HandshakeClient.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495
  1. /*
  2. * Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
  3. * Copyright (c) 2022, Michiel Visser <opensource@webmichiel.nl>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/Debug.h>
  8. #include <AK/Hex.h>
  9. #include <AK/Random.h>
  10. #include <LibCrypto/ASN1/DER.h>
  11. #include <LibCrypto/BigInt/UnsignedBigInteger.h>
  12. #include <LibCrypto/Curves/X25519.h>
  13. #include <LibCrypto/Curves/X448.h>
  14. #include <LibCrypto/NumberTheory/ModularFunctions.h>
  15. #include <LibCrypto/PK/Code/EMSA_PSS.h>
  16. #include <LibTLS/TLSv12.h>
  17. namespace TLS {
  18. bool TLSv12::expand_key()
  19. {
  20. u8 key[192]; // soooooooo many constants
  21. auto key_buffer = Bytes { key, sizeof(key) };
  22. auto is_aead = this->is_aead();
  23. if (m_context.master_key.size() == 0) {
  24. dbgln("expand_key() with empty master key");
  25. return false;
  26. }
  27. auto key_size = key_length();
  28. VERIFY(key_size);
  29. auto mac_size = mac_length();
  30. auto iv_size = iv_length();
  31. pseudorandom_function(
  32. key_buffer,
  33. m_context.master_key,
  34. (const u8*)"key expansion", 13,
  35. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) },
  36. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) });
  37. size_t offset = 0;
  38. if (is_aead) {
  39. iv_size = 4; // Explicit IV size.
  40. } else {
  41. memcpy(m_context.crypto.local_mac, key + offset, mac_size);
  42. offset += mac_size;
  43. memcpy(m_context.crypto.remote_mac, key + offset, mac_size);
  44. offset += mac_size;
  45. }
  46. auto client_key = key + offset;
  47. offset += key_size;
  48. auto server_key = key + offset;
  49. offset += key_size;
  50. auto client_iv = key + offset;
  51. offset += iv_size;
  52. auto server_iv = key + offset;
  53. offset += iv_size;
  54. if constexpr (TLS_DEBUG) {
  55. dbgln("client key");
  56. print_buffer(client_key, key_size);
  57. dbgln("server key");
  58. print_buffer(server_key, key_size);
  59. dbgln("client iv");
  60. print_buffer(client_iv, iv_size);
  61. dbgln("server iv");
  62. print_buffer(server_iv, iv_size);
  63. if (!is_aead) {
  64. dbgln("client mac key");
  65. print_buffer(m_context.crypto.local_mac, mac_size);
  66. dbgln("server mac key");
  67. print_buffer(m_context.crypto.remote_mac, mac_size);
  68. }
  69. }
  70. switch (get_cipher_algorithm(m_context.cipher)) {
  71. case CipherAlgorithm::AES_128_CBC:
  72. case CipherAlgorithm::AES_256_CBC: {
  73. VERIFY(!is_aead);
  74. memcpy(m_context.crypto.local_iv, client_iv, iv_size);
  75. memcpy(m_context.crypto.remote_iv, server_iv, iv_size);
  76. m_cipher_local = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  77. m_cipher_remote = Crypto::Cipher::AESCipher::CBCMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  78. break;
  79. }
  80. case CipherAlgorithm::AES_128_GCM:
  81. case CipherAlgorithm::AES_256_GCM: {
  82. VERIFY(is_aead);
  83. memcpy(m_context.crypto.local_aead_iv, client_iv, iv_size);
  84. memcpy(m_context.crypto.remote_aead_iv, server_iv, iv_size);
  85. m_cipher_local = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { client_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Encryption, Crypto::Cipher::PaddingMode::RFC5246);
  86. m_cipher_remote = Crypto::Cipher::AESCipher::GCMMode(ReadonlyBytes { server_key, key_size }, key_size * 8, Crypto::Cipher::Intent::Decryption, Crypto::Cipher::PaddingMode::RFC5246);
  87. break;
  88. }
  89. case CipherAlgorithm::AES_128_CCM:
  90. dbgln("Requested unimplemented AES CCM cipher");
  91. TODO();
  92. case CipherAlgorithm::AES_128_CCM_8:
  93. dbgln("Requested unimplemented AES CCM-8 block cipher");
  94. TODO();
  95. default:
  96. dbgln("Requested unknown block cipher");
  97. VERIFY_NOT_REACHED();
  98. }
  99. m_context.crypto.created = 1;
  100. return true;
  101. }
  102. bool TLSv12::compute_master_secret_from_pre_master_secret(size_t length)
  103. {
  104. if (m_context.premaster_key.size() == 0 || length < 48) {
  105. dbgln("there's no way I can make a master secret like this");
  106. dbgln("I'd like to talk to your manager about this length of {}", length);
  107. return false;
  108. }
  109. if (m_context.master_key.try_resize(length).is_error()) {
  110. dbgln("Couldn't allocate enough space for the master key :(");
  111. return false;
  112. }
  113. pseudorandom_function(
  114. m_context.master_key,
  115. m_context.premaster_key,
  116. (const u8*)"master secret", 13,
  117. ReadonlyBytes { m_context.local_random, sizeof(m_context.local_random) },
  118. ReadonlyBytes { m_context.remote_random, sizeof(m_context.remote_random) });
  119. m_context.premaster_key.clear();
  120. if constexpr (TLS_DEBUG) {
  121. dbgln("master key:");
  122. print_buffer(m_context.master_key);
  123. }
  124. if constexpr (TLS_SSL_KEYLOG_DEBUG) {
  125. auto file = MUST(Core::Stream::File::open("/home/anon/ssl_keylog", Core::Stream::OpenMode::Append | Core::Stream::OpenMode::Write));
  126. VERIFY(file->write_or_error("CLIENT_RANDOM "sv.bytes()));
  127. VERIFY(file->write_or_error(encode_hex({ m_context.local_random, 32 }).bytes()));
  128. VERIFY(file->write_or_error(" "sv.bytes()));
  129. VERIFY(file->write_or_error(encode_hex(m_context.master_key).bytes()));
  130. VERIFY(file->write_or_error("\n"sv.bytes()));
  131. }
  132. expand_key();
  133. return true;
  134. }
  135. static bool wildcard_matches(StringView host, StringView subject)
  136. {
  137. if (host.matches(subject))
  138. return true;
  139. if (subject.starts_with("*."))
  140. return wildcard_matches(host, subject.substring_view(2));
  141. return false;
  142. }
  143. Optional<size_t> TLSv12::verify_chain_and_get_matching_certificate(StringView host) const
  144. {
  145. if (m_context.certificates.is_empty() || !m_context.verify_chain())
  146. return {};
  147. if (host.is_empty())
  148. return 0;
  149. for (size_t i = 0; i < m_context.certificates.size(); ++i) {
  150. auto& cert = m_context.certificates[i];
  151. if (wildcard_matches(host, cert.subject.subject))
  152. return i;
  153. for (auto& san : cert.SAN) {
  154. if (wildcard_matches(host, san))
  155. return i;
  156. }
  157. }
  158. return {};
  159. }
  160. void TLSv12::build_rsa_pre_master_secret(PacketBuilder& builder)
  161. {
  162. u8 random_bytes[48];
  163. size_t bytes = 48;
  164. fill_with_random(random_bytes, bytes);
  165. // remove zeros from the random bytes
  166. for (size_t i = 0; i < bytes; ++i) {
  167. if (!random_bytes[i])
  168. random_bytes[i--] = get_random<u8>();
  169. }
  170. if (m_context.is_server) {
  171. dbgln("Server mode not supported");
  172. return;
  173. } else {
  174. *(u16*)random_bytes = AK::convert_between_host_and_network_endian((u16)Version::V12);
  175. }
  176. auto premaster_key_result = ByteBuffer::copy(random_bytes, bytes);
  177. if (premaster_key_result.is_error()) {
  178. dbgln("RSA premaster key generation failed, not enough memory");
  179. return;
  180. }
  181. m_context.premaster_key = premaster_key_result.release_value();
  182. const auto& certificate_option = verify_chain_and_get_matching_certificate(m_context.extensions.SNI); // if the SNI is empty, we'll make a special case and match *a* leaf certificate.
  183. if (!certificate_option.has_value()) {
  184. dbgln("certificate verification failed :(");
  185. alert(AlertLevel::Critical, AlertDescription::BadCertificate);
  186. return;
  187. }
  188. auto& certificate = m_context.certificates[certificate_option.value()];
  189. if constexpr (TLS_DEBUG) {
  190. dbgln("PreMaster secret");
  191. print_buffer(m_context.premaster_key);
  192. }
  193. Crypto::PK::RSA_PKCS1_EME rsa(certificate.public_key.modulus(), 0, certificate.public_key.public_exponent());
  194. Vector<u8, 32> out;
  195. out.resize(rsa.output_size());
  196. auto outbuf = out.span();
  197. rsa.encrypt(m_context.premaster_key, outbuf);
  198. if constexpr (TLS_DEBUG) {
  199. dbgln("Encrypted: ");
  200. print_buffer(outbuf);
  201. }
  202. if (!compute_master_secret_from_pre_master_secret(bytes)) {
  203. dbgln("oh noes we could not derive a master key :(");
  204. return;
  205. }
  206. builder.append_u24(outbuf.size() + 2);
  207. builder.append((u16)outbuf.size());
  208. builder.append(outbuf);
  209. }
  210. void TLSv12::build_dhe_rsa_pre_master_secret(PacketBuilder& builder)
  211. {
  212. auto& dh = m_context.server_diffie_hellman_params;
  213. auto dh_p = Crypto::UnsignedBigInteger::import_data(dh.p.data(), dh.p.size());
  214. auto dh_g = Crypto::UnsignedBigInteger::import_data(dh.g.data(), dh.g.size());
  215. auto dh_Ys = Crypto::UnsignedBigInteger::import_data(dh.Ys.data(), dh.Ys.size());
  216. auto dh_key_size = dh.p.size();
  217. auto dh_random = Crypto::NumberTheory::random_number(0, dh_p);
  218. auto dh_Yc = Crypto::NumberTheory::ModularPower(dh_g, dh_random, dh_p);
  219. auto dh_Yc_bytes_result = ByteBuffer::create_uninitialized(dh_key_size);
  220. if (dh_Yc_bytes_result.is_error()) {
  221. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  222. return;
  223. }
  224. auto dh_Yc_bytes = dh_Yc_bytes_result.release_value();
  225. dh_Yc.export_data(dh_Yc_bytes);
  226. auto premaster_key = Crypto::NumberTheory::ModularPower(dh_Ys, dh_random, dh_p);
  227. auto premaster_key_result = ByteBuffer::create_uninitialized(dh_key_size);
  228. if (premaster_key_result.is_error()) {
  229. dbgln("Failed to build DHE_RSA premaster secret: not enough memory");
  230. return;
  231. }
  232. m_context.premaster_key = premaster_key_result.release_value();
  233. premaster_key.export_data(m_context.premaster_key, true);
  234. dh.p.clear();
  235. dh.g.clear();
  236. dh.Ys.clear();
  237. if constexpr (TLS_DEBUG) {
  238. dbgln("dh_random: {}", dh_random.to_base(16));
  239. dbgln("dh_Yc: {:hex-dump}", (ReadonlyBytes)dh_Yc_bytes);
  240. dbgln("premaster key: {:hex-dump}", (ReadonlyBytes)m_context.premaster_key);
  241. }
  242. if (!compute_master_secret_from_pre_master_secret(48)) {
  243. dbgln("oh noes we could not derive a master key :(");
  244. return;
  245. }
  246. builder.append_u24(dh_key_size + 2);
  247. builder.append((u16)dh_key_size);
  248. builder.append(dh_Yc_bytes);
  249. }
  250. ErrorOr<ByteBuffer> TLSv12::named_curve_multiply(NamedCurve curve, ReadonlyBytes a, ReadonlyBytes b)
  251. {
  252. switch (curve) {
  253. case NamedCurve::x25519:
  254. return Crypto::Curves::X25519::compute_coordinate(a, b);
  255. case NamedCurve::x448:
  256. return Crypto::Curves::X448::compute_coordinate(a, b);
  257. default:
  258. dbgln("No known handler for multiplying curve {}", static_cast<u16>(curve));
  259. TODO();
  260. }
  261. }
  262. ErrorOr<ByteBuffer> TLSv12::named_curve_generator_point(NamedCurve curve)
  263. {
  264. auto key_size = named_curve_key_size(curve) / 8;
  265. auto generator_point_data_result = ByteBuffer::create_zeroed(key_size);
  266. if (generator_point_data_result.is_error()) {
  267. dbgln("Failed to generate curve multiplication point: not enough memory");
  268. return AK::Error::from_string_literal("Failed to generate curve multiplication point: not enough memory");
  269. }
  270. auto generator_point_data = generator_point_data_result.release_value();
  271. switch (curve) {
  272. case NamedCurve::x25519:
  273. ByteReader::store(generator_point_data.offset_pointer(0), 9);
  274. break;
  275. case NamedCurve::x448:
  276. ByteReader::store(generator_point_data.offset_pointer(0), 5);
  277. break;
  278. default:
  279. dbgln("No known handler for generator point of curve {}", static_cast<u16>(curve));
  280. TODO();
  281. }
  282. return generator_point_data;
  283. }
  284. void TLSv12::build_ecdhe_rsa_pre_master_secret(PacketBuilder& builder)
  285. {
  286. size_t const key_size = named_curve_key_size(m_context.server_curve_choice) / 8;
  287. auto generator_point_result = named_curve_generator_point(m_context.server_curve_choice);
  288. if (generator_point_result.is_error()) {
  289. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  290. return;
  291. }
  292. auto generator_point = generator_point_result.release_value();
  293. ReadonlyBytes generator_point_bytes = generator_point;
  294. // Create a random private key
  295. auto private_key_result = ByteBuffer::create_uninitialized(key_size);
  296. if (private_key_result.is_error()) {
  297. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  298. return;
  299. }
  300. auto private_key = private_key_result.release_value();
  301. fill_with_random(private_key.data(), key_size);
  302. ReadonlyBytes private_key_bytes = private_key;
  303. // Calculate the public key by multiplying the private key with the generator point
  304. auto public_key_result = named_curve_multiply(m_context.server_curve_choice, private_key_bytes, generator_point_bytes);
  305. if (public_key_result.is_error()) {
  306. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  307. return;
  308. }
  309. auto public_key = public_key_result.release_value();
  310. // Calculate the pre master secret by multiplying the client private key and the server public key
  311. ReadonlyBytes server_public_key_bytes = m_context.server_diffie_hellman_params.p;
  312. auto pre_master_secret_result = named_curve_multiply(m_context.server_curve_choice, private_key_bytes, server_public_key_bytes);
  313. if (pre_master_secret_result.is_error()) {
  314. dbgln("Failed to build ECDHE_RSA premaster secret: not enough memory");
  315. return;
  316. }
  317. m_context.premaster_key = pre_master_secret_result.release_value();
  318. if constexpr (TLS_DEBUG) {
  319. dbgln("Build ECDHE_RSA pre master secret");
  320. dbgln("client private key: {:hex-dump}", private_key_bytes);
  321. dbgln("client public key: {:hex-dump}", (ReadonlyBytes)public_key);
  322. dbgln("premaster key: {:hex-dump}", (ReadonlyBytes)m_context.premaster_key);
  323. }
  324. if (!compute_master_secret_from_pre_master_secret(48)) {
  325. dbgln("oh noes we could not derive a master key :(");
  326. return;
  327. }
  328. builder.append_u24(key_size + 1);
  329. builder.append((u8)key_size);
  330. builder.append(public_key);
  331. }
  332. ByteBuffer TLSv12::build_certificate()
  333. {
  334. PacketBuilder builder { MessageType::Handshake, m_context.options.version };
  335. Vector<Certificate const&> certificates;
  336. Vector<Certificate>* local_certificates = nullptr;
  337. if (m_context.is_server) {
  338. dbgln("Unsupported: Server mode");
  339. VERIFY_NOT_REACHED();
  340. } else {
  341. local_certificates = &m_context.client_certificates;
  342. }
  343. constexpr size_t der_length_delta = 3;
  344. constexpr size_t certificate_vector_header_size = 3;
  345. size_t total_certificate_size = 0;
  346. for (size_t i = 0; i < local_certificates->size(); ++i) {
  347. auto& certificate = local_certificates->at(i);
  348. if (!certificate.der.is_empty()) {
  349. total_certificate_size += certificate.der.size() + der_length_delta;
  350. // FIXME: Check for and respond with only the requested certificate types.
  351. if (true) {
  352. certificates.append(certificate);
  353. }
  354. }
  355. }
  356. builder.append((u8)HandshakeType::CertificateMessage);
  357. if (!total_certificate_size) {
  358. dbgln_if(TLS_DEBUG, "No certificates, sending empty certificate message");
  359. builder.append_u24(certificate_vector_header_size);
  360. builder.append_u24(total_certificate_size);
  361. } else {
  362. builder.append_u24(total_certificate_size + certificate_vector_header_size); // 3 bytes for header
  363. builder.append_u24(total_certificate_size);
  364. for (auto& certificate : certificates) {
  365. if (!certificate.der.is_empty()) {
  366. builder.append_u24(certificate.der.size());
  367. builder.append(certificate.der.bytes());
  368. }
  369. }
  370. }
  371. auto packet = builder.build();
  372. update_packet(packet);
  373. return packet;
  374. }
  375. ByteBuffer TLSv12::build_client_key_exchange()
  376. {
  377. PacketBuilder builder { MessageType::Handshake, m_context.options.version };
  378. builder.append((u8)HandshakeType::ClientKeyExchange);
  379. switch (get_key_exchange_algorithm(m_context.cipher)) {
  380. case KeyExchangeAlgorithm::RSA:
  381. build_rsa_pre_master_secret(builder);
  382. break;
  383. case KeyExchangeAlgorithm::DHE_DSS:
  384. dbgln("Client key exchange for DHE_DSS is not implemented");
  385. TODO();
  386. break;
  387. case KeyExchangeAlgorithm::DH_DSS:
  388. case KeyExchangeAlgorithm::DH_RSA:
  389. dbgln("Client key exchange for DH algorithms is not implemented");
  390. TODO();
  391. break;
  392. case KeyExchangeAlgorithm::DHE_RSA:
  393. build_dhe_rsa_pre_master_secret(builder);
  394. break;
  395. case KeyExchangeAlgorithm::DH_anon:
  396. dbgln("Client key exchange for DH_anon is not implemented");
  397. TODO();
  398. break;
  399. case KeyExchangeAlgorithm::ECDHE_RSA:
  400. build_ecdhe_rsa_pre_master_secret(builder);
  401. break;
  402. case KeyExchangeAlgorithm::ECDH_ECDSA:
  403. case KeyExchangeAlgorithm::ECDH_RSA:
  404. case KeyExchangeAlgorithm::ECDHE_ECDSA:
  405. case KeyExchangeAlgorithm::ECDH_anon:
  406. dbgln("Client key exchange for ECDHE algorithms is not implemented");
  407. TODO();
  408. break;
  409. default:
  410. dbgln("Unknown client key exchange algorithm");
  411. VERIFY_NOT_REACHED();
  412. break;
  413. }
  414. m_context.connection_status = ConnectionStatus::KeyExchange;
  415. auto packet = builder.build();
  416. update_packet(packet);
  417. return packet;
  418. }
  419. }