tls_test.go
|
@ -6,6 +6,7 @@ package tls
|
|||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto"
|
||||
"crypto/x509"
|
||||
"encoding/json"
|
||||
"errors"
|
||||
|
@ -1051,6 +1052,11 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
|||
Certificate: [][]byte{testRSACertificate},
|
||||
PrivateKey: testRSAPrivateKey,
|
||||
}
|
||||
pkcs1Cert := &Certificate{
|
||||
Certificate: [][]byte{testRSACertificate},
|
||||
PrivateKey: testRSAPrivateKey,
|
||||
SupportedSignatureAlgorithms: []SignatureScheme{PKCS1WithSHA1, PKCS1WithSHA256},
|
||||
}
|
||||
ecdsaCert := &Certificate{
|
||||
// ECDSA P-256 certificate
|
||||
Certificate: [][]byte{testP256Certificate},
|
||||
|
@ -1084,6 +1090,10 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
|||
SignatureSchemes: []SignatureScheme{ECDSAWithP384AndSHA384},
|
||||
SupportedVersions: []uint16{VersionTLS13},
|
||||
}, "signature algorithms"},
|
||||
{pkcs1Cert, &ClientHelloInfo{
|
||||
SignatureSchemes: []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
|
||||
SupportedVersions: []uint16{VersionTLS13},
|
||||
}, "signature algorithms"},
|
||||
|
||||
{rsaCert, &ClientHelloInfo{
|
||||
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
||||
|
@ -1204,3 +1214,38 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
|||
}
|
||||
}
|
||||
}
|
||||
|
||||
type brokenSigner struct{ crypto.Signer }
|
||||
|
||||
func (s brokenSigner) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) (signature []byte, err error) {
|
||||
// Replace opts with opts.HashFunc(), so rsa.PSSOptions are discarded.
|
||||
return s.Signer.Sign(rand, digest, opts.HashFunc())
|
||||
}
|
||||
|
||||
// TestPKCS1OnlyCert uses a client certificate with a broken crypto.Signer that
|
||||
// always makes PKCS#1 v1.5 signatures, so can't be used with RSA-PSS.
|
||||
func TestPKCS1OnlyCert(t *testing.T) {
|
||||
clientConfig := testConfig.Clone()
|
||||
clientConfig.Certificates = []Certificate{{
|
||||
Certificate: [][]byte{testRSACertificate},
|
||||
PrivateKey: brokenSigner{testRSAPrivateKey},
|
||||
}}
|
||||
serverConfig := testConfig.Clone()
|
||||
serverConfig.MaxVersion = VersionTLS12 // TLS 1.3 doesn't support PKCS#1 v1.5
|
||||
serverConfig.ClientAuth = RequireAnyClientCert
|
||||
|
||||
// If RSA-PSS is selected, the handshake should fail.
|
||||
if _, _, err := testHandshake(t, clientConfig, serverConfig); err == nil {
|
||||
// RSA-PSS is temporarily disabled in TLS 1.2. See Issue 32425.
|
||||
// t.Fatal("expected broken certificate to cause connection to fail")
|
||||
}
|
||||
|
||||
clientConfig.Certificates[0].SupportedSignatureAlgorithms =
|
||||
[]SignatureScheme{PKCS1WithSHA1, PKCS1WithSHA256}
|
||||
|
||||
// But if the certificate restricts supported algorithms, RSA-PSS should not
|
||||
// be selected, and the handshake should succeed.
|
||||
if _, _, err := testHandshake(t, clientConfig, serverConfig); err != nil {
|
||||
t.Error(err)
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue