OpenVPN
ssl.h
Go to the documentation of this file.
1 /*
2  * OpenVPN -- An application to securely tunnel IP networks
3  * over a single TCP/UDP port, with support for SSL/TLS-based
4  * session authentication and key exchange,
5  * packet encryption, packet authentication, and
6  * packet compression.
7  *
8  * Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net>
9  * Copyright (C) 2010-2021 Fox Crypto B.V. <openvpn@foxcrypto.com>
10  *
11  * This program is free software; you can redistribute it and/or modify
12  * it under the terms of the GNU General Public License version 2
13  * as published by the Free Software Foundation.
14  *
15  * This program is distributed in the hope that it will be useful,
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18  * GNU General Public License for more details.
19  *
20  * You should have received a copy of the GNU General Public License along
21  * with this program; if not, write to the Free Software Foundation, Inc.,
22  * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23  */
24 
30 #ifndef OPENVPN_SSL_H
31 #define OPENVPN_SSL_H
32 
33 #include "basic.h"
34 #include "common.h"
35 #include "crypto.h"
36 #include "packet_id.h"
37 #include "session_id.h"
38 #include "reliable.h"
39 #include "socket.h"
40 #include "mtu.h"
41 #include "options.h"
42 #include "plugin.h"
43 
44 #include "ssl_common.h"
45 #include "ssl_backend.h"
46 #include "ssl_pkt.h"
47 #include "tls_crypt.h"
48 
49 /* Used in the TLS PRF function */
50 #define KEY_EXPANSION_ID "OpenVPN"
51 
52 /*
53  * Set the max number of acknowledgments that can "hitch a ride" on an outgoing
54  * non-P_ACK_V1 control packet.
55  */
56 #define CONTROL_SEND_ACK_MAX 4
57 
58 /*
59  * Various timeouts
60  */
61 #define TLS_MULTI_REFRESH 15 /* call tls_multi_process once every n seconds */
62 #define TLS_MULTI_HORIZON 2 /* call tls_multi_process frequently for n seconds after
63  * every packet sent/received action */
64 
65 /*
66  * Buffer sizes (also see mtu.h).
67  */
68 
69 /* Maximum length of OCC options string passed as part of auth handshake */
70 #define TLS_OPTIONS_LEN 512
71 
72 /* Definitions of the bits in the IV_PROTO bitfield
73  *
74  * In older OpenVPN versions this used in a comparison
75  * IV_PROTO >= 2 to determine if DATA_V2 is supported.
76  * Therefore any client announcing any of the flags must
77  * also announce IV_PROTO_DATA_V2. We also treat bit 0
78  * as reserved for this reason */
79 
81 #define IV_PROTO_DATA_V2 (1<<1)
82 
85 #define IV_PROTO_REQUEST_PUSH (1<<2)
86 
88 #define IV_PROTO_TLS_KEY_EXPORT (1<<3)
89 
91 #define IV_PROTO_AUTH_PENDING_KW (1<<4)
92 
96 #define IV_PROTO_NCP_P2P (1<<5)
97 
99 #define IV_PROTO_DNS_OPTION (1<<6)
100 
103 #define IV_PROTO_CC_EXIT_NOTIFY (1<<7)
104 
106 #define IV_PROTO_AUTH_FAIL_TEMP (1<<8)
107 
109 #define IV_PROTO_DYN_TLS_CRYPT (1<<9)
110 
112 #define IV_PROTO_DATA_EPOCH (1<<10)
113 
115 #define IV_PROTO_DNS_OPTION_V2 (1<<11)
116 
117 /* Default field in X509 to be username */
118 #define X509_USERNAME_FIELD_DEFAULT "CN"
119 
120 #define KEY_METHOD_2 2
121 
122 /* key method taken from lower 4 bits */
123 #define KEY_METHOD_MASK 0x0F
124 
125 /*
126  * Measure success rate of TLS handshakes, for debugging only
127  */
128 /* #define MEASURE_TLS_HANDSHAKE_STATS */
129 
130 /*
131  * Prepare the SSL library for use
132  */
133 void init_ssl_lib(void);
134 
135 /*
136  * Free any internal state that the SSL library might have
137  */
138 void free_ssl_lib(void);
139 
144 void init_ssl(const struct options *options, struct tls_root_ctx *ctx, bool in_chroot);
145 
167 
182 void tls_multi_init_finalize(struct tls_multi *multi, int tls_mtu);
183 
184 /*
185  * Initialize a standalone tls-auth verification object.
186  */
188  struct gc_arena *gc);
189 
195 
196 /*
197  * Setups the control channel frame size parameters from the data channel
198  * parameters
199  */
200 void tls_init_control_channel_frame_parameters(struct frame *frame, int tls_mtu);
201 
202 /*
203  * Set local and remote option compatibility strings.
204  * Used to verify compatibility of local and remote option
205  * sets.
206  */
207 void tls_multi_init_set_options(struct tls_multi *multi,
208  const char *local,
209  const char *remote);
210 
223 void tls_multi_free(struct tls_multi *multi, bool clear);
224 
229 #define TLSMP_INACTIVE 0
230 #define TLSMP_ACTIVE 1
231 #define TLSMP_KILL 2
232 #define TLSMP_RECONNECT 3
233 
234 /*
235  * Called by the top-level event loop.
236  *
237  * Basically decides if we should call tls_process for
238  * the active or untrusted sessions.
239  */
240 int tls_multi_process(struct tls_multi *multi,
241  struct buffer *to_link,
242  struct link_socket_actual **to_link_addr,
243  struct link_socket_info *to_link_socket_info,
244  interval_t *wakeup);
245 
246 
247 /**************************************************************************/
299 bool tls_pre_decrypt(struct tls_multi *multi,
300  const struct link_socket_actual *from,
301  struct buffer *buf,
302  struct crypto_options **opt,
303  bool floated,
304  const uint8_t **ad_start);
305 
306 
307 /**************************************************************************/
325 void tls_pre_encrypt(struct tls_multi *multi,
326  struct buffer *buf, struct crypto_options **opt);
327 
337 struct key_state *tls_select_encryption_key(struct tls_multi *multi);
338 
351 void
352 tls_prepend_opcode_v1(const struct tls_multi *multi, struct buffer *buf);
353 
370 void
371 tls_prepend_opcode_v2(const struct tls_multi *multi, struct buffer *buf);
372 
380 void tls_post_encrypt(struct tls_multi *multi, struct buffer *buf);
381 
384 /*
385  * Setup private key file password. If auth_file is given, use the
386  * credentials stored in the file.
387  */
388 void pem_password_setup(const char *auth_file);
389 
390 /* Enables the use of user/password authentication */
391 void enable_auth_user_pass(void);
392 
393 /*
394  * Setup authentication username and password. If auth_file is given, use the
395  * credentials stored in the file, however, if is_inline is true then auth_file
396  * contains the username/password inline.
397  */
398 void auth_user_pass_setup(const char *auth_file, bool is_inline,
399  const struct static_challenge_info *sc_info);
400 
401 /*
402  * Ensure that no caching is performed on authentication information
403  */
404 void ssl_set_auth_nocache(void);
405 
406 /*
407  * Getter method for retrieving the auth-nocache option.
408  */
409 bool ssl_get_auth_nocache(void);
410 
411 /*
412  * Purge any stored authentication information, both for key files and tunnel
413  * authentication. If PCKS #11 is enabled, purge authentication for that too.
414  * Note that auth_token is not cleared.
415  */
416 void ssl_purge_auth(const bool auth_user_pass_only);
417 
418 void ssl_set_auth_token(const char *token);
419 
420 void ssl_set_auth_token_user(const char *username);
421 
422 bool ssl_clean_auth_token(void);
423 
424 #ifdef ENABLE_MANAGEMENT
425 
426 void ssl_purge_auth_challenge(void);
427 
428 void ssl_put_auth_challenge(const char *cr_str);
429 
430 #endif
431 
432 /*
433  * Send a payload over the TLS control channel
434  */
435 bool tls_send_payload(struct key_state *ks,
436  const uint8_t *data,
437  int size);
438 
439 /*
440  * Receive a payload through the TLS control channel
441  */
442 bool tls_rec_payload(struct tls_multi *multi,
443  struct buffer *buf);
444 
451 void tls_update_remote_addr(struct tls_multi *multi,
452  const struct link_socket_actual *addr);
453 
473  struct tls_session *session,
474  struct options *options,
475  struct frame *frame,
476  struct frame *frame_fragment,
477  struct link_socket_info *lsi,
478  dco_context_t *dco);
479 
480 /*
481  * inline functions
482  */
483 
485 static inline void
486 tls_wrap_free(struct tls_wrap_ctx *tls_wrap)
487 {
488  if (packet_id_initialized(&tls_wrap->opt.packet_id))
489  {
490  packet_id_free(&tls_wrap->opt.packet_id);
491  }
492 
493  if (tls_wrap->cleanup_key_ctx)
494  {
495  free_key_ctx_bi(&tls_wrap->opt.key_ctx_bi);
496  }
497 
498  free_buf(&tls_wrap->tls_crypt_v2_metadata);
499  free_buf(&tls_wrap->work);
500  secure_memzero(&tls_wrap->original_wrap_keydata, sizeof(tls_wrap->original_wrap_keydata));
501 }
502 
503 static inline bool
504 tls_initial_packet_received(const struct tls_multi *multi)
505 {
506  return multi->n_sessions > 0;
507 }
508 
509 static inline int
510 tls_test_payload_len(const struct tls_multi *multi)
511 {
512  if (multi)
513  {
514  const struct key_state *ks = get_primary_key(multi);
515  if (ks->state >= S_ACTIVE)
516  {
517  return BLEN(&ks->plaintext_read_buf);
518  }
519  }
520  return 0;
521 }
522 
523 static inline void
524 tls_set_single_session(struct tls_multi *multi)
525 {
526  if (multi)
527  {
528  multi->opt.single_session = true;
529  }
530 }
531 
532 /*
533  * protocol_dump() flags
534  */
535 #define PD_TLS_AUTH_HMAC_SIZE_MASK 0xFF
536 #define PD_SHOW_DATA (1<<8)
537 #define PD_TLS (1<<9)
538 #define PD_VERBOSE (1<<10)
539 #define PD_TLS_CRYPT (1<<11)
540 
541 const char *protocol_dump(struct buffer *buffer,
542  unsigned int flags,
543  struct gc_arena *gc);
544 
545 /*
546  * debugging code
547  */
548 
549 #ifdef MEASURE_TLS_HANDSHAKE_STATS
550 void show_tls_performance_stats(void);
551 
552 #endif
553 
559 bool is_hard_reset_method2(int op);
560 
561 /*
562  * Show the TLS ciphers that are available for us to use in the SSL
563  * library with headers hinting their usage and warnings about usage.
564  *
565  * @param cipher_list list of allowed TLS cipher, or NULL.
566  * @param cipher_list_tls13 list of allowed TLS 1.3+ cipher, or NULL
567  * @param tls_cert_profile TLS certificate crypto profile name.
568  */
569 void
570 show_available_tls_ciphers(const char *cipher_list,
571  const char *cipher_list_tls13,
572  const char *tls_cert_profile);
573 
574 
581 bool
583  struct tls_session *session);
584 
585 void
586 tls_session_soft_reset(struct tls_multi *multi);
587 
591 void
592 load_xkey_provider(void);
593 
594 /* Special method to skip the three way handshake RESET stages. This is
595  * used by the HMAC code when seeing a packet that matches the previous
596  * HMAC based stateless server state */
597 bool
600  struct link_socket_actual *from);
601 
602 #endif /* ifndef OPENVPN_SSL_H */
load_xkey_provider
void load_xkey_provider(void)
Load ovpn.xkey provider used for external key signing.
Definition: ssl_openssl.c:2679
tls_init_control_channel_frame_parameters
void tls_init_control_channel_frame_parameters(struct frame *frame, int tls_mtu)
Definition: ssl.c:142
ssl_set_auth_token_user
void ssl_set_auth_token_user(const char *username)
Definition: ssl.c:372
enable_auth_user_pass
void enable_auth_user_pass(void)
Definition: ssl.c:289
ssl_backend.h
tls_wrap_ctx::original_wrap_keydata
struct key2 original_wrap_keydata
original key data to be xored in to the key for dynamic tls-crypt.
Definition: ssl_common.h:290
tls_test_payload_len
static int tls_test_payload_len(const struct tls_multi *multi)
Definition: ssl.h:509
ssl_set_auth_nocache
void ssl_set_auth_nocache(void)
Definition: ssl.c:347
interval_t
int interval_t
Definition: common.h:36
tls_session_update_crypto_params
bool tls_session_update_crypto_params(struct tls_multi *multi, struct tls_session *session, struct options *options, struct frame *frame, struct frame *frame_fragment, struct link_socket_info *lsi, dco_context_t *dco)
Update TLS session crypto parameters (cipher and auth) and derive data channel keys based on the supp...
Definition: ssl.c:1708
ssl_get_auth_nocache
bool ssl_get_auth_nocache(void)
Definition: ssl.c:357
tls_rec_payload
bool tls_rec_payload(struct tls_multi *multi, struct buffer *buf)
Definition: ssl.c:4191
tls_options::single_session
bool single_session
Definition: ssl_common.h:317
get_primary_key
static const struct key_state * get_primary_key(const struct tls_multi *multi)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition: ssl_common.h:737
packet_id_initialized
static bool packet_id_initialized(const struct packet_id *pid)
Is this struct packet_id initialized?
Definition: packet_id.h:275
plugin.h
session_id.h
tls_send_payload
bool tls_send_payload(struct key_state *ks, const uint8_t *data, int size)
Definition: ssl.c:4157
options.h
tls_crypt.h
show_available_tls_ciphers
void show_available_tls_ciphers(const char *cipher_list, const char *cipher_list_tls13, const char *tls_cert_profile)
Definition: ssl.c:4245
frame
Packet geometry parameters.
Definition: mtu.h:98
tls_multi
Security parameter state for a single VPN tunnel.
Definition: ssl_common.h:596
tls_wrap_free
static void tls_wrap_free(struct tls_wrap_ctx *tls_wrap)
Free the elements of a tls_wrap_ctx structure.
Definition: ssl.h:485
key_state
Security parameter state of one TLS and data channel key session.
Definition: ssl_common.h:199
session_skip_to_pre_start
bool session_skip_to_pre_start(struct tls_session *session, struct tls_pre_decrypt_state *state, struct link_socket_actual *from)
Definition: ssl.c:2581
tls_set_single_session
static void tls_set_single_session(struct tls_multi *multi)
Definition: ssl.h:523
mtu.h
tls_session_soft_reset
void tls_session_soft_reset(struct tls_multi *multi)
Definition: ssl.c:1843
free_key_ctx_bi
void free_key_ctx_bi(struct key_ctx_bi *ctx)
Definition: crypto.c:1125
ssl_purge_auth
void ssl_purge_auth(const bool auth_user_pass_only)
Definition: ssl.c:392
secure_memzero
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
Definition: buffer.h:414
tls_wrap_ctx::opt
struct crypto_options opt
Crypto state.
Definition: ssl_common.h:274
reliable.h
ssl_put_auth_challenge
void ssl_put_auth_challenge(const char *cr_str)
Definition: ssl.c:417
tls_options
Definition: ssl_common.h:297
packet_id.h
BLEN
#define BLEN(buf)
Definition: buffer.h:127
S_ACTIVE
#define S_ACTIVE
Operational key_state state immediately after negotiation has completed while still within the handsh...
Definition: ssl_common.h:97
tls_wrap_ctx
Control channel wrapping (–tls-auth/–tls-crypt) context.
Definition: ssl_common.h:267
tls_wrap_ctx::work
struct buffer work
Work buffer (only for –tls-crypt)
Definition: ssl_common.h:275
tls_multi::opt
struct tls_options opt
Definition: ssl_common.h:602
tls_multi_process
int tls_multi_process(struct tls_multi *multi, struct buffer *to_link, struct link_socket_actual **to_link_addr, struct link_socket_info *to_link_socket_info, interval_t *wakeup)
Definition: ssl.c:3310
tls_pre_decrypt_state
struct that stores the temporary data for the tls lite decrypt functions
Definition: ssl_pkt.h:105
init_ssl_lib
void init_ssl_lib(void)
Definition: ssl.c:228
tls_wrap_ctx::tls_crypt_v2_metadata
struct buffer tls_crypt_v2_metadata
Received from client.
Definition: ssl_common.h:279
options
Definition: options.h:249
crypto.h
ssl_set_auth_token
void ssl_set_auth_token(const char *token)
Definition: ssl.c:366
tls_prepend_opcode_v2
void tls_prepend_opcode_v2(const struct tls_multi *multi, struct buffer *buf)
Prepend an OpenVPN data channel P_DATA_V2 header to the packet.
Definition: ssl.c:4122
dco_context_t
void * dco_context_t
Definition: dco.h:267
protocol_dump
const char * protocol_dump(struct buffer *buffer, unsigned int flags, struct gc_arena *gc)
Definition: ssl.c:4272
buffer
Wrapper structure for dynamically allocated memory.
Definition: buffer.h:60
static_challenge_info
Definition: misc.h:93
tls_session
Security parameter state of a single session within a VPN tunnel.
Definition: ssl_common.h:479
key_state::state
int state
Definition: ssl_common.h:201
tls_session_generate_data_channel_keys
bool tls_session_generate_data_channel_keys(struct tls_multi *multi, struct tls_session *session)
Generate data channel keys for the supplied TLS session.
Definition: ssl.c:1598
tls_auth_standalone_free
void tls_auth_standalone_free(struct tls_auth_standalone *tas)
Frees a standalone tls-auth verification object.
Definition: ssl.c:1227
gc_arena
Garbage collection arena used to keep track of dynamically allocated memory.
Definition: buffer.h:116
is_hard_reset_method2
bool is_hard_reset_method2(int op)
Given a key_method, return true if opcode represents the one of the hard_reset op codes for key-metho...
Definition: ssl.c:788
tls_auth_standalone_init
struct tls_auth_standalone * tls_auth_standalone_init(struct tls_options *tls_options, struct gc_arena *gc)
Definition: ssl.c:1201
tls_multi_free
void tls_multi_free(struct tls_multi *multi, bool clear)
Cleanup a tls_multi structure and free associated memory allocations.
Definition: ssl.c:1256
tls_initial_packet_received
static bool tls_initial_packet_received(const struct tls_multi *multi)
Definition: ssl.h:503
free_buf
void free_buf(struct buffer *buf)
Definition: buffer.c:183
common.h
tls_multi::n_sessions
int n_sessions
Number of sessions negotiated thus far.
Definition: ssl_common.h:616
pem_password_setup
void pem_password_setup(const char *auth_file)
Definition: ssl.c:251
tls_select_encryption_key
struct key_state * tls_select_encryption_key(struct tls_multi *multi)
Selects the primary encryption that should be used to encrypt data of an outgoing packet.
Definition: ssl.c:4048
tls_multi_init_finalize
void tls_multi_init_finalize(struct tls_multi *multi, int tls_mtu)
Finalize initialization of a tls_multi structure.
Definition: ssl.c:1187
basic.h
tls_multi_init
struct tls_multi * tls_multi_init(struct tls_options *tls_options)
Allocate and initialize a tls_multi structure.
Definition: ssl.c:1172
tls_prepend_opcode_v1
void tls_prepend_opcode_v1(const struct tls_multi *multi, struct buffer *buf)
Prepend a one-byte OpenVPN data channel P_DATA_V1 opcode to the packet.
Definition: ssl.c:4108
tls_root_ctx
Structure that wraps the TLS context.
Definition: ssl_mbedtls.h:107
ssl_pkt.h
ssl_purge_auth_challenge
void ssl_purge_auth_challenge(void)
Definition: ssl.c:410
free_ssl_lib
void free_ssl_lib(void)
Definition: ssl.c:236
tls_update_remote_addr
void tls_update_remote_addr(struct tls_multi *multi, const struct link_socket_actual *addr)
Updates remote address in TLS sessions.
Definition: ssl.c:4217
init_ssl
void init_ssl(const struct options *options, struct tls_root_ctx *ctx, bool in_chroot)
Build master SSL context object that serves for the whole of OpenVPN instantiation.
Definition: ssl.c:523
socket.h
ssl_clean_auth_token
bool ssl_clean_auth_token(void)
Definition: ssl.c:381
crypto_options::key_ctx_bi
struct key_ctx_bi key_ctx_bi
OpenSSL cipher and HMAC contexts for both sending and receiving directions.
Definition: crypto.h:293
ssl_common.h
tls_post_encrypt
void tls_post_encrypt(struct tls_multi *multi, struct buffer *buf)
Perform some accounting for the key state used.
Definition: ssl.c:4137
tls_pre_encrypt
void tls_pre_encrypt(struct tls_multi *multi, struct buffer *buf, struct crypto_options **opt)
Choose the appropriate security parameters with which to process an outgoing packet.
Definition: ssl.c:4075
session
Definition: keyingmaterialexporter.c:56
crypto_options::packet_id
struct packet_id packet_id
Current packet ID state for both sending and receiving directions.
Definition: crypto.h:330
key_state::plaintext_read_buf
struct buffer plaintext_read_buf
Definition: ssl_common.h:233
tls_multi_init_set_options
void tls_multi_init_set_options(struct tls_multi *multi, const char *local, const char *remote)
Definition: ssl.c:1243
packet_id_free
void packet_id_free(struct packet_id *p)
Definition: packet_id.c:127
auth_user_pass_setup
void auth_user_pass_setup(const char *auth_file, bool is_inline, const struct static_challenge_info *sc_info)
Definition: ssl.c:295
tls_wrap_ctx::cleanup_key_ctx
bool cleanup_key_ctx
opt.key_ctx_bi is owned by this context
Definition: ssl_common.h:280
crypto_options
Security parameter state for processing data channel packets.
Definition: crypto.h:291
gc
struct gc_arena gc
Definition: test_ssl.c:155
tls_auth_standalone
Definition: ssl_pkt.h:78
tls_pre_decrypt
bool tls_pre_decrypt(struct tls_multi *multi, const struct link_socket_actual *from, struct buffer *buf, struct crypto_options **opt, bool floated, const uint8_t **ad_start)
Determine whether an incoming packet is a data channel or control channel packet, and process accordi...
Definition: ssl.c:3683