mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
🔀 update: Merge 'upstream:release-branch.go1.22'
Merge upstream using a real merge commit. Signed-off-by: Gaukas Wang <i@gaukas.wang>
This commit is contained in:
commit
bd8fe35ca1
19 changed files with 1075 additions and 120 deletions
102
boring.go
Normal file
102
boring.go
Normal file
|
@ -0,0 +1,102 @@
|
||||||
|
// Copyright 2017 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build boringcrypto
|
||||||
|
|
||||||
|
package tls
|
||||||
|
|
||||||
|
import "crypto/internal/boring/fipstls"
|
||||||
|
|
||||||
|
// The FIPS-only policies enforced here currently match BoringSSL's
|
||||||
|
// ssl_policy_fips_202205.
|
||||||
|
|
||||||
|
// needFIPS returns fipstls.Required(); it avoids a new import in common.go.
|
||||||
|
func needFIPS() bool {
|
||||||
|
return fipstls.Required()
|
||||||
|
}
|
||||||
|
|
||||||
|
// fipsMinVersion replaces c.minVersion in FIPS-only mode.
|
||||||
|
func fipsMinVersion(c *Config) uint16 {
|
||||||
|
// FIPS requires TLS 1.2 or TLS 1.3.
|
||||||
|
return VersionTLS12
|
||||||
|
}
|
||||||
|
|
||||||
|
// fipsMaxVersion replaces c.maxVersion in FIPS-only mode.
|
||||||
|
func fipsMaxVersion(c *Config) uint16 {
|
||||||
|
// FIPS requires TLS 1.2 or TLS 1.3.
|
||||||
|
return VersionTLS13
|
||||||
|
}
|
||||||
|
|
||||||
|
// default defaultFIPSCurvePreferences is the FIPS-allowed curves,
|
||||||
|
// in preference order (most preferable first).
|
||||||
|
var defaultFIPSCurvePreferences = []CurveID{CurveP256, CurveP384}
|
||||||
|
|
||||||
|
// fipsCurvePreferences replaces c.curvePreferences in FIPS-only mode.
|
||||||
|
func fipsCurvePreferences(c *Config) []CurveID {
|
||||||
|
if c == nil || len(c.CurvePreferences) == 0 {
|
||||||
|
return defaultFIPSCurvePreferences
|
||||||
|
}
|
||||||
|
var list []CurveID
|
||||||
|
for _, id := range c.CurvePreferences {
|
||||||
|
for _, allowed := range defaultFIPSCurvePreferences {
|
||||||
|
if id == allowed {
|
||||||
|
list = append(list, id)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCipherSuitesFIPS are the FIPS-allowed cipher suites.
|
||||||
|
var defaultCipherSuitesFIPS = []uint16{
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
}
|
||||||
|
|
||||||
|
// fipsCipherSuites replaces c.cipherSuites in FIPS-only mode.
|
||||||
|
func fipsCipherSuites(c *Config) []uint16 {
|
||||||
|
if c == nil || c.CipherSuites == nil {
|
||||||
|
return defaultCipherSuitesFIPS
|
||||||
|
}
|
||||||
|
list := make([]uint16, 0, len(defaultCipherSuitesFIPS))
|
||||||
|
for _, id := range c.CipherSuites {
|
||||||
|
for _, allowed := range defaultCipherSuitesFIPS {
|
||||||
|
if id == allowed {
|
||||||
|
list = append(list, id)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCipherSuitesTLS13FIPS are the FIPS-allowed cipher suites for TLS 1.3.
|
||||||
|
var defaultCipherSuitesTLS13FIPS = []uint16{
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
}
|
||||||
|
|
||||||
|
// fipsSupportedSignatureAlgorithms currently are a subset of
|
||||||
|
// defaultSupportedSignatureAlgorithms without Ed25519, SHA-1, and P-521.
|
||||||
|
var fipsSupportedSignatureAlgorithms = []SignatureScheme{
|
||||||
|
PSSWithSHA256,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
}
|
||||||
|
|
||||||
|
// supportedSignatureAlgorithms returns the supported signature algorithms.
|
||||||
|
func supportedSignatureAlgorithms() []SignatureScheme {
|
||||||
|
if !needFIPS() {
|
||||||
|
return defaultSupportedSignatureAlgorithms
|
||||||
|
}
|
||||||
|
return fipsSupportedSignatureAlgorithms
|
||||||
|
}
|
650
boring_test.go
Normal file
650
boring_test.go
Normal file
|
@ -0,0 +1,650 @@
|
||||||
|
// Copyright 2017 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build boringcrypto
|
||||||
|
|
||||||
|
package tls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/elliptic"
|
||||||
|
"crypto/internal/boring/fipstls"
|
||||||
|
"crypto/rand"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/x509"
|
||||||
|
"crypto/x509/pkix"
|
||||||
|
"encoding/pem"
|
||||||
|
"fmt"
|
||||||
|
"internal/obscuretestdata"
|
||||||
|
"math/big"
|
||||||
|
"net"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func allCipherSuitesIncludingTLS13() []uint16 {
|
||||||
|
s := allCipherSuites()
|
||||||
|
for _, suite := range cipherSuitesTLS13 {
|
||||||
|
s = append(s, suite.id)
|
||||||
|
}
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
|
||||||
|
func isTLS13CipherSuite(id uint16) bool {
|
||||||
|
for _, suite := range cipherSuitesTLS13 {
|
||||||
|
if id == suite.id {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateKeyShare(group CurveID) keyShare {
|
||||||
|
key, err := generateECDHEKey(rand.Reader, group)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return keyShare{group: group, data: key.PublicKey().Bytes()}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringServerProtocolVersion(t *testing.T) {
|
||||||
|
test := func(name string, v uint16, msg string) {
|
||||||
|
t.Run(name, func(t *testing.T) {
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.MinVersion = VersionSSL30
|
||||||
|
clientHello := &clientHelloMsg{
|
||||||
|
vers: v,
|
||||||
|
random: make([]byte, 32),
|
||||||
|
cipherSuites: allCipherSuitesIncludingTLS13(),
|
||||||
|
compressionMethods: []uint8{compressionNone},
|
||||||
|
supportedCurves: defaultCurvePreferences,
|
||||||
|
keyShares: []keyShare{generateKeyShare(CurveP256)},
|
||||||
|
supportedPoints: []uint8{pointFormatUncompressed},
|
||||||
|
supportedVersions: []uint16{v},
|
||||||
|
}
|
||||||
|
testClientHelloFailure(t, serverConfig, clientHello, msg)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
test("VersionTLS10", VersionTLS10, "")
|
||||||
|
test("VersionTLS11", VersionTLS11, "")
|
||||||
|
test("VersionTLS12", VersionTLS12, "")
|
||||||
|
test("VersionTLS13", VersionTLS13, "")
|
||||||
|
|
||||||
|
fipstls.Force()
|
||||||
|
defer fipstls.Abandon()
|
||||||
|
test("VersionSSL30/fipstls", VersionSSL30, "client offered only unsupported versions")
|
||||||
|
test("VersionTLS10/fipstls", VersionTLS10, "client offered only unsupported versions")
|
||||||
|
test("VersionTLS11/fipstls", VersionTLS11, "client offered only unsupported versions")
|
||||||
|
test("VersionTLS12/fipstls", VersionTLS12, "")
|
||||||
|
test("VersionTLS13/fipstls", VersionTLS13, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func isBoringVersion(v uint16) bool {
|
||||||
|
return v == VersionTLS12 || v == VersionTLS13
|
||||||
|
}
|
||||||
|
|
||||||
|
func isBoringCipherSuite(id uint16) bool {
|
||||||
|
switch id {
|
||||||
|
case TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384:
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func isBoringCurve(id CurveID) bool {
|
||||||
|
switch id {
|
||||||
|
case CurveP256, CurveP384:
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func isECDSA(id uint16) bool {
|
||||||
|
for _, suite := range cipherSuites {
|
||||||
|
if suite.id == id {
|
||||||
|
return suite.flags&suiteECSign == suiteECSign
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false // TLS 1.3 cipher suites are not tied to the signature algorithm.
|
||||||
|
}
|
||||||
|
|
||||||
|
func isBoringSignatureScheme(alg SignatureScheme) bool {
|
||||||
|
switch alg {
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
case PKCS1WithSHA256,
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
PSSWithSHA256,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PSSWithSHA512:
|
||||||
|
// ok
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringServerCipherSuites(t *testing.T) {
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.Certificates = make([]Certificate, 1)
|
||||||
|
|
||||||
|
for _, id := range allCipherSuitesIncludingTLS13() {
|
||||||
|
if isECDSA(id) {
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
|
||||||
|
} else {
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testRSACertificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testRSAPrivateKey
|
||||||
|
}
|
||||||
|
serverConfig.BuildNameToCertificate()
|
||||||
|
t.Run(fmt.Sprintf("suite=%s", CipherSuiteName(id)), func(t *testing.T) {
|
||||||
|
clientHello := &clientHelloMsg{
|
||||||
|
vers: VersionTLS12,
|
||||||
|
random: make([]byte, 32),
|
||||||
|
cipherSuites: []uint16{id},
|
||||||
|
compressionMethods: []uint8{compressionNone},
|
||||||
|
supportedCurves: defaultCurvePreferences,
|
||||||
|
keyShares: []keyShare{generateKeyShare(CurveP256)},
|
||||||
|
supportedPoints: []uint8{pointFormatUncompressed},
|
||||||
|
supportedVersions: []uint16{VersionTLS12},
|
||||||
|
}
|
||||||
|
if isTLS13CipherSuite(id) {
|
||||||
|
clientHello.supportedVersions = []uint16{VersionTLS13}
|
||||||
|
}
|
||||||
|
|
||||||
|
testClientHello(t, serverConfig, clientHello)
|
||||||
|
t.Run("fipstls", func(t *testing.T) {
|
||||||
|
fipstls.Force()
|
||||||
|
defer fipstls.Abandon()
|
||||||
|
msg := ""
|
||||||
|
if !isBoringCipherSuite(id) {
|
||||||
|
msg = "no cipher suite supported by both client and server"
|
||||||
|
}
|
||||||
|
testClientHelloFailure(t, serverConfig, clientHello, msg)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringServerCurves(t *testing.T) {
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.Certificates = make([]Certificate, 1)
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
|
||||||
|
serverConfig.BuildNameToCertificate()
|
||||||
|
|
||||||
|
for _, curveid := range defaultCurvePreferences {
|
||||||
|
t.Run(fmt.Sprintf("curve=%d", curveid), func(t *testing.T) {
|
||||||
|
clientHello := &clientHelloMsg{
|
||||||
|
vers: VersionTLS12,
|
||||||
|
random: make([]byte, 32),
|
||||||
|
cipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
|
||||||
|
compressionMethods: []uint8{compressionNone},
|
||||||
|
supportedCurves: []CurveID{curveid},
|
||||||
|
keyShares: []keyShare{generateKeyShare(curveid)},
|
||||||
|
supportedPoints: []uint8{pointFormatUncompressed},
|
||||||
|
supportedVersions: []uint16{VersionTLS12},
|
||||||
|
}
|
||||||
|
|
||||||
|
testClientHello(t, serverConfig, clientHello)
|
||||||
|
|
||||||
|
// With fipstls forced, bad curves should be rejected.
|
||||||
|
t.Run("fipstls", func(t *testing.T) {
|
||||||
|
fipstls.Force()
|
||||||
|
defer fipstls.Abandon()
|
||||||
|
msg := ""
|
||||||
|
if !isBoringCurve(curveid) {
|
||||||
|
msg = "no cipher suite supported by both client and server"
|
||||||
|
}
|
||||||
|
testClientHelloFailure(t, serverConfig, clientHello, msg)
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func boringHandshake(t *testing.T, clientConfig, serverConfig *Config) (clientErr, serverErr error) {
|
||||||
|
c, s := localPipe(t)
|
||||||
|
client := Client(c, clientConfig)
|
||||||
|
server := Server(s, serverConfig)
|
||||||
|
done := make(chan error, 1)
|
||||||
|
go func() {
|
||||||
|
done <- client.Handshake()
|
||||||
|
c.Close()
|
||||||
|
}()
|
||||||
|
serverErr = server.Handshake()
|
||||||
|
s.Close()
|
||||||
|
clientErr = <-done
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringServerSignatureAndHash(t *testing.T) {
|
||||||
|
defer func() {
|
||||||
|
testingOnlyForceClientHelloSignatureAlgorithms = nil
|
||||||
|
}()
|
||||||
|
|
||||||
|
for _, sigHash := range defaultSupportedSignatureAlgorithms {
|
||||||
|
t.Run(fmt.Sprintf("%v", sigHash), func(t *testing.T) {
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.Certificates = make([]Certificate, 1)
|
||||||
|
|
||||||
|
testingOnlyForceClientHelloSignatureAlgorithms = []SignatureScheme{sigHash}
|
||||||
|
|
||||||
|
sigType, _, _ := typeAndHashFromSignatureScheme(sigHash)
|
||||||
|
switch sigType {
|
||||||
|
case signaturePKCS1v15, signatureRSAPSS:
|
||||||
|
serverConfig.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256}
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testRSA2048Certificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testRSA2048PrivateKey
|
||||||
|
case signatureEd25519:
|
||||||
|
serverConfig.CipherSuites = []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256}
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testEd25519Certificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testEd25519PrivateKey
|
||||||
|
case signatureECDSA:
|
||||||
|
serverConfig.CipherSuites = []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256}
|
||||||
|
serverConfig.Certificates[0].Certificate = [][]byte{testECDSACertificate}
|
||||||
|
serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
|
||||||
|
}
|
||||||
|
serverConfig.BuildNameToCertificate()
|
||||||
|
// PKCS#1 v1.5 signature algorithms can't be used standalone in TLS
|
||||||
|
// 1.3, and the ECDSA ones bind to the curve used.
|
||||||
|
serverConfig.MaxVersion = VersionTLS12
|
||||||
|
|
||||||
|
clientErr, serverErr := boringHandshake(t, testConfig, serverConfig)
|
||||||
|
if clientErr != nil {
|
||||||
|
t.Fatalf("expected handshake with %#x to succeed; client error: %v; server error: %v", sigHash, clientErr, serverErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
// With fipstls forced, bad curves should be rejected.
|
||||||
|
t.Run("fipstls", func(t *testing.T) {
|
||||||
|
fipstls.Force()
|
||||||
|
defer fipstls.Abandon()
|
||||||
|
clientErr, _ := boringHandshake(t, testConfig, serverConfig)
|
||||||
|
if isBoringSignatureScheme(sigHash) {
|
||||||
|
if clientErr != nil {
|
||||||
|
t.Fatalf("expected handshake with %#x to succeed; err=%v", sigHash, clientErr)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if clientErr == nil {
|
||||||
|
t.Fatalf("expected handshake with %#x to fail, but it succeeded", sigHash)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringClientHello(t *testing.T) {
|
||||||
|
// Test that no matter what we put in the client config,
|
||||||
|
// the client does not offer non-FIPS configurations.
|
||||||
|
fipstls.Force()
|
||||||
|
defer fipstls.Abandon()
|
||||||
|
|
||||||
|
c, s := net.Pipe()
|
||||||
|
defer c.Close()
|
||||||
|
defer s.Close()
|
||||||
|
|
||||||
|
clientConfig := testConfig.Clone()
|
||||||
|
// All sorts of traps for the client to avoid.
|
||||||
|
clientConfig.MinVersion = VersionSSL30
|
||||||
|
clientConfig.MaxVersion = VersionTLS13
|
||||||
|
clientConfig.CipherSuites = allCipherSuites()
|
||||||
|
clientConfig.CurvePreferences = defaultCurvePreferences
|
||||||
|
|
||||||
|
go Client(c, clientConfig).Handshake()
|
||||||
|
srv := Server(s, testConfig)
|
||||||
|
msg, err := srv.readHandshake(nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
hello, ok := msg.(*clientHelloMsg)
|
||||||
|
if !ok {
|
||||||
|
t.Fatalf("unexpected message type %T", msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !isBoringVersion(hello.vers) {
|
||||||
|
t.Errorf("client vers=%#x", hello.vers)
|
||||||
|
}
|
||||||
|
for _, v := range hello.supportedVersions {
|
||||||
|
if !isBoringVersion(v) {
|
||||||
|
t.Errorf("client offered disallowed version %#x", v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, id := range hello.cipherSuites {
|
||||||
|
if !isBoringCipherSuite(id) {
|
||||||
|
t.Errorf("client offered disallowed suite %#x", id)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, id := range hello.supportedCurves {
|
||||||
|
if !isBoringCurve(id) {
|
||||||
|
t.Errorf("client offered disallowed curve %d", id)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, sigHash := range hello.supportedSignatureAlgorithms {
|
||||||
|
if !isBoringSignatureScheme(sigHash) {
|
||||||
|
t.Errorf("client offered disallowed signature-and-hash %v", sigHash)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBoringCertAlgs(t *testing.T) {
|
||||||
|
// NaCl, arm and wasm time out generating keys. Nothing in this test is architecture-specific, so just don't bother on those.
|
||||||
|
if runtime.GOOS == "nacl" || runtime.GOARCH == "arm" || runtime.GOOS == "js" {
|
||||||
|
t.Skipf("skipping on %s/%s because key generation takes too long", runtime.GOOS, runtime.GOARCH)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set up some roots, intermediate CAs, and leaf certs with various algorithms.
|
||||||
|
// X_Y is X signed by Y.
|
||||||
|
R1 := boringCert(t, "R1", boringRSAKey(t, 2048), nil, boringCertCA|boringCertFIPSOK)
|
||||||
|
R2 := boringCert(t, "R2", boringRSAKey(t, 512), nil, boringCertCA)
|
||||||
|
|
||||||
|
M1_R1 := boringCert(t, "M1_R1", boringECDSAKey(t, elliptic.P256()), R1, boringCertCA|boringCertFIPSOK)
|
||||||
|
M2_R1 := boringCert(t, "M2_R1", boringECDSAKey(t, elliptic.P224()), R1, boringCertCA)
|
||||||
|
|
||||||
|
I_R1 := boringCert(t, "I_R1", boringRSAKey(t, 3072), R1, boringCertCA|boringCertFIPSOK)
|
||||||
|
I_R2 := boringCert(t, "I_R2", I_R1.key, R2, boringCertCA|boringCertFIPSOK)
|
||||||
|
I_M1 := boringCert(t, "I_M1", I_R1.key, M1_R1, boringCertCA|boringCertFIPSOK)
|
||||||
|
I_M2 := boringCert(t, "I_M2", I_R1.key, M2_R1, boringCertCA|boringCertFIPSOK)
|
||||||
|
|
||||||
|
L1_I := boringCert(t, "L1_I", boringECDSAKey(t, elliptic.P384()), I_R1, boringCertLeaf|boringCertFIPSOK)
|
||||||
|
L2_I := boringCert(t, "L2_I", boringRSAKey(t, 1024), I_R1, boringCertLeaf)
|
||||||
|
|
||||||
|
// client verifying server cert
|
||||||
|
testServerCert := func(t *testing.T, desc string, pool *x509.CertPool, key interface{}, list [][]byte, ok bool) {
|
||||||
|
clientConfig := testConfig.Clone()
|
||||||
|
clientConfig.RootCAs = pool
|
||||||
|
clientConfig.InsecureSkipVerify = false
|
||||||
|
clientConfig.ServerName = "example.com"
|
||||||
|
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.Certificates = []Certificate{{Certificate: list, PrivateKey: key}}
|
||||||
|
serverConfig.BuildNameToCertificate()
|
||||||
|
|
||||||
|
clientErr, _ := boringHandshake(t, clientConfig, serverConfig)
|
||||||
|
|
||||||
|
if (clientErr == nil) == ok {
|
||||||
|
if ok {
|
||||||
|
t.Logf("%s: accept", desc)
|
||||||
|
} else {
|
||||||
|
t.Logf("%s: reject", desc)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if ok {
|
||||||
|
t.Errorf("%s: BAD reject (%v)", desc, clientErr)
|
||||||
|
} else {
|
||||||
|
t.Errorf("%s: BAD accept", desc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// server verifying client cert
|
||||||
|
testClientCert := func(t *testing.T, desc string, pool *x509.CertPool, key interface{}, list [][]byte, ok bool) {
|
||||||
|
clientConfig := testConfig.Clone()
|
||||||
|
clientConfig.ServerName = "example.com"
|
||||||
|
clientConfig.Certificates = []Certificate{{Certificate: list, PrivateKey: key}}
|
||||||
|
|
||||||
|
serverConfig := testConfig.Clone()
|
||||||
|
serverConfig.ClientCAs = pool
|
||||||
|
serverConfig.ClientAuth = RequireAndVerifyClientCert
|
||||||
|
|
||||||
|
_, serverErr := boringHandshake(t, clientConfig, serverConfig)
|
||||||
|
|
||||||
|
if (serverErr == nil) == ok {
|
||||||
|
if ok {
|
||||||
|
t.Logf("%s: accept", desc)
|
||||||
|
} else {
|
||||||
|
t.Logf("%s: reject", desc)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if ok {
|
||||||
|
t.Errorf("%s: BAD reject (%v)", desc, serverErr)
|
||||||
|
} else {
|
||||||
|
t.Errorf("%s: BAD accept", desc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run simple basic test with known answers before proceeding to
|
||||||
|
// exhaustive test with computed answers.
|
||||||
|
r1pool := x509.NewCertPool()
|
||||||
|
r1pool.AddCert(R1.cert)
|
||||||
|
testServerCert(t, "basic", r1pool, L2_I.key, [][]byte{L2_I.der, I_R1.der}, true)
|
||||||
|
testClientCert(t, "basic (client cert)", r1pool, L2_I.key, [][]byte{L2_I.der, I_R1.der}, true)
|
||||||
|
fipstls.Force()
|
||||||
|
testServerCert(t, "basic (fips)", r1pool, L2_I.key, [][]byte{L2_I.der, I_R1.der}, false)
|
||||||
|
testClientCert(t, "basic (fips, client cert)", r1pool, L2_I.key, [][]byte{L2_I.der, I_R1.der}, false)
|
||||||
|
fipstls.Abandon()
|
||||||
|
|
||||||
|
if t.Failed() {
|
||||||
|
t.Fatal("basic test failed, skipping exhaustive test")
|
||||||
|
}
|
||||||
|
|
||||||
|
if testing.Short() {
|
||||||
|
t.Logf("basic test passed; skipping exhaustive test in -short mode")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for l := 1; l <= 2; l++ {
|
||||||
|
leaf := L1_I
|
||||||
|
if l == 2 {
|
||||||
|
leaf = L2_I
|
||||||
|
}
|
||||||
|
for i := 0; i < 64; i++ {
|
||||||
|
reachable := map[string]bool{leaf.parentOrg: true}
|
||||||
|
reachableFIPS := map[string]bool{leaf.parentOrg: leaf.fipsOK}
|
||||||
|
list := [][]byte{leaf.der}
|
||||||
|
listName := leaf.name
|
||||||
|
addList := func(cond int, c *boringCertificate) {
|
||||||
|
if cond != 0 {
|
||||||
|
list = append(list, c.der)
|
||||||
|
listName += "," + c.name
|
||||||
|
if reachable[c.org] {
|
||||||
|
reachable[c.parentOrg] = true
|
||||||
|
}
|
||||||
|
if reachableFIPS[c.org] && c.fipsOK {
|
||||||
|
reachableFIPS[c.parentOrg] = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
addList(i&1, I_R1)
|
||||||
|
addList(i&2, I_R2)
|
||||||
|
addList(i&4, I_M1)
|
||||||
|
addList(i&8, I_M2)
|
||||||
|
addList(i&16, M1_R1)
|
||||||
|
addList(i&32, M2_R1)
|
||||||
|
|
||||||
|
for r := 1; r <= 3; r++ {
|
||||||
|
pool := x509.NewCertPool()
|
||||||
|
rootName := ","
|
||||||
|
shouldVerify := false
|
||||||
|
shouldVerifyFIPS := false
|
||||||
|
addRoot := func(cond int, c *boringCertificate) {
|
||||||
|
if cond != 0 {
|
||||||
|
rootName += "," + c.name
|
||||||
|
pool.AddCert(c.cert)
|
||||||
|
if reachable[c.org] {
|
||||||
|
shouldVerify = true
|
||||||
|
}
|
||||||
|
if reachableFIPS[c.org] && c.fipsOK {
|
||||||
|
shouldVerifyFIPS = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
addRoot(r&1, R1)
|
||||||
|
addRoot(r&2, R2)
|
||||||
|
rootName = rootName[1:] // strip leading comma
|
||||||
|
testServerCert(t, listName+"->"+rootName[1:], pool, leaf.key, list, shouldVerify)
|
||||||
|
testClientCert(t, listName+"->"+rootName[1:]+"(client cert)", pool, leaf.key, list, shouldVerify)
|
||||||
|
fipstls.Force()
|
||||||
|
testServerCert(t, listName+"->"+rootName[1:]+" (fips)", pool, leaf.key, list, shouldVerifyFIPS)
|
||||||
|
testClientCert(t, listName+"->"+rootName[1:]+" (fips, client cert)", pool, leaf.key, list, shouldVerifyFIPS)
|
||||||
|
fipstls.Abandon()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
boringCertCA = iota
|
||||||
|
boringCertLeaf
|
||||||
|
boringCertFIPSOK = 0x80
|
||||||
|
)
|
||||||
|
|
||||||
|
func boringRSAKey(t *testing.T, size int) *rsa.PrivateKey {
|
||||||
|
k, err := rsa.GenerateKey(rand.Reader, size)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
return k
|
||||||
|
}
|
||||||
|
|
||||||
|
func boringECDSAKey(t *testing.T, curve elliptic.Curve) *ecdsa.PrivateKey {
|
||||||
|
k, err := ecdsa.GenerateKey(curve, rand.Reader)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
return k
|
||||||
|
}
|
||||||
|
|
||||||
|
type boringCertificate struct {
|
||||||
|
name string
|
||||||
|
org string
|
||||||
|
parentOrg string
|
||||||
|
der []byte
|
||||||
|
cert *x509.Certificate
|
||||||
|
key interface{}
|
||||||
|
fipsOK bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func boringCert(t *testing.T, name string, key interface{}, parent *boringCertificate, mode int) *boringCertificate {
|
||||||
|
org := name
|
||||||
|
parentOrg := ""
|
||||||
|
if i := strings.Index(org, "_"); i >= 0 {
|
||||||
|
org = org[:i]
|
||||||
|
parentOrg = name[i+1:]
|
||||||
|
}
|
||||||
|
tmpl := &x509.Certificate{
|
||||||
|
SerialNumber: big.NewInt(1),
|
||||||
|
Subject: pkix.Name{
|
||||||
|
Organization: []string{org},
|
||||||
|
},
|
||||||
|
NotBefore: time.Unix(0, 0),
|
||||||
|
NotAfter: time.Unix(0, 0),
|
||||||
|
|
||||||
|
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
|
||||||
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
|
||||||
|
BasicConstraintsValid: true,
|
||||||
|
}
|
||||||
|
if mode&^boringCertFIPSOK == boringCertLeaf {
|
||||||
|
tmpl.DNSNames = []string{"example.com"}
|
||||||
|
} else {
|
||||||
|
tmpl.IsCA = true
|
||||||
|
tmpl.KeyUsage |= x509.KeyUsageCertSign
|
||||||
|
}
|
||||||
|
|
||||||
|
var pcert *x509.Certificate
|
||||||
|
var pkey interface{}
|
||||||
|
if parent != nil {
|
||||||
|
pcert = parent.cert
|
||||||
|
pkey = parent.key
|
||||||
|
} else {
|
||||||
|
pcert = tmpl
|
||||||
|
pkey = key
|
||||||
|
}
|
||||||
|
|
||||||
|
var pub interface{}
|
||||||
|
switch k := key.(type) {
|
||||||
|
case *rsa.PrivateKey:
|
||||||
|
pub = &k.PublicKey
|
||||||
|
case *ecdsa.PrivateKey:
|
||||||
|
pub = &k.PublicKey
|
||||||
|
default:
|
||||||
|
t.Fatalf("invalid key %T", key)
|
||||||
|
}
|
||||||
|
|
||||||
|
der, err := x509.CreateCertificate(rand.Reader, tmpl, pcert, pub, pkey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
cert, err := x509.ParseCertificate(der)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fipsOK := mode&boringCertFIPSOK != 0
|
||||||
|
return &boringCertificate{name, org, parentOrg, der, cert, key, fipsOK}
|
||||||
|
}
|
||||||
|
|
||||||
|
// A self-signed test certificate with an RSA key of size 2048, for testing
|
||||||
|
// RSA-PSS with SHA512. SAN of example.golang.
|
||||||
|
var (
|
||||||
|
testRSA2048Certificate []byte
|
||||||
|
testRSA2048PrivateKey *rsa.PrivateKey
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
block, _ := pem.Decode(obscuretestdata.Rot13([]byte(`
|
||||||
|
-----ORTVA PREGVSVPNGR-----
|
||||||
|
ZVVP/mPPNrrtNjVONtVENYUUK/xu4+4mZH9QnemORpDjQDLWXbMVuipANDRYODNj
|
||||||
|
RwRDZN4TN1HRPuZUDJAgMFOQomNrSj0kZGNkZQRkAGN0ZQInSj0lZQRlZwxkAGN0
|
||||||
|
ZQInZOVkRQNBOtAIONbGO0SwoJHtD28jttRvZN0TPFdTFVo3QDRONDHNN4VOQjNj
|
||||||
|
ttRXNbVONDPs8sx0A6vrPOK4VBIVsXvgg4xTpBDYrvzPsfwddUplfZVITRgSFZ6R
|
||||||
|
4Nl141s/7VdqJ0HgVdAo4CKuEBVQ7lQkE284kY6KoPhi/g5uC3HpruLp3uzYvlIq
|
||||||
|
ZxMDvMJgsHHWs/1dBgZ+buAt59YEJc4q+6vK0yn1WY3RjPVpxxAwW9uDoS7Co2PF
|
||||||
|
+RF9Lb55XNnc8XBoycpE8ZOFA38odajwsDqPKiBRBwnz2UHkXmRSK5ZN+sN0zr4P
|
||||||
|
vbPpPEYJXy+TbA9S8sNOsbM+G+2rny4QYhB95eKE8FeBVIOu3KSBe/EIuwgKpAIS
|
||||||
|
MXpiQg6q68I6wNXNLXz5ayw9TCcq4i+eNtZONNTwHQOBZN4TN1HqQjRO/jDRNjVS
|
||||||
|
bQNGOtAIUFHRQQNXOtteOtRSODpQNGNZOtAIUEZONs8RNwNNZOxTN1HqRDDFZOPP
|
||||||
|
QzI4LJ1joTHhM29fLJ5aZN0TPFdTFVo3QDROPjHNN4VONDPBbLfIpSPOuobdr3JU
|
||||||
|
qP6I7KKKRPzawu01e8u80li0AE379aFQ3pj2Z+UXinKlfJdey5uwTIXj0igjQ81e
|
||||||
|
I4WmQh7VsVbt5z8+DAP+7YdQMfm88iQXBefblFIBzHPtzPXSKrj+YN+rB/vDRWGe
|
||||||
|
7rafqqBrKWRc27Rq5iJ+xzJJ3Dztyp2Tjl8jSeZQVdaeaBmON4bPaQRtgKWg0mbt
|
||||||
|
aEjosRZNJv1nDEl5qG9XN3FC9zb5FrGSFmTTUvR4f4tUHr7wifNSS2dtgQ6+jU6f
|
||||||
|
m9o6fukaP7t5VyOXuV7FIO/Hdg2lqW+xU1LowZpVd6ANZ5rAZXtMhWe3+mjfFtju
|
||||||
|
TAnR
|
||||||
|
-----RAQ PREGVSVPNGR-----`)))
|
||||||
|
testRSA2048Certificate = block.Bytes
|
||||||
|
|
||||||
|
block, _ = pem.Decode(obscuretestdata.Rot13([]byte(`
|
||||||
|
-----ORTVA EFN CEVINGR XRL-----
|
||||||
|
ZVVRcNVONNXPNDRNa/U5AQrbattI+PQyFUlbeorWOaQxP3bcta7V6du3ZeQPSEuY
|
||||||
|
EHwBuBNZgrAK/+lXaIgSYFXwJ+Q14HGvN+8t8HqiBZF+y2jee/7rLG91UUbJUA4M
|
||||||
|
v4fyKGWTHVzIeK1SPK/9nweGCdVGLBsF0IdrUshby9WJgFF9kZNvUWWQLlsLHTkr
|
||||||
|
m29txiuRiJXBrFtTdsPwz5nKRsQNHwq/T6c8V30UDy7muQb2cgu1ZFfkOI+GNCaj
|
||||||
|
AWahNbdNaNxF1vcsudQsEsUjNK6Tsx/gazcrNl7wirn10sRdmvSDLq1kGd/0ILL7
|
||||||
|
I3QIEJFaYj7rariSrbjPtTPchM5L/Ew6KrY/djVQNDNONbVONDPAcZMvsq/it42u
|
||||||
|
UqPiYhMnLF0E7FhaSycbKRfygTqYSfac0VsbWM/htSDOFNVVsYjZhzH6bKN1m7Hi
|
||||||
|
98nVLI61QrCeGPQIQSOfUoAzC8WNb8JgohfRojq5mlbO7YLT2+pyxWxyJR73XdHd
|
||||||
|
ezV+HWrlFpy2Tva7MGkOKm1JCOx9IjpajxrnKctNFVOJ23suRPZ9taLRRjnOrm5G
|
||||||
|
6Zr8q1gUgLDi7ifXr7eb9j9/UXeEKrwdLXX1YkxusSevlI+z8YMWMa2aKBn6T3tS
|
||||||
|
Ao8Dx1Hx5CHORAOzlZSWuG4Z/hhFd4LgZeeB2tv8D+sCuhTmp5FfuLXEOc0J4C5e
|
||||||
|
zgIPgRSENbTONZRAOVSYeI2+UfTw0kLSnfXbi/DCr6UFGE1Uu2VMBAc+bX4bfmJR
|
||||||
|
wOG4IpaVGzcy6gP1Jl4TpekwAtXVSMNw+1k1YHHYqbeKxhT8le0gNuT9mAlsJfFl
|
||||||
|
CeFbiP0HIome8Wkkyn+xDIkRDDdJDkCyRIhY8xKnVQN6Ylg1Uchn2YiCNbTONADM
|
||||||
|
p6Yd2G7+OkYkAqv2z8xMmrw5xtmOc/KqIfoSJEyroVK2XeSUfeUmG9CHx3QR1iMX
|
||||||
|
Z6cmGg94aDuJFxQtPnj1FbuRyW3USVSjphfS1FWNp3cDrcq8ht6VLqycQZYgOw/C
|
||||||
|
/5C6OIHgtb05R4+V/G3vLngztyDkGgyM0ExFI2yyNbTONYBKxXSK7nuCis0JxfQu
|
||||||
|
hGshSBGCbbjtDT0RctJ0jEqPkrt/WYvp3yFQ0tfggDI2JfErpelJpknryEt10EzB
|
||||||
|
38OobtzunS4kitfFihwBsvMGR8bX1G43Z+6AXfVyZY3LVYocH/9nWkCJl0f2QdQe
|
||||||
|
pDWuMeyx+cmwON7Oas/HEqjkNbTNXE/PAj14Q+zeY3LYoovPKvlqdkIjki5cqMqm
|
||||||
|
8guv3GApfJP4vTHEqpIdosHvaICqWvKr/Xnp3JTPrEWnSItoXNBkYgv1EO5ZxVut
|
||||||
|
Q8rlhcOdx4J1Y1txekdfqw4GSykxjZljwy2R2F4LlD8COg6I04QbIEMfVXmdm+CS
|
||||||
|
HvbaCd0PtLOPLKidvbWuCrjxBd/L5jeQOrMJ1SDX5DQ9J5Z8/5mkq4eqiWgwuoWc
|
||||||
|
bBegiZqey6hcl9Um4OWQ3SKjISvCSR7wdrAdv0S21ivYkOCZZQ3HBQS6YY5RlYvE
|
||||||
|
9I4kIZF8XKkit7ekfhdmZCfpIvnJHY6JAIOufQ2+92qUkFKmm5RWXD==
|
||||||
|
-----RAQ EFN CEVINGR XRL-----`)))
|
||||||
|
var err error
|
||||||
|
testRSA2048PrivateKey, err = x509.ParsePKCS1PrivateKey(block.Bytes)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
}
|
|
@ -48,7 +48,7 @@ var (
|
||||||
|
|
||||||
// CipherSuites returns a list of cipher suites currently implemented by this
|
// CipherSuites returns a list of cipher suites currently implemented by this
|
||||||
// package, excluding those with security issues, which are returned by
|
// package, excluding those with security issues, which are returned by
|
||||||
// InsecureCipherSuites.
|
// [InsecureCipherSuites].
|
||||||
//
|
//
|
||||||
// The list is sorted by ID. Note that the default cipher suites selected by
|
// The list is sorted by ID. Note that the default cipher suites selected by
|
||||||
// this package might depend on logic that can't be captured by a static list,
|
// this package might depend on logic that can't be captured by a static list,
|
||||||
|
@ -81,14 +81,18 @@ func CipherSuites() []*CipherSuite {
|
||||||
// this package and which have security issues.
|
// this package and which have security issues.
|
||||||
//
|
//
|
||||||
// Most applications should not use the cipher suites in this list, and should
|
// Most applications should not use the cipher suites in this list, and should
|
||||||
// only use those returned by CipherSuites.
|
// only use those returned by [CipherSuites].
|
||||||
func InsecureCipherSuites() []*CipherSuite {
|
func InsecureCipherSuites() []*CipherSuite {
|
||||||
// This list includes RC4, CBC_SHA256, and 3DES cipher suites. See
|
// This list includes RC4, CBC_SHA256, and 3DES cipher suites. See
|
||||||
// cipherSuitesPreferenceOrder for details.
|
// cipherSuitesPreferenceOrder for details.
|
||||||
return []*CipherSuite{
|
return []*CipherSuite{
|
||||||
{TLS_RSA_WITH_RC4_128_SHA, "TLS_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
{TLS_RSA_WITH_RC4_128_SHA, "TLS_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
{TLS_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
{TLS_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_RSA_WITH_AES_128_CBC_SHA, "TLS_RSA_WITH_AES_128_CBC_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_RSA_WITH_AES_256_CBC_SHA, "TLS_RSA_WITH_AES_256_CBC_SHA", supportedUpToTLS12, true},
|
||||||
{TLS_RSA_WITH_AES_128_CBC_SHA256, "TLS_RSA_WITH_AES_128_CBC_SHA256", supportedOnlyTLS12, true},
|
{TLS_RSA_WITH_AES_128_CBC_SHA256, "TLS_RSA_WITH_AES_128_CBC_SHA256", supportedOnlyTLS12, true},
|
||||||
|
{TLS_RSA_WITH_AES_128_GCM_SHA256, "TLS_RSA_WITH_AES_128_GCM_SHA256", supportedOnlyTLS12, true},
|
||||||
|
{TLS_RSA_WITH_AES_256_GCM_SHA384, "TLS_RSA_WITH_AES_256_GCM_SHA384", supportedOnlyTLS12, true},
|
||||||
{TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
{TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
{TLS_ECDHE_RSA_WITH_RC4_128_SHA, "TLS_ECDHE_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
{TLS_ECDHE_RSA_WITH_RC4_128_SHA, "TLS_ECDHE_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
{TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
{TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
||||||
|
@ -325,22 +329,47 @@ var cipherSuitesPreferenceOrderNoAES = []uint16{
|
||||||
TLS_RSA_WITH_RC4_128_SHA,
|
TLS_RSA_WITH_RC4_128_SHA,
|
||||||
}
|
}
|
||||||
|
|
||||||
// disabledCipherSuites are not used unless explicitly listed in
|
// disabledCipherSuites are not used unless explicitly listed in Config.CipherSuites.
|
||||||
// Config.CipherSuites. They MUST be at the end of cipherSuitesPreferenceOrder.
|
var disabledCipherSuites = map[uint16]bool{
|
||||||
var disabledCipherSuites = []uint16{
|
|
||||||
// CBC_SHA256
|
// CBC_SHA256
|
||||||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: true,
|
||||||
TLS_RSA_WITH_AES_128_CBC_SHA256,
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: true,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256: true,
|
||||||
|
|
||||||
// RC4
|
// RC4
|
||||||
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA: true,
|
||||||
TLS_RSA_WITH_RC4_128_SHA,
|
TLS_ECDHE_RSA_WITH_RC4_128_SHA: true,
|
||||||
|
TLS_RSA_WITH_RC4_128_SHA: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
var (
|
// rsaKexCiphers contains the ciphers which use RSA based key exchange,
|
||||||
defaultCipherSuitesLen = len(cipherSuitesPreferenceOrder) - len(disabledCipherSuites)
|
// which we also disable by default unless a GODEBUG is set.
|
||||||
defaultCipherSuites = cipherSuitesPreferenceOrder[:defaultCipherSuitesLen]
|
var rsaKexCiphers = map[uint16]bool{
|
||||||
)
|
TLS_RSA_WITH_RC4_128_SHA: true,
|
||||||
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA: true,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA: true,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA: true,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256: true,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256: true,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
var defaultCipherSuites []uint16
|
||||||
|
var defaultCipherSuitesWithRSAKex []uint16
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
defaultCipherSuites = make([]uint16, 0, len(cipherSuitesPreferenceOrder))
|
||||||
|
defaultCipherSuitesWithRSAKex = make([]uint16, 0, len(cipherSuitesPreferenceOrder))
|
||||||
|
for _, c := range cipherSuitesPreferenceOrder {
|
||||||
|
if disabledCipherSuites[c] {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if !rsaKexCiphers[c] {
|
||||||
|
defaultCipherSuites = append(defaultCipherSuites, c)
|
||||||
|
}
|
||||||
|
defaultCipherSuitesWithRSAKex = append(defaultCipherSuitesWithRSAKex, c)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// defaultCipherSuitesTLS13 is also the preference order, since there are no
|
// defaultCipherSuitesTLS13 is also the preference order, since there are no
|
||||||
// disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
|
// disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
|
||||||
|
@ -535,7 +564,13 @@ func aeadAESGCMTLS13(key, nonceMask []byte) aead {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
aead, err := cipher.NewGCM(aes)
|
var aead cipher.AEAD
|
||||||
|
if boring.Enabled {
|
||||||
|
aead, err = boring.NewGCMTLS13(aes)
|
||||||
|
} else {
|
||||||
|
boring.Unreachable()
|
||||||
|
aead, err = cipher.NewGCM(aes)
|
||||||
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
51
common.go
51
common.go
|
@ -316,11 +316,13 @@ type ConnectionState struct {
|
||||||
// ExportKeyingMaterial returns length bytes of exported key material in a new
|
// ExportKeyingMaterial returns length bytes of exported key material in a new
|
||||||
// slice as defined in RFC 5705. If context is nil, it is not used as part of
|
// slice as defined in RFC 5705. If context is nil, it is not used as part of
|
||||||
// the seed. If the connection was set to allow renegotiation via
|
// the seed. If the connection was set to allow renegotiation via
|
||||||
// Config.Renegotiation, this function will return an error.
|
// Config.Renegotiation, or if the connections supports neither TLS 1.3 nor
|
||||||
|
// Extended Master Secret, this function will return an error.
|
||||||
//
|
//
|
||||||
// There are conditions in which the returned values might not be unique to a
|
// Exporting key material without Extended Master Secret or TLS 1.3 was disabled
|
||||||
// connection. See the Security Considerations sections of RFC 5705 and RFC 7627,
|
// in Go 1.22 due to security issues (see the Security Considerations sections
|
||||||
// and https://mitls.org/pages/attacks/3SHAKE#channelbindings.
|
// of RFC 5705 and RFC 7627), but can be re-enabled with the GODEBUG setting
|
||||||
|
// tlsunsafeekm=1.
|
||||||
func (cs *ConnectionState) ExportKeyingMaterial(label string, context []byte, length int) ([]byte, error) {
|
func (cs *ConnectionState) ExportKeyingMaterial(label string, context []byte, length int) ([]byte, error) {
|
||||||
return cs.ekm(label, context, length)
|
return cs.ekm(label, context, length)
|
||||||
}
|
}
|
||||||
|
@ -722,7 +724,9 @@ type Config struct {
|
||||||
// the list is ignored. Note that TLS 1.3 ciphersuites are not configurable.
|
// the list is ignored. Note that TLS 1.3 ciphersuites are not configurable.
|
||||||
//
|
//
|
||||||
// If CipherSuites is nil, a safe default list is used. The default cipher
|
// If CipherSuites is nil, a safe default list is used. The default cipher
|
||||||
// suites might change over time.
|
// suites might change over time. In Go 1.22 RSA key exchange based cipher
|
||||||
|
// suites were removed from the default list, but can be re-added with the
|
||||||
|
// GODEBUG setting tlsrsakex=1.
|
||||||
CipherSuites []uint16
|
CipherSuites []uint16
|
||||||
|
|
||||||
// PreferServerCipherSuites is a legacy field and has no effect.
|
// PreferServerCipherSuites is a legacy field and has no effect.
|
||||||
|
@ -785,14 +789,11 @@ type Config struct {
|
||||||
|
|
||||||
// MinVersion contains the minimum TLS version that is acceptable.
|
// MinVersion contains the minimum TLS version that is acceptable.
|
||||||
//
|
//
|
||||||
// By default, TLS 1.2 is currently used as the minimum when acting as a
|
// By default, TLS 1.2 is currently used as the minimum. TLS 1.0 is the
|
||||||
// client, and TLS 1.0 when acting as a server. TLS 1.0 is the minimum
|
// minimum supported by this package.
|
||||||
// supported by this package, both as a client and as a server.
|
|
||||||
//
|
//
|
||||||
// The client-side default can temporarily be reverted to TLS 1.0 by
|
// The server-side default can be reverted to TLS 1.0 by including the value
|
||||||
// including the value "x509sha1=1" in the GODEBUG environment variable.
|
// "tls10server=1" in the GODEBUG environment variable.
|
||||||
// Note that this option will be removed in Go 1.19 (but it will still be
|
|
||||||
// possible to set this field to VersionTLS10 explicitly).
|
|
||||||
MinVersion uint16
|
MinVersion uint16
|
||||||
|
|
||||||
// MaxVersion contains the maximum TLS version that is acceptable.
|
// MaxVersion contains the maximum TLS version that is acceptable.
|
||||||
|
@ -891,7 +892,7 @@ func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
|
||||||
// ticket, and the lifetime we set for all tickets we send.
|
// ticket, and the lifetime we set for all tickets we send.
|
||||||
const maxSessionTicketLifetime = 7 * 24 * time.Hour
|
const maxSessionTicketLifetime = 7 * 24 * time.Hour
|
||||||
|
|
||||||
// Clone returns a shallow clone of c or nil if c is nil. It is safe to clone a Config that is
|
// Clone returns a shallow clone of c or nil if c is nil. It is safe to clone a [Config] that is
|
||||||
// being used concurrently by a TLS client or server.
|
// being used concurrently by a TLS client or server.
|
||||||
func (c *Config) Clone() *Config {
|
func (c *Config) Clone() *Config {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
|
@ -1083,6 +1084,8 @@ func (c *Config) time() time.Time {
|
||||||
return t()
|
return t()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var tlsrsakex = godebug.New("tlsrsakex")
|
||||||
|
|
||||||
func (c *Config) cipherSuites() []uint16 {
|
func (c *Config) cipherSuites() []uint16 {
|
||||||
if needFIPS() {
|
if needFIPS() {
|
||||||
return fipsCipherSuites(c)
|
return fipsCipherSuites(c)
|
||||||
|
@ -1090,6 +1093,9 @@ func (c *Config) cipherSuites() []uint16 {
|
||||||
if c.CipherSuites != nil {
|
if c.CipherSuites != nil {
|
||||||
return c.CipherSuites
|
return c.CipherSuites
|
||||||
}
|
}
|
||||||
|
if tlsrsakex.Value() == "1" {
|
||||||
|
return defaultCipherSuitesWithRSAKex
|
||||||
|
}
|
||||||
return defaultCipherSuites
|
return defaultCipherSuites
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1105,15 +1111,18 @@ var supportedVersions = []uint16{
|
||||||
const roleClient = true
|
const roleClient = true
|
||||||
const roleServer = false
|
const roleServer = false
|
||||||
|
|
||||||
|
var tls10server = godebug.New("tls10server")
|
||||||
|
|
||||||
func (c *Config) supportedVersions(isClient bool) []uint16 {
|
func (c *Config) supportedVersions(isClient bool) []uint16 {
|
||||||
versions := make([]uint16, 0, len(supportedVersions))
|
versions := make([]uint16, 0, len(supportedVersions))
|
||||||
for _, v := range supportedVersions {
|
for _, v := range supportedVersions {
|
||||||
if needFIPS() && (v < fipsMinVersion(c) || v > fipsMaxVersion(c)) {
|
if needFIPS() && (v < fipsMinVersion(c) || v > fipsMaxVersion(c)) {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if (c == nil || c.MinVersion == 0) &&
|
if (c == nil || c.MinVersion == 0) && v < VersionTLS12 {
|
||||||
isClient && v < VersionTLS12 {
|
if isClient || tls10server.Value() != "1" {
|
||||||
continue
|
continue
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if c != nil && c.MinVersion != 0 && v < c.MinVersion {
|
if c != nil && c.MinVersion != 0 && v < c.MinVersion {
|
||||||
continue
|
continue
|
||||||
|
@ -1234,9 +1243,9 @@ func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, err
|
||||||
// the client that sent the ClientHello. Otherwise, it returns an error
|
// the client that sent the ClientHello. Otherwise, it returns an error
|
||||||
// describing the reason for the incompatibility.
|
// describing the reason for the incompatibility.
|
||||||
//
|
//
|
||||||
// If this ClientHelloInfo was passed to a GetConfigForClient or GetCertificate
|
// If this [ClientHelloInfo] was passed to a GetConfigForClient or GetCertificate
|
||||||
// callback, this method will take into account the associated Config. Note that
|
// callback, this method will take into account the associated [Config]. Note that
|
||||||
// if GetConfigForClient returns a different Config, the change can't be
|
// if GetConfigForClient returns a different [Config], the change can't be
|
||||||
// accounted for by this method.
|
// accounted for by this method.
|
||||||
//
|
//
|
||||||
// This function will call x509.ParseCertificate unless c.Leaf is set, which can
|
// This function will call x509.ParseCertificate unless c.Leaf is set, which can
|
||||||
|
@ -1527,7 +1536,7 @@ type lruSessionCacheEntry struct {
|
||||||
state *ClientSessionState
|
state *ClientSessionState
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewLRUClientSessionCache returns a ClientSessionCache with the given
|
// NewLRUClientSessionCache returns a [ClientSessionCache] with the given
|
||||||
// capacity that uses an LRU strategy. If capacity is < 1, a default capacity
|
// capacity that uses an LRU strategy. If capacity is < 1, a default capacity
|
||||||
// is used instead.
|
// is used instead.
|
||||||
func NewLRUClientSessionCache(capacity int) ClientSessionCache {
|
func NewLRUClientSessionCache(capacity int) ClientSessionCache {
|
||||||
|
@ -1576,7 +1585,7 @@ func (c *lruSessionCache) Put(sessionKey string, cs *ClientSessionState) {
|
||||||
c.m[sessionKey] = elem
|
c.m[sessionKey] = elem
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get returns the ClientSessionState value associated with a given key. It
|
// Get returns the [ClientSessionState] value associated with a given key. It
|
||||||
// returns (nil, false) if no value is found.
|
// returns (nil, false) if no value is found.
|
||||||
func (c *lruSessionCache) Get(sessionKey string) (*ClientSessionState, bool) {
|
func (c *lruSessionCache) Get(sessionKey string) (*ClientSessionState, bool) {
|
||||||
c.Lock()
|
c.Lock()
|
||||||
|
|
49
conn.go
49
conn.go
|
@ -138,21 +138,21 @@ func (c *Conn) RemoteAddr() net.Addr {
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetDeadline sets the read and write deadlines associated with the connection.
|
// SetDeadline sets the read and write deadlines associated with the connection.
|
||||||
// A zero value for t means Read and Write will not time out.
|
// A zero value for t means [Conn.Read] and [Conn.Write] will not time out.
|
||||||
// After a Write has timed out, the TLS state is corrupt and all future writes will return the same error.
|
// After a Write has timed out, the TLS state is corrupt and all future writes will return the same error.
|
||||||
func (c *Conn) SetDeadline(t time.Time) error {
|
func (c *Conn) SetDeadline(t time.Time) error {
|
||||||
return c.conn.SetDeadline(t)
|
return c.conn.SetDeadline(t)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetReadDeadline sets the read deadline on the underlying connection.
|
// SetReadDeadline sets the read deadline on the underlying connection.
|
||||||
// A zero value for t means Read will not time out.
|
// A zero value for t means [Conn.Read] will not time out.
|
||||||
func (c *Conn) SetReadDeadline(t time.Time) error {
|
func (c *Conn) SetReadDeadline(t time.Time) error {
|
||||||
return c.conn.SetReadDeadline(t)
|
return c.conn.SetReadDeadline(t)
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetWriteDeadline sets the write deadline on the underlying connection.
|
// SetWriteDeadline sets the write deadline on the underlying connection.
|
||||||
// A zero value for t means Write will not time out.
|
// A zero value for t means [Conn.Write] will not time out.
|
||||||
// After a Write has timed out, the TLS state is corrupt and all future writes will return the same error.
|
// After a [Conn.Write] has timed out, the TLS state is corrupt and all future writes will return the same error.
|
||||||
func (c *Conn) SetWriteDeadline(t time.Time) error {
|
func (c *Conn) SetWriteDeadline(t time.Time) error {
|
||||||
return c.conn.SetWriteDeadline(t)
|
return c.conn.SetWriteDeadline(t)
|
||||||
}
|
}
|
||||||
|
@ -1184,10 +1184,10 @@ var (
|
||||||
|
|
||||||
// Write writes data to the connection.
|
// Write writes data to the connection.
|
||||||
//
|
//
|
||||||
// As Write calls Handshake, in order to prevent indefinite blocking a deadline
|
// As Write calls [Conn.Handshake], in order to prevent indefinite blocking a deadline
|
||||||
// must be set for both Read and Write before Write is called when the handshake
|
// must be set for both [Conn.Read] and Write before Write is called when the handshake
|
||||||
// has not yet completed. See SetDeadline, SetReadDeadline, and
|
// has not yet completed. See [Conn.SetDeadline], [Conn.SetReadDeadline], and
|
||||||
// SetWriteDeadline.
|
// [Conn.SetWriteDeadline].
|
||||||
func (c *Conn) Write(b []byte) (int, error) {
|
func (c *Conn) Write(b []byte) (int, error) {
|
||||||
// interlock with Close below
|
// interlock with Close below
|
||||||
for {
|
for {
|
||||||
|
@ -1359,10 +1359,10 @@ func (c *Conn) handleKeyUpdate(keyUpdate *keyUpdateMsg) error {
|
||||||
|
|
||||||
// Read reads data from the connection.
|
// Read reads data from the connection.
|
||||||
//
|
//
|
||||||
// As Read calls Handshake, in order to prevent indefinite blocking a deadline
|
// As Read calls [Conn.Handshake], in order to prevent indefinite blocking a deadline
|
||||||
// must be set for both Read and Write before Read is called when the handshake
|
// must be set for both Read and [Conn.Write] before Read is called when the handshake
|
||||||
// has not yet completed. See SetDeadline, SetReadDeadline, and
|
// has not yet completed. See [Conn.SetDeadline], [Conn.SetReadDeadline], and
|
||||||
// SetWriteDeadline.
|
// [Conn.SetWriteDeadline].
|
||||||
func (c *Conn) Read(b []byte) (int, error) {
|
func (c *Conn) Read(b []byte) (int, error) {
|
||||||
if err := c.Handshake(); err != nil {
|
if err := c.Handshake(); err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
|
@ -1446,7 +1446,7 @@ var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake com
|
||||||
|
|
||||||
// CloseWrite shuts down the writing side of the connection. It should only be
|
// CloseWrite shuts down the writing side of the connection. It should only be
|
||||||
// called once the handshake has completed and does not call CloseWrite on the
|
// called once the handshake has completed and does not call CloseWrite on the
|
||||||
// underlying connection. Most callers should just use Close.
|
// underlying connection. Most callers should just use [Conn.Close].
|
||||||
func (c *Conn) CloseWrite() error {
|
func (c *Conn) CloseWrite() error {
|
||||||
if !c.isHandshakeComplete.Load() {
|
if !c.isHandshakeComplete.Load() {
|
||||||
return errEarlyCloseWrite
|
return errEarlyCloseWrite
|
||||||
|
@ -1474,10 +1474,15 @@ func (c *Conn) closeNotify() error {
|
||||||
// protocol if it has not yet been run.
|
// protocol if it has not yet been run.
|
||||||
//
|
//
|
||||||
// Most uses of this package need not call Handshake explicitly: the
|
// Most uses of this package need not call Handshake explicitly: the
|
||||||
// first Read or Write will call it automatically.
|
// first [Conn.Read] or [Conn.Write] will call it automatically.
|
||||||
//
|
//
|
||||||
// For control over canceling or setting a timeout on a handshake, use
|
// For control over canceling or setting a timeout on a handshake, use
|
||||||
// HandshakeContext or the Dialer's DialContext method instead.
|
// [Conn.HandshakeContext] or the [Dialer]'s DialContext method instead.
|
||||||
|
//
|
||||||
|
// In order to avoid denial of service attacks, the maximum RSA key size allowed
|
||||||
|
// in certificates sent by either the TLS server or client is limited to 8192
|
||||||
|
// bits. This limit can be overridden by setting tlsmaxrsasize in the GODEBUG
|
||||||
|
// environment variable (e.g. GODEBUG=tlsmaxrsasize=4096).
|
||||||
func (c *Conn) Handshake() error {
|
func (c *Conn) Handshake() error {
|
||||||
return c.HandshakeContext(context.Background())
|
return c.HandshakeContext(context.Background())
|
||||||
}
|
}
|
||||||
|
@ -1491,7 +1496,7 @@ func (c *Conn) Handshake() error {
|
||||||
// connection.
|
// connection.
|
||||||
//
|
//
|
||||||
// Most uses of this package need not call HandshakeContext explicitly: the
|
// Most uses of this package need not call HandshakeContext explicitly: the
|
||||||
// first Read or Write will call it automatically.
|
// first [Conn.Read] or [Conn.Write] will call it automatically.
|
||||||
func (c *Conn) HandshakeContext(ctx context.Context) error {
|
func (c *Conn) HandshakeContext(ctx context.Context) error {
|
||||||
// Delegate to unexported method for named return
|
// Delegate to unexported method for named return
|
||||||
// without confusing documented signature.
|
// without confusing documented signature.
|
||||||
|
@ -1605,6 +1610,8 @@ func (c *Conn) ConnectionState() ConnectionState {
|
||||||
return c.connectionStateLocked()
|
return c.connectionStateLocked()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var tlsunsafeekm = godebug.New("tlsunsafeekm")
|
||||||
|
|
||||||
func (c *Conn) connectionStateLocked() ConnectionState {
|
func (c *Conn) connectionStateLocked() ConnectionState {
|
||||||
var state ConnectionState
|
var state ConnectionState
|
||||||
state.HandshakeComplete = c.isHandshakeComplete.Load()
|
state.HandshakeComplete = c.isHandshakeComplete.Load()
|
||||||
|
@ -1626,7 +1633,15 @@ func (c *Conn) connectionStateLocked() ConnectionState {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if c.config.Renegotiation != RenegotiateNever {
|
if c.config.Renegotiation != RenegotiateNever {
|
||||||
state.ekm = noExportedKeyingMaterial
|
state.ekm = noEKMBecauseRenegotiation
|
||||||
|
} else if c.vers != VersionTLS13 && !c.extMasterSecret {
|
||||||
|
state.ekm = func(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
if tlsunsafeekm.Value() == "1" {
|
||||||
|
tlsunsafeekm.IncNonDefault()
|
||||||
|
return c.ekm(label, context, length)
|
||||||
|
}
|
||||||
|
return noEKMBecauseNoEMS(label, context, length)
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
state.ekm = c.ekm
|
state.ekm = c.ekm
|
||||||
}
|
}
|
||||||
|
|
29
fipsonly/fipsonly.go
Normal file
29
fipsonly/fipsonly.go
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
// Copyright 2017 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build boringcrypto
|
||||||
|
|
||||||
|
// Package fipsonly restricts all TLS configuration to FIPS-approved settings.
|
||||||
|
//
|
||||||
|
// The effect is triggered by importing the package anywhere in a program, as in:
|
||||||
|
//
|
||||||
|
// import _ "crypto/tls/fipsonly"
|
||||||
|
//
|
||||||
|
// This package only exists when using Go compiled with GOEXPERIMENT=boringcrypto.
|
||||||
|
package fipsonly
|
||||||
|
|
||||||
|
// This functionality is provided as a side effect of an import to make
|
||||||
|
// it trivial to add to an existing program. It requires only a single line
|
||||||
|
// added to an existing source file, or it can be done by adding a whole
|
||||||
|
// new source file and not modifying any existing source files.
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/internal/boring/fipstls"
|
||||||
|
"crypto/internal/boring/sig"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
fipstls.Force()
|
||||||
|
sig.FIPSOnly()
|
||||||
|
}
|
18
fipsonly/fipsonly_test.go
Normal file
18
fipsonly/fipsonly_test.go
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
// Copyright 2017 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build boringcrypto
|
||||||
|
|
||||||
|
package fipsonly
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/internal/boring/fipstls"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func Test(t *testing.T) {
|
||||||
|
if !fipstls.Required() {
|
||||||
|
t.Fatal("fipstls.Required() = false, must be true")
|
||||||
|
}
|
||||||
|
}
|
|
@ -19,6 +19,7 @@ import (
|
||||||
"hash"
|
"hash"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
@ -41,7 +42,7 @@ type clientHandshakeState struct {
|
||||||
|
|
||||||
var testingOnlyForceClientHelloSignatureAlgorithms []SignatureScheme
|
var testingOnlyForceClientHelloSignatureAlgorithms []SignatureScheme
|
||||||
|
|
||||||
func (c *Conn) makeClientHello() (*clientHelloMsg, clientKeySharePrivate, error) {
|
func (c *Conn) makeClientHello() (*clientHelloMsg, clientKeySharePrivate, error) { // [uTLS] using clientKeySharePrivate instead of ecdheKey
|
||||||
config := c.config
|
config := c.config
|
||||||
|
|
||||||
// [UTLS SECTION START]
|
// [UTLS SECTION START]
|
||||||
|
@ -132,19 +133,23 @@ func (c *Conn) makeClientHello() (*clientHelloMsg, clientKeySharePrivate, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
if hello.vers >= VersionTLS12 {
|
if hello.vers >= VersionTLS12 {
|
||||||
|
// hello.supportedSignatureAlgorithms = supportedSignatureAlgorithms()
|
||||||
hello.supportedSignatureAlgorithms = config.supportedSignatureAlgorithms() // [UTLS] ported from cloudflare/go
|
hello.supportedSignatureAlgorithms = config.supportedSignatureAlgorithms() // [UTLS] ported from cloudflare/go
|
||||||
}
|
}
|
||||||
if testingOnlyForceClientHelloSignatureAlgorithms != nil {
|
if testingOnlyForceClientHelloSignatureAlgorithms != nil {
|
||||||
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// var key *ecdh.PrivateKey
|
||||||
var secret clientKeySharePrivate // [UTLS]
|
var secret clientKeySharePrivate // [UTLS]
|
||||||
if hello.supportedVersions[0] == VersionTLS13 {
|
if hello.supportedVersions[0] == VersionTLS13 {
|
||||||
// Reset the list of ciphers when the client only supports TLS 1.3.
|
// Reset the list of ciphers when the client only supports TLS 1.3.
|
||||||
if len(hello.supportedVersions) == 1 {
|
if len(hello.supportedVersions) == 1 {
|
||||||
hello.cipherSuites = nil
|
hello.cipherSuites = nil
|
||||||
}
|
}
|
||||||
if hasAESGCMHardwareSupport {
|
if needFIPS() {
|
||||||
|
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13FIPS...)
|
||||||
|
} else if hasAESGCMHardwareSupport {
|
||||||
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13...)
|
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13...)
|
||||||
} else {
|
} else {
|
||||||
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13NoAES...)
|
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13NoAES...)
|
||||||
|
@ -201,7 +206,8 @@ func (c *Conn) clientHandshake(ctx context.Context) (err error) {
|
||||||
// need to be reset.
|
// need to be reset.
|
||||||
c.didResume = false
|
c.didResume = false
|
||||||
|
|
||||||
hello, keySharePrivate, err := c.makeClientHello()
|
// hello, ecdheKey, err := c.makeClientHello()
|
||||||
|
hello, keySharePrivate, err := c.makeClientHello() // [uTLS] using keySharePrivate instead of ecdheKey
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -275,7 +281,7 @@ func (c *Conn) clientHandshake(ctx context.Context) (err error) {
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
serverHello: serverHello,
|
serverHello: serverHello,
|
||||||
hello: hello,
|
hello: hello,
|
||||||
// ecdheKey: ecdheKey,
|
// ecdheKey: ecdheKey, // [uTLS]
|
||||||
session: session,
|
session: session,
|
||||||
earlySecret: earlySecret,
|
earlySecret: earlySecret,
|
||||||
binderKey: binderKey,
|
binderKey: binderKey,
|
||||||
|
@ -471,6 +477,7 @@ func (c *Conn) loadSession(hello *clientHelloMsg) (
|
||||||
if err := hello.updateBinders(pskBinders); err != nil {
|
if err := hello.updateBinders(pskBinders); err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -586,6 +593,10 @@ func (hs *clientHandshakeState) pickCipherSuite() error {
|
||||||
return errors.New("tls: server chose an unconfigured cipher suite")
|
return errors.New("tls: server chose an unconfigured cipher suite")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if hs.c.config.CipherSuites == nil && rsaKexCiphers[hs.suite.id] {
|
||||||
|
tlsrsakex.IncNonDefault()
|
||||||
|
}
|
||||||
|
|
||||||
hs.c.cipherSuite = hs.suite.id
|
hs.c.cipherSuite = hs.suite.id
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -1002,9 +1013,23 @@ func (hs *clientHandshakeState) sendFinished(out []byte) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// maxRSAKeySize is the maximum RSA key size in bits that we are willing
|
// defaultMaxRSAKeySize is the maximum RSA key size in bits that we are willing
|
||||||
// to verify the signatures of during a TLS handshake.
|
// to verify the signatures of during a TLS handshake.
|
||||||
const maxRSAKeySize = 8192
|
const defaultMaxRSAKeySize = 8192
|
||||||
|
|
||||||
|
var tlsmaxrsasize = godebug.New("tlsmaxrsasize")
|
||||||
|
|
||||||
|
func checkKeySize(n int) (max int, ok bool) {
|
||||||
|
if v := tlsmaxrsasize.Value(); v != "" {
|
||||||
|
if max, err := strconv.Atoi(v); err == nil {
|
||||||
|
if (n <= max) != (n <= defaultMaxRSAKeySize) {
|
||||||
|
tlsmaxrsasize.IncNonDefault()
|
||||||
|
}
|
||||||
|
return max, n <= max
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return defaultMaxRSAKeySize, n <= defaultMaxRSAKeySize
|
||||||
|
}
|
||||||
|
|
||||||
// verifyServerCertificate parses and verifies the provided chain, setting
|
// verifyServerCertificate parses and verifies the provided chain, setting
|
||||||
// c.verifiedChains and c.peerCertificates or sending the appropriate alert.
|
// c.verifiedChains and c.peerCertificates or sending the appropriate alert.
|
||||||
|
@ -1017,9 +1042,12 @@ func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
|
||||||
c.sendAlert(alertBadCertificate)
|
c.sendAlert(alertBadCertificate)
|
||||||
return errors.New("tls: failed to parse certificate from server: " + err.Error())
|
return errors.New("tls: failed to parse certificate from server: " + err.Error())
|
||||||
}
|
}
|
||||||
if cert.cert.PublicKeyAlgorithm == x509.RSA && cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize {
|
if cert.cert.PublicKeyAlgorithm == x509.RSA {
|
||||||
c.sendAlert(alertBadCertificate)
|
n := cert.cert.PublicKey.(*rsa.PublicKey).N.BitLen()
|
||||||
return fmt.Errorf("tls: server sent certificate containing RSA key larger than %d bits", maxRSAKeySize)
|
if max, ok := checkKeySize(n); !ok {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return fmt.Errorf("tls: server sent certificate containing RSA key larger than %d bits", max)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
activeHandles[i] = cert
|
activeHandles[i] = cert
|
||||||
certs[i] = cert.cert
|
certs[i] = cert.cert
|
||||||
|
|
|
@ -87,7 +87,7 @@ type clientHandshakeStateTLS13 struct {
|
||||||
session *SessionState
|
session *SessionState
|
||||||
earlySecret []byte
|
earlySecret []byte
|
||||||
binderKey []byte
|
binderKey []byte
|
||||||
selectedGroup CurveID
|
selectedGroup CurveID // [uTLS] ported from cloudflare/go
|
||||||
|
|
||||||
certReq *certificateRequestMsgTLS13
|
certReq *certificateRequestMsgTLS13
|
||||||
usingPSK bool
|
usingPSK bool
|
||||||
|
|
|
@ -171,6 +171,10 @@ func (c *Conn) readClientHello(ctx context.Context) (*clientHelloMsg, error) {
|
||||||
c.in.version = c.vers
|
c.in.version = c.vers
|
||||||
c.out.version = c.vers
|
c.out.version = c.vers
|
||||||
|
|
||||||
|
if c.config.MinVersion == 0 && c.vers < VersionTLS12 {
|
||||||
|
tls10server.IncNonDefault()
|
||||||
|
}
|
||||||
|
|
||||||
return clientHello, nil
|
return clientHello, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -369,6 +373,10 @@ func (hs *serverHandshakeState) pickCipherSuite() error {
|
||||||
}
|
}
|
||||||
c.cipherSuite = hs.suite.id
|
c.cipherSuite = hs.suite.id
|
||||||
|
|
||||||
|
if c.config.CipherSuites == nil && rsaKexCiphers[hs.suite.id] {
|
||||||
|
tlsrsakex.IncNonDefault()
|
||||||
|
}
|
||||||
|
|
||||||
for _, id := range hs.clientHello.cipherSuites {
|
for _, id := range hs.clientHello.cipherSuites {
|
||||||
if id == TLS_FALLBACK_SCSV {
|
if id == TLS_FALLBACK_SCSV {
|
||||||
// The client is doing a fallback connection. See RFC 7507.
|
// The client is doing a fallback connection. See RFC 7507.
|
||||||
|
@ -870,9 +878,12 @@ func (c *Conn) processCertsFromClient(certificate Certificate) error {
|
||||||
c.sendAlert(alertBadCertificate)
|
c.sendAlert(alertBadCertificate)
|
||||||
return errors.New("tls: failed to parse client certificate: " + err.Error())
|
return errors.New("tls: failed to parse client certificate: " + err.Error())
|
||||||
}
|
}
|
||||||
if certs[i].PublicKeyAlgorithm == x509.RSA && certs[i].PublicKey.(*rsa.PublicKey).N.BitLen() > maxRSAKeySize {
|
if certs[i].PublicKeyAlgorithm == x509.RSA {
|
||||||
c.sendAlert(alertBadCertificate)
|
n := certs[i].PublicKey.(*rsa.PublicKey).N.BitLen()
|
||||||
return fmt.Errorf("tls: client sent certificate containing RSA key larger than %d bits", maxRSAKeySize)
|
if max, ok := checkKeySize(n); !ok {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return fmt.Errorf("tls: client sent certificate containing RSA key larger than %d bits", max)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -27,6 +27,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func testClientHello(t *testing.T, serverConfig *Config, m handshakeMessage) {
|
func testClientHello(t *testing.T, serverConfig *Config, m handshakeMessage) {
|
||||||
|
t.Helper()
|
||||||
testClientHelloFailure(t, serverConfig, m, "")
|
testClientHelloFailure(t, serverConfig, m, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -52,23 +53,32 @@ func testClientHelloFailure(t *testing.T, serverConfig *Config, m handshakeMessa
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
conn := Server(s, serverConfig)
|
conn := Server(s, serverConfig)
|
||||||
ch, err := conn.readClientHello(ctx)
|
ch, err := conn.readClientHello(ctx)
|
||||||
hs := serverHandshakeState{
|
if err == nil && conn.vers == VersionTLS13 {
|
||||||
c: conn,
|
hs := serverHandshakeStateTLS13{
|
||||||
ctx: ctx,
|
c: conn,
|
||||||
clientHello: ch,
|
ctx: ctx,
|
||||||
}
|
clientHello: ch,
|
||||||
if err == nil {
|
}
|
||||||
err = hs.processClientHello()
|
err = hs.processClientHello()
|
||||||
}
|
} else if err == nil {
|
||||||
if err == nil {
|
hs := serverHandshakeState{
|
||||||
err = hs.pickCipherSuite()
|
c: conn,
|
||||||
|
ctx: ctx,
|
||||||
|
clientHello: ch,
|
||||||
|
}
|
||||||
|
err = hs.processClientHello()
|
||||||
|
if err == nil {
|
||||||
|
err = hs.pickCipherSuite()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
s.Close()
|
s.Close()
|
||||||
if len(expectedSubStr) == 0 {
|
if len(expectedSubStr) == 0 {
|
||||||
if err != nil && err != io.EOF {
|
if err != nil && err != io.EOF {
|
||||||
|
t.Helper()
|
||||||
t.Errorf("Got error: %s; expected to succeed", err)
|
t.Errorf("Got error: %s; expected to succeed", err)
|
||||||
}
|
}
|
||||||
} else if err == nil || !strings.Contains(err.Error(), expectedSubStr) {
|
} else if err == nil || !strings.Contains(err.Error(), expectedSubStr) {
|
||||||
|
t.Helper()
|
||||||
t.Errorf("Got error: %v; expected to match substring '%s'", err, expectedSubStr)
|
t.Errorf("Got error: %v; expected to match substring '%s'", err, expectedSubStr)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -389,21 +399,22 @@ func TestClose(t *testing.T) {
|
||||||
func TestVersion(t *testing.T) {
|
func TestVersion(t *testing.T) {
|
||||||
serverConfig := &Config{
|
serverConfig := &Config{
|
||||||
Certificates: testConfig.Certificates,
|
Certificates: testConfig.Certificates,
|
||||||
MaxVersion: VersionTLS11,
|
MaxVersion: VersionTLS13,
|
||||||
}
|
}
|
||||||
clientConfig := &Config{
|
clientConfig := &Config{
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
MinVersion: VersionTLS10,
|
MinVersion: VersionTLS12,
|
||||||
}
|
}
|
||||||
state, _, err := testHandshake(t, clientConfig, serverConfig)
|
state, _, err := testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
}
|
}
|
||||||
if state.Version != VersionTLS11 {
|
if state.Version != VersionTLS13 {
|
||||||
t.Fatalf("incorrect version %x, should be %x", state.Version, VersionTLS11)
|
t.Fatalf("incorrect version %x, should be %x", state.Version, VersionTLS11)
|
||||||
}
|
}
|
||||||
|
|
||||||
clientConfig.MinVersion = 0
|
clientConfig.MinVersion = 0
|
||||||
|
serverConfig.MaxVersion = VersionTLS11
|
||||||
_, _, err = testHandshake(t, clientConfig, serverConfig)
|
_, _, err = testHandshake(t, clientConfig, serverConfig)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.Fatalf("expected failure to connect with TLS 1.0/1.1")
|
t.Fatalf("expected failure to connect with TLS 1.0/1.1")
|
||||||
|
@ -487,17 +498,17 @@ func testCrossVersionResume(t *testing.T, version uint16) {
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
ClientSessionCache: NewLRUClientSessionCache(1),
|
ClientSessionCache: NewLRUClientSessionCache(1),
|
||||||
ServerName: "servername",
|
ServerName: "servername",
|
||||||
MinVersion: VersionTLS10,
|
MinVersion: VersionTLS12,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Establish a session at TLS 1.1.
|
// Establish a session at TLS 1.3.
|
||||||
clientConfig.MaxVersion = VersionTLS11
|
clientConfig.MaxVersion = VersionTLS13
|
||||||
_, _, err := testHandshake(t, clientConfig, serverConfig)
|
_, _, err := testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// The client session cache now contains a TLS 1.1 session.
|
// The client session cache now contains a TLS 1.3 session.
|
||||||
state, _, err := testHandshake(t, clientConfig, serverConfig)
|
state, _, err := testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
|
@ -507,7 +518,7 @@ func testCrossVersionResume(t *testing.T, version uint16) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Test that the server will decline to resume at a lower version.
|
// Test that the server will decline to resume at a lower version.
|
||||||
clientConfig.MaxVersion = VersionTLS10
|
clientConfig.MaxVersion = VersionTLS12
|
||||||
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
|
@ -516,7 +527,7 @@ func testCrossVersionResume(t *testing.T, version uint16) {
|
||||||
t.Fatalf("handshake resumed at a lower version")
|
t.Fatalf("handshake resumed at a lower version")
|
||||||
}
|
}
|
||||||
|
|
||||||
// The client session cache now contains a TLS 1.0 session.
|
// The client session cache now contains a TLS 1.2 session.
|
||||||
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
|
@ -526,7 +537,7 @@ func testCrossVersionResume(t *testing.T, version uint16) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Test that the server will decline to resume at a higher version.
|
// Test that the server will decline to resume at a higher version.
|
||||||
clientConfig.MaxVersion = VersionTLS11
|
clientConfig.MaxVersion = VersionTLS13
|
||||||
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
state, _, err = testHandshake(t, clientConfig, serverConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("handshake failed: %s", err)
|
t.Fatalf("handshake failed: %s", err)
|
||||||
|
@ -1170,6 +1181,7 @@ func TestServerResumptionDisabled(t *testing.T) {
|
||||||
func TestFallbackSCSV(t *testing.T) {
|
func TestFallbackSCSV(t *testing.T) {
|
||||||
serverConfig := Config{
|
serverConfig := Config{
|
||||||
Certificates: testConfig.Certificates,
|
Certificates: testConfig.Certificates,
|
||||||
|
MinVersion: VersionTLS11,
|
||||||
}
|
}
|
||||||
test := &serverTest{
|
test := &serverTest{
|
||||||
name: "FallbackSCSV",
|
name: "FallbackSCSV",
|
||||||
|
|
|
@ -165,6 +165,9 @@ func (hs *serverHandshakeStateTLS13) processClientHello() error {
|
||||||
if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
|
if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
|
||||||
preferenceList = defaultCipherSuitesTLS13NoAES
|
preferenceList = defaultCipherSuitesTLS13NoAES
|
||||||
}
|
}
|
||||||
|
if needFIPS() {
|
||||||
|
preferenceList = defaultCipherSuitesTLS13FIPS
|
||||||
|
}
|
||||||
for _, suiteID := range preferenceList {
|
for _, suiteID := range preferenceList {
|
||||||
hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
|
hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
|
||||||
if hs.suite != nil {
|
if hs.suite != nil {
|
||||||
|
@ -213,6 +216,8 @@ GroupSelection:
|
||||||
clientKeyShare = &hs.clientHello.keyShares[0]
|
clientKeyShare = &hs.clientHello.keyShares[0]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// [uTLS SECTION BEGIN]
|
||||||
|
// ported from cloudflare/go
|
||||||
if _, ok := curveForCurveID(selectedGroup); selectedGroup != X25519 && curveIdToCirclScheme(selectedGroup) == nil && !ok {
|
if _, ok := curveForCurveID(selectedGroup); selectedGroup != X25519 && curveIdToCirclScheme(selectedGroup) == nil && !ok {
|
||||||
c.sendAlert(alertInternalError)
|
c.sendAlert(alertInternalError)
|
||||||
return errors.New("tls: CurvePreferences includes unsupported curve")
|
return errors.New("tls: CurvePreferences includes unsupported curve")
|
||||||
|
@ -241,6 +246,35 @@ GroupSelection:
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: invalid client key share")
|
return errors.New("tls: invalid client key share")
|
||||||
}
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
|
|
||||||
|
selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertNoApplicationProtocol)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.clientProtocol = selectedProto
|
||||||
|
|
||||||
|
if c.quic != nil {
|
||||||
|
// RFC 9001 Section 4.2: Clients MUST NOT offer TLS versions older than 1.3.
|
||||||
|
for _, v := range hs.clientHello.supportedVersions {
|
||||||
|
if v < VersionTLS13 {
|
||||||
|
c.sendAlert(alertProtocolVersion)
|
||||||
|
return errors.New("tls: client offered TLS version older than TLS 1.3")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// RFC 9001 Section 8.2.
|
||||||
|
if hs.clientHello.quicTransportParameters == nil {
|
||||||
|
c.sendAlert(alertMissingExtension)
|
||||||
|
return errors.New("tls: client did not send a quic_transport_parameters extension")
|
||||||
|
}
|
||||||
|
c.quicSetTransportParameters(hs.clientHello.quicTransportParameters)
|
||||||
|
} else {
|
||||||
|
if hs.clientHello.quicTransportParameters != nil {
|
||||||
|
c.sendAlert(alertUnsupportedExtension)
|
||||||
|
return errors.New("tls: client sent an unexpected quic_transport_parameters extension")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
|
selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -169,7 +169,7 @@ type ecdheKeyAgreement struct {
|
||||||
func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
|
func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
|
||||||
var curveID CurveID
|
var curveID CurveID
|
||||||
for _, c := range clientHello.supportedCurves {
|
for _, c := range clientHello.supportedCurves {
|
||||||
if config.supportsCurve(c) && curveIdToCirclScheme(c) == nil {
|
if config.supportsCurve(c) && curveIdToCirclScheme(c) == nil { // [uTLS] ported from cloudflare/go
|
||||||
curveID = c
|
curveID = c
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,3 +15,5 @@ func fipsCurvePreferences(c *Config) []CurveID { panic("fipsCurvePreferences") }
|
||||||
func fipsCipherSuites(c *Config) []uint16 { panic("fipsCipherSuites") }
|
func fipsCipherSuites(c *Config) []uint16 { panic("fipsCipherSuites") }
|
||||||
|
|
||||||
var fipsSupportedSignatureAlgorithms []SignatureScheme
|
var fipsSupportedSignatureAlgorithms []SignatureScheme
|
||||||
|
|
||||||
|
var defaultCipherSuitesTLS13FIPS []uint16
|
||||||
|
|
11
prf.go
11
prf.go
|
@ -252,13 +252,20 @@ func (h *finishedHash) discardHandshakeBuffer() {
|
||||||
h.buffer = nil
|
h.buffer = nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// noExportedKeyingMaterial is used as a value of
|
// noEKMBecauseRenegotiation is used as a value of
|
||||||
// ConnectionState.ekm when renegotiation is enabled and thus
|
// ConnectionState.ekm when renegotiation is enabled and thus
|
||||||
// we wish to fail all key-material export requests.
|
// we wish to fail all key-material export requests.
|
||||||
func noExportedKeyingMaterial(label string, context []byte, length int) ([]byte, error) {
|
func noEKMBecauseRenegotiation(label string, context []byte, length int) ([]byte, error) {
|
||||||
return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
|
return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// noEKMBecauseNoEMS is used as a value of ConnectionState.ekm when Extended
|
||||||
|
// Master Secret is not negotiated and thus we wish to fail all key-material
|
||||||
|
// export requests.
|
||||||
|
func noEKMBecauseNoEMS(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when neither TLS 1.3 nor Extended Master Secret are negotiated; override with GODEBUG=tlsunsafeekm=1")
|
||||||
|
}
|
||||||
|
|
||||||
// ekmFromMasterSecret generates exported keying material as defined in RFC 5705.
|
// ekmFromMasterSecret generates exported keying material as defined in RFC 5705.
|
||||||
func ekmFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte) func(string, []byte, int) ([]byte, error) {
|
func ekmFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte) func(string, []byte, int) ([]byte, error) {
|
||||||
return func(label string, context []byte, length int) ([]byte, error) {
|
return func(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
|
12
quic.go
12
quic.go
|
@ -46,7 +46,7 @@ type QUICConn struct {
|
||||||
sessionTicketSent bool
|
sessionTicketSent bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// A QUICConfig configures a QUICConn.
|
// A QUICConfig configures a [QUICConn].
|
||||||
type QUICConfig struct {
|
type QUICConfig struct {
|
||||||
TLSConfig *Config
|
TLSConfig *Config
|
||||||
}
|
}
|
||||||
|
@ -163,7 +163,7 @@ func newQUICConn(conn *Conn) *QUICConn {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Start starts the client or server handshake protocol.
|
// Start starts the client or server handshake protocol.
|
||||||
// It may produce connection events, which may be read with NextEvent.
|
// It may produce connection events, which may be read with [QUICConn.NextEvent].
|
||||||
//
|
//
|
||||||
// Start must be called at most once.
|
// Start must be called at most once.
|
||||||
func (q *QUICConn) Start(ctx context.Context) error {
|
func (q *QUICConn) Start(ctx context.Context) error {
|
||||||
|
@ -182,7 +182,7 @@ func (q *QUICConn) Start(ctx context.Context) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// NextEvent returns the next event occurring on the connection.
|
// NextEvent returns the next event occurring on the connection.
|
||||||
// It returns an event with a Kind of QUICNoEvent when no events are available.
|
// It returns an event with a Kind of [QUICNoEvent] when no events are available.
|
||||||
func (q *QUICConn) NextEvent() QUICEvent {
|
func (q *QUICConn) NextEvent() QUICEvent {
|
||||||
qs := q.conn.quic
|
qs := q.conn.quic
|
||||||
if last := qs.nextEvent - 1; last >= 0 && len(qs.events[last].Data) > 0 {
|
if last := qs.nextEvent - 1; last >= 0 && len(qs.events[last].Data) > 0 {
|
||||||
|
@ -214,7 +214,7 @@ func (q *QUICConn) Close() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// HandleData handles handshake bytes received from the peer.
|
// HandleData handles handshake bytes received from the peer.
|
||||||
// It may produce connection events, which may be read with NextEvent.
|
// It may produce connection events, which may be read with [QUICConn.NextEvent].
|
||||||
func (q *QUICConn) HandleData(level QUICEncryptionLevel, data []byte) error {
|
func (q *QUICConn) HandleData(level QUICEncryptionLevel, data []byte) error {
|
||||||
c := q.conn
|
c := q.conn
|
||||||
if c.in.level != level {
|
if c.in.level != level {
|
||||||
|
@ -258,7 +258,7 @@ type QUICSessionTicketOptions struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// SendSessionTicket sends a session ticket to the client.
|
// SendSessionTicket sends a session ticket to the client.
|
||||||
// It produces connection events, which may be read with NextEvent.
|
// It produces connection events, which may be read with [QUICConn.NextEvent].
|
||||||
// Currently, it can only be called once.
|
// Currently, it can only be called once.
|
||||||
func (q *QUICConn) SendSessionTicket(opts QUICSessionTicketOptions) error {
|
func (q *QUICConn) SendSessionTicket(opts QUICSessionTicketOptions) error {
|
||||||
c := q.conn
|
c := q.conn
|
||||||
|
@ -283,7 +283,7 @@ func (q *QUICConn) ConnectionState() ConnectionState {
|
||||||
// SetTransportParameters sets the transport parameters to send to the peer.
|
// SetTransportParameters sets the transport parameters to send to the peer.
|
||||||
//
|
//
|
||||||
// Server connections may delay setting the transport parameters until after
|
// Server connections may delay setting the transport parameters until after
|
||||||
// receiving the client's transport parameters. See QUICTransportParametersRequired.
|
// receiving the client's transport parameters. See [QUICTransportParametersRequired].
|
||||||
func (q *QUICConn) SetTransportParameters(params []byte) {
|
func (q *QUICConn) SetTransportParameters(params []byte) {
|
||||||
if params == nil {
|
if params == nil {
|
||||||
params = []byte{}
|
params = []byte{}
|
||||||
|
|
|
@ -69,7 +69,7 @@ type SessionState struct {
|
||||||
// To allow different layers in a protocol stack to share this field,
|
// To allow different layers in a protocol stack to share this field,
|
||||||
// applications must only append to it, not replace it, and must use entries
|
// applications must only append to it, not replace it, and must use entries
|
||||||
// that can be recognized even if out of order (for example, by starting
|
// that can be recognized even if out of order (for example, by starting
|
||||||
// with a id and version prefix).
|
// with an id and version prefix).
|
||||||
Extra [][]byte
|
Extra [][]byte
|
||||||
|
|
||||||
// EarlyData indicates whether the ticket can be used for 0-RTT in a QUIC
|
// EarlyData indicates whether the ticket can be used for 0-RTT in a QUIC
|
||||||
|
@ -305,7 +305,7 @@ func (c *Conn) sessionState() (*SessionState, error) {
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// EncryptTicket encrypts a ticket with the Config's configured (or default)
|
// EncryptTicket encrypts a ticket with the [Config]'s configured (or default)
|
||||||
// session ticket keys. It can be used as a [Config.WrapSession] implementation.
|
// session ticket keys. It can be used as a [Config.WrapSession] implementation.
|
||||||
func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) {
|
func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) {
|
||||||
ticketKeys := c.ticketKeys(nil)
|
ticketKeys := c.ticketKeys(nil)
|
||||||
|
|
14
tls.go
14
tls.go
|
@ -73,7 +73,7 @@ func (l *listener) Accept() (net.Conn, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewListener creates a Listener which accepts connections from an inner
|
// NewListener creates a Listener which accepts connections from an inner
|
||||||
// Listener and wraps each connection with Server.
|
// Listener and wraps each connection with [Server].
|
||||||
// The configuration config must be non-nil and must include
|
// The configuration config must be non-nil and must include
|
||||||
// at least one certificate or else set GetCertificate.
|
// at least one certificate or else set GetCertificate.
|
||||||
func NewListener(inner net.Listener, config *Config) net.Listener {
|
func NewListener(inner net.Listener, config *Config) net.Listener {
|
||||||
|
@ -111,10 +111,10 @@ func (timeoutError) Temporary() bool { return true }
|
||||||
// handshake as a whole.
|
// handshake as a whole.
|
||||||
//
|
//
|
||||||
// DialWithDialer interprets a nil configuration as equivalent to the zero
|
// DialWithDialer interprets a nil configuration as equivalent to the zero
|
||||||
// configuration; see the documentation of Config for the defaults.
|
// configuration; see the documentation of [Config] for the defaults.
|
||||||
//
|
//
|
||||||
// DialWithDialer uses context.Background internally; to specify the context,
|
// DialWithDialer uses context.Background internally; to specify the context,
|
||||||
// use Dialer.DialContext with NetDialer set to the desired dialer.
|
// use [Dialer.DialContext] with NetDialer set to the desired dialer.
|
||||||
func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
|
func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
|
||||||
return dial(context.Background(), dialer, network, addr, config)
|
return dial(context.Background(), dialer, network, addr, config)
|
||||||
}
|
}
|
||||||
|
@ -191,10 +191,10 @@ type Dialer struct {
|
||||||
// Dial connects to the given network address and initiates a TLS
|
// Dial connects to the given network address and initiates a TLS
|
||||||
// handshake, returning the resulting TLS connection.
|
// handshake, returning the resulting TLS connection.
|
||||||
//
|
//
|
||||||
// The returned Conn, if any, will always be of type *Conn.
|
// The returned [Conn], if any, will always be of type *[Conn].
|
||||||
//
|
//
|
||||||
// Dial uses context.Background internally; to specify the context,
|
// Dial uses context.Background internally; to specify the context,
|
||||||
// use DialContext.
|
// use [Dialer.DialContext].
|
||||||
func (d *Dialer) Dial(network, addr string) (net.Conn, error) {
|
func (d *Dialer) Dial(network, addr string) (net.Conn, error) {
|
||||||
return d.DialContext(context.Background(), network, addr)
|
return d.DialContext(context.Background(), network, addr)
|
||||||
}
|
}
|
||||||
|
@ -214,7 +214,7 @@ func (d *Dialer) netDialer() *net.Dialer {
|
||||||
// connected, any expiration of the context will not affect the
|
// connected, any expiration of the context will not affect the
|
||||||
// connection.
|
// connection.
|
||||||
//
|
//
|
||||||
// The returned Conn, if any, will always be of type *Conn.
|
// The returned [Conn], if any, will always be of type *[Conn].
|
||||||
func (d *Dialer) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {
|
func (d *Dialer) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {
|
||||||
c, err := dial(ctx, d.netDialer(), network, addr, d.Config)
|
c, err := dial(ctx, d.netDialer(), network, addr, d.Config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -358,7 +358,7 @@ func parsePrivateKey(der []byte) (crypto.PrivateKey, error) {
|
||||||
}
|
}
|
||||||
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil {
|
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil {
|
||||||
switch key := key.(type) {
|
switch key := key.(type) {
|
||||||
case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey, circlSign.PrivateKey:
|
case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey, circlSign.PrivateKey: // [uTLS] ported from cloudflare/go
|
||||||
return key, nil
|
return key, nil
|
||||||
default:
|
default:
|
||||||
return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
|
return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
|
||||||
|
|
39
tls_test.go
39
tls_test.go
|
@ -1297,7 +1297,8 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
||||||
SignatureSchemes: []SignatureScheme{PKCS1WithSHA1},
|
SignatureSchemes: []SignatureScheme{PKCS1WithSHA1},
|
||||||
SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
|
SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
|
||||||
config: &Config{
|
config: &Config{
|
||||||
MaxVersion: VersionTLS12,
|
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
||||||
|
MaxVersion: VersionTLS12,
|
||||||
},
|
},
|
||||||
}, ""}, // Check that mutual version selection works.
|
}, ""}, // Check that mutual version selection works.
|
||||||
|
|
||||||
|
@ -1374,6 +1375,7 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
||||||
SupportedPoints: []uint8{pointFormatUncompressed},
|
SupportedPoints: []uint8{pointFormatUncompressed},
|
||||||
SignatureSchemes: []SignatureScheme{Ed25519},
|
SignatureSchemes: []SignatureScheme{Ed25519},
|
||||||
SupportedVersions: []uint16{VersionTLS10},
|
SupportedVersions: []uint16{VersionTLS10},
|
||||||
|
config: &Config{MinVersion: VersionTLS10},
|
||||||
}, "doesn't support Ed25519"},
|
}, "doesn't support Ed25519"},
|
||||||
{ed25519Cert, &ClientHelloInfo{
|
{ed25519Cert, &ClientHelloInfo{
|
||||||
CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
|
CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
|
||||||
|
@ -1388,10 +1390,14 @@ func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
||||||
SupportedCurves: []CurveID{CurveP256}, // only relevant for ECDHE support
|
SupportedCurves: []CurveID{CurveP256}, // only relevant for ECDHE support
|
||||||
SupportedPoints: []uint8{pointFormatUncompressed},
|
SupportedPoints: []uint8{pointFormatUncompressed},
|
||||||
SupportedVersions: []uint16{VersionTLS10},
|
SupportedVersions: []uint16{VersionTLS10},
|
||||||
|
config: &Config{MinVersion: VersionTLS10},
|
||||||
}, ""},
|
}, ""},
|
||||||
{rsaCert, &ClientHelloInfo{
|
{rsaCert, &ClientHelloInfo{
|
||||||
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
||||||
SupportedVersions: []uint16{VersionTLS12},
|
SupportedVersions: []uint16{VersionTLS12},
|
||||||
|
config: &Config{
|
||||||
|
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
|
||||||
|
},
|
||||||
}, ""}, // static RSA fallback
|
}, ""}, // static RSA fallback
|
||||||
}
|
}
|
||||||
for i, tt := range tests {
|
for i, tt := range tests {
|
||||||
|
@ -1493,24 +1499,21 @@ func TestCipherSuites(t *testing.T) {
|
||||||
if len(cipherSuitesPreferenceOrderNoAES) != len(cipherSuitesPreferenceOrder) {
|
if len(cipherSuitesPreferenceOrderNoAES) != len(cipherSuitesPreferenceOrder) {
|
||||||
t.Errorf("cipherSuitesPreferenceOrderNoAES is not the same size as cipherSuitesPreferenceOrder")
|
t.Errorf("cipherSuitesPreferenceOrderNoAES is not the same size as cipherSuitesPreferenceOrder")
|
||||||
}
|
}
|
||||||
|
if len(defaultCipherSuites) >= len(defaultCipherSuitesWithRSAKex) {
|
||||||
|
t.Errorf("defaultCipherSuitesWithRSAKex should be longer than defaultCipherSuites")
|
||||||
|
}
|
||||||
|
|
||||||
// Check that disabled suites are at the end of the preference lists, and
|
// Check that disabled suites are marked insecure.
|
||||||
// that they are marked insecure.
|
for _, badSuites := range []map[uint16]bool{disabledCipherSuites, rsaKexCiphers} {
|
||||||
for i, id := range disabledCipherSuites {
|
for id := range badSuites {
|
||||||
offset := len(cipherSuitesPreferenceOrder) - len(disabledCipherSuites)
|
c := CipherSuiteByID(id)
|
||||||
if cipherSuitesPreferenceOrder[offset+i] != id {
|
if c == nil {
|
||||||
t.Errorf("disabledCipherSuites[%d]: not at the end of cipherSuitesPreferenceOrder", i)
|
t.Errorf("%#04x: no CipherSuite entry", id)
|
||||||
}
|
continue
|
||||||
if cipherSuitesPreferenceOrderNoAES[offset+i] != id {
|
}
|
||||||
t.Errorf("disabledCipherSuites[%d]: not at the end of cipherSuitesPreferenceOrderNoAES", i)
|
if !c.Insecure {
|
||||||
}
|
t.Errorf("%#04x: disabled by default but not marked insecure", id)
|
||||||
c := CipherSuiteByID(id)
|
}
|
||||||
if c == nil {
|
|
||||||
t.Errorf("%#04x: no CipherSuite entry", id)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if !c.Insecure {
|
|
||||||
t.Errorf("%#04x: disabled by default but not marked insecure", id)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue