mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
sync: Go 1.21 with QUIC support (#208)
* sync: Go 1.21rc3, QUIC support added (#207) * sync: merge with upstream tag/go-1.21rc3 (#11) * fix: all tests pass * impl: UQUIC Transport * deps: bump up min Go version * new: uquic * fix: add QUICTransportParameter * deprecated: Go 1.19 no longer supported Go 1.19 will fail to build or pass the test once we bump up to the new version. * sync: crypto/tls: restrict RSA keys in certificates to <= 8192 bits (#209) * [release-branch.go1.21] crypto/tls: restrict RSA keys in certificates to <= 8192 bits Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. Limit this by restricting the size of RSA keys transmitted during handshakes to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable. Thanks to Mateusz Poliwczak for reporting this issue. Fixes CVE-2023-29409 * build: [ci skip] boring not included * fix: typo [ci skip] * docs: replenish readme [ci skip] replace old build status badge with new ones, bump up required version noted in docs, update developer contact to reflect current status.
This commit is contained in:
parent
d73321bb14
commit
86e9b69fdd
150 changed files with 13344 additions and 10239 deletions
154
common.go
154
common.go
|
@ -36,6 +36,26 @@ const (
|
|||
VersionSSL30 = 0x0300
|
||||
)
|
||||
|
||||
// VersionName returns the name for the provided TLS version number
|
||||
// (e.g. "TLS 1.3"), or a fallback representation of the value if the
|
||||
// version is not implemented by this package.
|
||||
func VersionName(version uint16) string {
|
||||
switch version {
|
||||
case VersionSSL30:
|
||||
return "SSLv3"
|
||||
case VersionTLS10:
|
||||
return "TLS 1.0"
|
||||
case VersionTLS11:
|
||||
return "TLS 1.1"
|
||||
case VersionTLS12:
|
||||
return "TLS 1.2"
|
||||
case VersionTLS13:
|
||||
return "TLS 1.3"
|
||||
default:
|
||||
return fmt.Sprintf("0x%04X", version)
|
||||
}
|
||||
}
|
||||
|
||||
const (
|
||||
maxPlaintext = 16384 // maximum plaintext payload length
|
||||
maxCiphertext = 16384 + 2048 // maximum ciphertext payload length
|
||||
|
@ -91,6 +111,7 @@ const (
|
|||
extensionALPN uint16 = 16
|
||||
extensionStatusRequestV2 uint16 = 17
|
||||
extensionSCT uint16 = 18
|
||||
extensionExtendedMasterSecret uint16 = 23
|
||||
extensionDelegatedCredentials uint16 = 34
|
||||
extensionSessionTicket uint16 = 35
|
||||
extensionPreSharedKey uint16 = 41
|
||||
|
@ -101,6 +122,7 @@ const (
|
|||
extensionCertificateAuthorities uint16 = 47
|
||||
extensionSignatureAlgorithmsCert uint16 = 50
|
||||
extensionKeyShare uint16 = 51
|
||||
extensionQUICTransportParameters uint16 = 57
|
||||
extensionRenegotiationInfo uint16 = 0xff01
|
||||
)
|
||||
|
||||
|
@ -253,6 +275,8 @@ type ConnectionState struct {
|
|||
// On the client side, it can't be empty. On the server side, it can be
|
||||
// empty if Config.ClientAuth is not RequireAnyClientCert or
|
||||
// RequireAndVerifyClientCert.
|
||||
//
|
||||
// PeerCertificates and its contents should not be modified.
|
||||
PeerCertificates []*x509.Certificate
|
||||
|
||||
// VerifiedChains is a list of one or more chains where the first element is
|
||||
|
@ -262,6 +286,8 @@ type ConnectionState struct {
|
|||
// On the client side, it's set if Config.InsecureSkipVerify is false. On
|
||||
// the server side, it's set if Config.ClientAuth is VerifyClientCertIfGiven
|
||||
// (and the peer provided a certificate) or RequireAndVerifyClientCert.
|
||||
//
|
||||
// VerifiedChains and its contents should not be modified.
|
||||
VerifiedChains [][]*x509.Certificate
|
||||
|
||||
// SignedCertificateTimestamps is a list of SCTs provided by the peer
|
||||
|
@ -273,12 +299,8 @@ type ConnectionState struct {
|
|||
OCSPResponse []byte
|
||||
|
||||
// TLSUnique contains the "tls-unique" channel binding value (see RFC 5929,
|
||||
// Section 3). This value will be nil for TLS 1.3 connections and for all
|
||||
// resumed connections.
|
||||
//
|
||||
// Deprecated: there are conditions in which this value might not be unique
|
||||
// to a connection. See the Security Considerations sections of RFC 5705 and
|
||||
// RFC 7627, and https://mitls.org/pages/attacks/3SHAKE#channelbindings.
|
||||
// Section 3). This value will be nil for TLS 1.3 connections and for
|
||||
// resumed connections that don't support Extended Master Secret (RFC 7627).
|
||||
TLSUnique []byte
|
||||
|
||||
// ekm is a closure exposed via ExportKeyingMaterial.
|
||||
|
@ -289,6 +311,10 @@ type ConnectionState struct {
|
|||
// slice as defined in RFC 5705. If context is nil, it is not used as part of
|
||||
// the seed. If the connection was set to allow renegotiation via
|
||||
// Config.Renegotiation, this function will return an error.
|
||||
//
|
||||
// There are conditions in which the returned values might not be unique to a
|
||||
// connection. See the Security Considerations sections of RFC 5705 and RFC 7627,
|
||||
// and https://mitls.org/pages/attacks/3SHAKE#channelbindings.
|
||||
func (cs *ConnectionState) ExportKeyingMaterial(label string, context []byte, length int) ([]byte, error) {
|
||||
return cs.ekm(label, context, length)
|
||||
}
|
||||
|
@ -332,25 +358,6 @@ func requiresClientCert(c ClientAuthType) bool {
|
|||
}
|
||||
}
|
||||
|
||||
// ClientSessionState contains the state needed by clients to resume TLS
|
||||
// sessions.
|
||||
type ClientSessionState struct {
|
||||
sessionTicket []uint8 // Encrypted ticket used for session resumption with server
|
||||
vers uint16 // TLS version negotiated for the session
|
||||
cipherSuite uint16 // Ciphersuite negotiated for the session
|
||||
masterSecret []byte // Full handshake MasterSecret, or TLS 1.3 resumption_master_secret
|
||||
serverCertificates []*x509.Certificate // Certificate chain presented by the server
|
||||
verifiedChains [][]*x509.Certificate // Certificate chains we built for verification
|
||||
receivedAt time.Time // When the session ticket was received from the server
|
||||
ocspResponse []byte // Stapled OCSP response presented by the server
|
||||
scts [][]byte // SCTs presented by the server
|
||||
|
||||
// TLS 1.3 fields.
|
||||
nonce []byte // Ticket nonce sent by the server, to derive PSK
|
||||
useBy time.Time // Expiration of the ticket lifetime as set by the server
|
||||
ageAdd uint32 // Random obfuscation factor for sending the ticket age
|
||||
}
|
||||
|
||||
// ClientSessionCache is a cache of ClientSessionState objects that can be used
|
||||
// by a client to resume a TLS session with a given server. ClientSessionCache
|
||||
// implementations should expect to be called concurrently from different
|
||||
|
@ -561,6 +568,8 @@ type Config struct {
|
|||
// If GetCertificate is nil or returns nil, then the certificate is
|
||||
// retrieved from NameToCertificate. If NameToCertificate is nil, the
|
||||
// best element of Certificates will be used.
|
||||
//
|
||||
// Once a Certificate is returned it should not be modified.
|
||||
GetCertificate func(*ClientHelloInfo) (*Certificate, error)
|
||||
|
||||
// GetClientCertificate, if not nil, is called when a server requests a
|
||||
|
@ -576,6 +585,8 @@ type Config struct {
|
|||
//
|
||||
// GetClientCertificate may be called multiple times for the same
|
||||
// connection if renegotiation occurs or if TLS 1.3 is in use.
|
||||
//
|
||||
// Once a Certificate is returned it should not be modified.
|
||||
GetClientCertificate func(*CertificateRequestInfo) (*Certificate, error)
|
||||
|
||||
// GetConfigForClient, if not nil, is called after a ClientHello is
|
||||
|
@ -600,10 +611,18 @@ type Config struct {
|
|||
// non-nil error, the handshake is aborted and that error results.
|
||||
//
|
||||
// If normal verification fails then the handshake will abort before
|
||||
// considering this callback. If normal verification is disabled by
|
||||
// setting InsecureSkipVerify, or (for a server) when ClientAuth is
|
||||
// RequestClientCert or RequireAnyClientCert, then this callback will
|
||||
// be considered but the verifiedChains argument will always be nil.
|
||||
// considering this callback. If normal verification is disabled (on the
|
||||
// client when InsecureSkipVerify is set, or on a server when ClientAuth is
|
||||
// RequestClientCert or RequireAnyClientCert), then this callback will be
|
||||
// considered but the verifiedChains argument will always be nil. When
|
||||
// ClientAuth is NoClientCert, this callback is not called on the server.
|
||||
// rawCerts may be empty on the server if ClientAuth is RequestClientCert or
|
||||
// VerifyClientCertIfGiven.
|
||||
//
|
||||
// This callback is not invoked on resumed connections, as certificates are
|
||||
// not re-verified on resumption.
|
||||
//
|
||||
// verifiedChains and its contents should not be modified.
|
||||
VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error
|
||||
|
||||
// VerifyConnection, if not nil, is called after normal certificate
|
||||
|
@ -612,8 +631,9 @@ type Config struct {
|
|||
// and that error results.
|
||||
//
|
||||
// If normal verification fails then the handshake will abort before
|
||||
// considering this callback. This callback will run for all connections
|
||||
// regardless of InsecureSkipVerify or ClientAuth settings.
|
||||
// considering this callback. This callback will run for all connections,
|
||||
// including resumptions, regardless of InsecureSkipVerify or ClientAuth
|
||||
// settings.
|
||||
VerifyConnection func(ConnectionState) error
|
||||
|
||||
// RootCAs defines the set of root certificate authorities
|
||||
|
@ -657,8 +677,8 @@ type Config struct {
|
|||
InsecureSkipVerify bool
|
||||
|
||||
// InsecureSkipTimeVerify controls whether a client verifies the server's
|
||||
// certificate chain against time. If InsecureSkipTimeVerify is true,
|
||||
// crypto/tls accepts the certificate even when it is expired.
|
||||
// certificate chain against time. If InsecureSkipTimeVerify is true,
|
||||
// crypto/tls accepts the certificate even when it is expired.
|
||||
//
|
||||
// This field is ignored when InsecureSkipVerify is true.
|
||||
InsecureSkipTimeVerify bool // [uTLS]
|
||||
|
@ -707,6 +727,35 @@ type Config struct {
|
|||
// session resumption. It is only used by clients.
|
||||
ClientSessionCache ClientSessionCache
|
||||
|
||||
// UnwrapSession is called on the server to turn a ticket/identity
|
||||
// previously produced by [WrapSession] into a usable session.
|
||||
//
|
||||
// UnwrapSession will usually either decrypt a session state in the ticket
|
||||
// (for example with [Config.EncryptTicket]), or use the ticket as a handle
|
||||
// to recover a previously stored state. It must use [ParseSessionState] to
|
||||
// deserialize the session state.
|
||||
//
|
||||
// If UnwrapSession returns an error, the connection is terminated. If it
|
||||
// returns (nil, nil), the session is ignored. crypto/tls may still choose
|
||||
// not to resume the returned session.
|
||||
UnwrapSession func(identity []byte, cs ConnectionState) (*SessionState, error)
|
||||
|
||||
// WrapSession is called on the server to produce a session ticket/identity.
|
||||
//
|
||||
// WrapSession must serialize the session state with [SessionState.Bytes].
|
||||
// It may then encrypt the serialized state (for example with
|
||||
// [Config.DecryptTicket]) and use it as the ticket, or store the state and
|
||||
// return a handle for it.
|
||||
//
|
||||
// If WrapSession returns an error, the connection is terminated.
|
||||
//
|
||||
// Warning: the return value will be exposed on the wire and to clients in
|
||||
// plaintext. The application is in charge of encrypting and authenticating
|
||||
// it (and rotating keys) or returning high-entropy identifiers. Failing to
|
||||
// do so correctly can compromise current, previous, and future connections
|
||||
// depending on the protocol version.
|
||||
WrapSession func(ConnectionState, *SessionState) ([]byte, error)
|
||||
|
||||
// MinVersion contains the minimum TLS version that is acceptable.
|
||||
//
|
||||
// By default, TLS 1.2 is currently used as the minimum when acting as a
|
||||
|
@ -751,7 +800,7 @@ type Config struct {
|
|||
|
||||
// mutex protects sessionTicketKeys and autoSessionTicketKeys.
|
||||
mutex sync.RWMutex
|
||||
// sessionTicketKeys contains zero or more ticket keys. If set, it means the
|
||||
// sessionTicketKeys contains zero or more ticket keys. If set, it means
|
||||
// the keys were set with SessionTicketKey or SetSessionTicketKeys. The
|
||||
// first key is used for new tickets and any subsequent keys can be used to
|
||||
// decrypt old tickets. The slice contents are not protected by the mutex
|
||||
|
@ -763,10 +812,6 @@ type Config struct {
|
|||
}
|
||||
|
||||
const (
|
||||
// ticketKeyNameLen is the number of bytes of identifier that is prepended to
|
||||
// an encrypted session ticket in order to identify the key used to encrypt it.
|
||||
ticketKeyNameLen = 16
|
||||
|
||||
// ticketKeyLifetime is how long a ticket key remains valid and can be used to
|
||||
// resume a client connection.
|
||||
ticketKeyLifetime = 7 * 24 * time.Hour // 7 days
|
||||
|
@ -778,9 +823,6 @@ const (
|
|||
|
||||
// ticketKey is the internal representation of a session ticket key.
|
||||
type ticketKey struct {
|
||||
// keyName is an opaque byte string that serves to identify the session
|
||||
// ticket key. It's exposed as plaintext in every session ticket.
|
||||
keyName [ticketKeyNameLen]byte
|
||||
aesKey [16]byte
|
||||
hmacKey [16]byte
|
||||
// created is the time at which this ticket key was created. See Config.ticketKeys.
|
||||
|
@ -792,15 +834,18 @@ type ticketKey struct {
|
|||
// bytes and this function expands that into sufficient name and key material.
|
||||
func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
|
||||
hashed := sha512.Sum512(b[:])
|
||||
copy(key.keyName[:], hashed[:ticketKeyNameLen])
|
||||
copy(key.aesKey[:], hashed[ticketKeyNameLen:ticketKeyNameLen+16])
|
||||
copy(key.hmacKey[:], hashed[ticketKeyNameLen+16:ticketKeyNameLen+32])
|
||||
// The first 16 bytes of the hash used to be exposed on the wire as a ticket
|
||||
// prefix. They MUST NOT be used as a secret. In the future, it would make
|
||||
// sense to use a proper KDF here, like HKDF with a fixed salt.
|
||||
const legacyTicketKeyNameLen = 16
|
||||
copy(key.aesKey[:], hashed[legacyTicketKeyNameLen:])
|
||||
copy(key.hmacKey[:], hashed[legacyTicketKeyNameLen+len(key.aesKey):])
|
||||
key.created = c.time()
|
||||
return key
|
||||
}
|
||||
|
||||
// maxSessionTicketLifetime is the maximum allowed lifetime of a TLS 1.3 session
|
||||
// ticket, and the lifetime we set for tickets we send.
|
||||
// ticket, and the lifetime we set for all tickets we send.
|
||||
const maxSessionTicketLifetime = 7 * 24 * time.Hour
|
||||
|
||||
// Clone returns a shallow clone of c or nil if c is nil. It is safe to clone a Config that is
|
||||
|
@ -835,6 +880,8 @@ func (c *Config) Clone() *Config {
|
|||
SessionTicketsDisabled: c.SessionTicketsDisabled,
|
||||
SessionTicketKey: c.SessionTicketKey,
|
||||
ClientSessionCache: c.ClientSessionCache,
|
||||
UnwrapSession: c.UnwrapSession,
|
||||
WrapSession: c.WrapSession,
|
||||
MinVersion: c.MinVersion,
|
||||
MaxVersion: c.MaxVersion,
|
||||
CurvePreferences: c.CurvePreferences,
|
||||
|
@ -1367,7 +1414,7 @@ func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
logLine := []byte(fmt.Sprintf("%s %x %x\n", label, clientRandom, secret))
|
||||
logLine := fmt.Appendf(nil, "%s %x %x\n", label, clientRandom, secret)
|
||||
|
||||
writerMutex.Lock()
|
||||
_, err := c.KeyLogWriter.Write(logLine)
|
||||
|
@ -1512,3 +1559,18 @@ func isSupportedSignatureAlgorithm(sigAlg SignatureScheme, supportedSignatureAlg
|
|||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// CertificateVerificationError is returned when certificate verification fails during the handshake.
|
||||
type CertificateVerificationError struct {
|
||||
// UnverifiedCertificates and its contents should not be modified.
|
||||
UnverifiedCertificates []*x509.Certificate
|
||||
Err error
|
||||
}
|
||||
|
||||
func (e *CertificateVerificationError) Error() string {
|
||||
return fmt.Sprintf("tls: failed to verify certificate: %s", e.Err)
|
||||
}
|
||||
|
||||
func (e *CertificateVerificationError) Unwrap() error {
|
||||
return e.Err
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue