forked from etc/pineapple-src
367 lines
9.1 KiB
C
Executable file
367 lines
9.1 KiB
C
Executable file
/* $OpenBSD: ssl_versions.c,v 1.22 2022/02/05 14:54:10 jsing Exp $ */
|
|
/*
|
|
* Copyright (c) 2016, 2017 Joel Sing <jsing@openbsd.org>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include "ssl_locl.h"
|
|
|
|
static uint16_t
|
|
ssl_dtls_to_tls_version(uint16_t dtls_ver)
|
|
{
|
|
if (dtls_ver == DTLS1_VERSION)
|
|
return TLS1_1_VERSION;
|
|
if (dtls_ver == DTLS1_2_VERSION)
|
|
return TLS1_2_VERSION;
|
|
return 0;
|
|
}
|
|
|
|
static uint16_t
|
|
ssl_tls_to_dtls_version(uint16_t tls_ver)
|
|
{
|
|
if (tls_ver == TLS1_1_VERSION)
|
|
return DTLS1_VERSION;
|
|
if (tls_ver == TLS1_2_VERSION)
|
|
return DTLS1_2_VERSION;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
ssl_clamp_tls_version_range(uint16_t *min_ver, uint16_t *max_ver,
|
|
uint16_t clamp_min, uint16_t clamp_max)
|
|
{
|
|
if (clamp_min > clamp_max || *min_ver > *max_ver)
|
|
return 0;
|
|
if (clamp_max < *min_ver || clamp_min > *max_ver)
|
|
return 0;
|
|
|
|
if (*min_ver < clamp_min)
|
|
*min_ver = clamp_min;
|
|
if (*max_ver > clamp_max)
|
|
*max_ver = clamp_max;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_version_set_min(const SSL_METHOD *meth, uint16_t proto_ver,
|
|
uint16_t max_tls_ver, uint16_t *out_tls_ver, uint16_t *out_proto_ver)
|
|
{
|
|
uint16_t min_proto, min_version, max_version;
|
|
|
|
if (proto_ver == 0) {
|
|
*out_tls_ver = meth->min_tls_version;
|
|
*out_proto_ver = 0;
|
|
return 1;
|
|
}
|
|
|
|
min_version = proto_ver;
|
|
max_version = max_tls_ver;
|
|
|
|
if (meth->dtls) {
|
|
if ((min_version = ssl_dtls_to_tls_version(proto_ver)) == 0)
|
|
return 0;
|
|
}
|
|
|
|
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
|
|
meth->min_tls_version, meth->max_tls_version))
|
|
return 0;
|
|
|
|
min_proto = min_version;
|
|
if (meth->dtls) {
|
|
if ((min_proto = ssl_tls_to_dtls_version(min_version)) == 0)
|
|
return 0;
|
|
}
|
|
*out_tls_ver = min_version;
|
|
*out_proto_ver = min_proto;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_version_set_max(const SSL_METHOD *meth, uint16_t proto_ver,
|
|
uint16_t min_tls_ver, uint16_t *out_tls_ver, uint16_t *out_proto_ver)
|
|
{
|
|
uint16_t max_proto, min_version, max_version;
|
|
|
|
if (proto_ver == 0) {
|
|
*out_tls_ver = meth->max_tls_version;
|
|
*out_proto_ver = 0;
|
|
return 1;
|
|
}
|
|
|
|
min_version = min_tls_ver;
|
|
max_version = proto_ver;
|
|
|
|
if (meth->dtls) {
|
|
if ((max_version = ssl_dtls_to_tls_version(proto_ver)) == 0)
|
|
return 0;
|
|
}
|
|
|
|
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
|
|
meth->min_tls_version, meth->max_tls_version))
|
|
return 0;
|
|
|
|
max_proto = max_version;
|
|
if (meth->dtls) {
|
|
if ((max_proto = ssl_tls_to_dtls_version(max_version)) == 0)
|
|
return 0;
|
|
}
|
|
*out_tls_ver = max_version;
|
|
*out_proto_ver = max_proto;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_enabled_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver)
|
|
{
|
|
uint16_t min_version, max_version;
|
|
unsigned long options;
|
|
|
|
/*
|
|
* The enabled versions have to be a contiguous range, which means we
|
|
* cannot enable and disable single versions at our whim, even though
|
|
* this is what the OpenSSL flags allow. The historical way this has
|
|
* been handled is by making a flag mean that all higher versions
|
|
* are disabled, if any version lower than the flag is enabled.
|
|
*/
|
|
|
|
min_version = 0;
|
|
max_version = TLS1_3_VERSION;
|
|
options = s->internal->options;
|
|
|
|
if (SSL_is_dtls(s)) {
|
|
options = 0;
|
|
if (s->internal->options & SSL_OP_NO_DTLSv1)
|
|
options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1;
|
|
if (s->internal->options & SSL_OP_NO_DTLSv1_2)
|
|
options |= SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_2;
|
|
}
|
|
|
|
if ((options & SSL_OP_NO_TLSv1) == 0)
|
|
min_version = TLS1_VERSION;
|
|
else if ((options & SSL_OP_NO_TLSv1_1) == 0)
|
|
min_version = TLS1_1_VERSION;
|
|
else if ((options & SSL_OP_NO_TLSv1_2) == 0)
|
|
min_version = TLS1_2_VERSION;
|
|
else if ((options & SSL_OP_NO_TLSv1_3) == 0)
|
|
min_version = TLS1_3_VERSION;
|
|
|
|
if ((options & SSL_OP_NO_TLSv1_3) && min_version < TLS1_3_VERSION)
|
|
max_version = TLS1_2_VERSION;
|
|
if ((options & SSL_OP_NO_TLSv1_2) && min_version < TLS1_2_VERSION)
|
|
max_version = TLS1_1_VERSION;
|
|
if ((options & SSL_OP_NO_TLSv1_1) && min_version < TLS1_1_VERSION)
|
|
max_version = TLS1_VERSION;
|
|
if ((options & SSL_OP_NO_TLSv1) && min_version < TLS1_VERSION)
|
|
max_version = 0;
|
|
|
|
/* Everything has been disabled... */
|
|
if (min_version == 0 || max_version == 0)
|
|
return 0;
|
|
|
|
/* Limit to configured version range. */
|
|
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
|
|
s->internal->min_tls_version, s->internal->max_tls_version))
|
|
return 0;
|
|
|
|
if (min_ver != NULL)
|
|
*min_ver = min_version;
|
|
if (max_ver != NULL)
|
|
*max_ver = max_version;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_supported_tls_version_range(SSL *s, uint16_t *min_ver, uint16_t *max_ver)
|
|
{
|
|
uint16_t min_version, max_version;
|
|
|
|
if (!ssl_enabled_tls_version_range(s, &min_version, &max_version))
|
|
return 0;
|
|
|
|
/* Limit to the versions supported by this method. */
|
|
if (!ssl_clamp_tls_version_range(&min_version, &max_version,
|
|
s->method->min_tls_version, s->method->max_tls_version))
|
|
return 0;
|
|
|
|
if (min_ver != NULL)
|
|
*min_ver = min_version;
|
|
if (max_ver != NULL)
|
|
*max_ver = max_version;
|
|
|
|
return 1;
|
|
}
|
|
|
|
uint16_t
|
|
ssl_tls_version(uint16_t version)
|
|
{
|
|
if (version == TLS1_VERSION || version == TLS1_1_VERSION ||
|
|
version == TLS1_2_VERSION || version == TLS1_3_VERSION)
|
|
return version;
|
|
|
|
if (version == DTLS1_VERSION)
|
|
return TLS1_1_VERSION;
|
|
if (version == DTLS1_2_VERSION)
|
|
return TLS1_2_VERSION;
|
|
|
|
return 0;
|
|
}
|
|
|
|
uint16_t
|
|
ssl_effective_tls_version(SSL *s)
|
|
{
|
|
if (s->s3->hs.negotiated_tls_version > 0)
|
|
return s->s3->hs.negotiated_tls_version;
|
|
|
|
return s->s3->hs.our_max_tls_version;
|
|
}
|
|
|
|
int
|
|
ssl_max_supported_version(SSL *s, uint16_t *max_ver)
|
|
{
|
|
uint16_t max_version;
|
|
|
|
*max_ver = 0;
|
|
|
|
if (!ssl_supported_tls_version_range(s, NULL, &max_version))
|
|
return 0;
|
|
|
|
if (SSL_is_dtls(s)) {
|
|
if ((max_version = ssl_tls_to_dtls_version(max_version)) == 0)
|
|
return 0;
|
|
}
|
|
|
|
*max_ver = max_version;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_max_legacy_version(SSL *s, uint16_t *max_ver)
|
|
{
|
|
uint16_t max_version;
|
|
|
|
if ((max_version = s->s3->hs.our_max_tls_version) > TLS1_2_VERSION)
|
|
max_version = TLS1_2_VERSION;
|
|
|
|
if (SSL_is_dtls(s)) {
|
|
if ((max_version = ssl_tls_to_dtls_version(max_version)) == 0)
|
|
return 0;
|
|
}
|
|
|
|
*max_ver = max_version;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_max_shared_version(SSL *s, uint16_t peer_ver, uint16_t *max_ver)
|
|
{
|
|
uint16_t min_version, max_version, peer_tls_version, shared_version;
|
|
|
|
*max_ver = 0;
|
|
peer_tls_version = peer_ver;
|
|
|
|
if (SSL_is_dtls(s)) {
|
|
if ((peer_ver >> 8) != DTLS1_VERSION_MAJOR)
|
|
return 0;
|
|
|
|
/*
|
|
* Convert the peer version to a TLS version - DTLS versions are
|
|
* the 1's complement of TLS version numbers (but not the actual
|
|
* protocol version numbers, that would be too sensible). Not to
|
|
* mention that DTLSv1.0 is really equivalent to DTLSv1.1.
|
|
*/
|
|
peer_tls_version = ssl_dtls_to_tls_version(peer_ver);
|
|
|
|
/*
|
|
* This may be a version that we do not know about, if it is
|
|
* newer than DTLS1_2_VERSION (yes, less than is correct due
|
|
* to the "clever" versioning scheme), use TLS1_2_VERSION.
|
|
*/
|
|
if (peer_tls_version == 0) {
|
|
if (peer_ver < DTLS1_2_VERSION)
|
|
peer_tls_version = TLS1_2_VERSION;
|
|
}
|
|
}
|
|
|
|
if (peer_tls_version >= TLS1_3_VERSION)
|
|
shared_version = TLS1_3_VERSION;
|
|
else if (peer_tls_version >= TLS1_2_VERSION)
|
|
shared_version = TLS1_2_VERSION;
|
|
else if (peer_tls_version >= TLS1_1_VERSION)
|
|
shared_version = TLS1_1_VERSION;
|
|
else if (peer_tls_version >= TLS1_VERSION)
|
|
shared_version = TLS1_VERSION;
|
|
else
|
|
return 0;
|
|
|
|
if (!ssl_supported_tls_version_range(s, &min_version, &max_version))
|
|
return 0;
|
|
|
|
if (shared_version < min_version)
|
|
return 0;
|
|
|
|
if (shared_version > max_version)
|
|
shared_version = max_version;
|
|
|
|
if (SSL_is_dtls(s)) {
|
|
/*
|
|
* The resulting shared version will by definition be something
|
|
* that we know about. Switch back from TLS to DTLS.
|
|
*/
|
|
shared_version = ssl_tls_to_dtls_version(shared_version);
|
|
if (shared_version == 0)
|
|
return 0;
|
|
}
|
|
|
|
*max_ver = shared_version;
|
|
|
|
return 1;
|
|
}
|
|
|
|
int
|
|
ssl_check_version_from_server(SSL *s, uint16_t server_version)
|
|
{
|
|
uint16_t min_tls_version, max_tls_version, server_tls_version;
|
|
|
|
/* Ensure that the version selected by the server is valid. */
|
|
|
|
server_tls_version = server_version;
|
|
if (SSL_is_dtls(s)) {
|
|
server_tls_version = ssl_dtls_to_tls_version(server_version);
|
|
if (server_tls_version == 0)
|
|
return 0;
|
|
}
|
|
|
|
if (!ssl_supported_tls_version_range(s, &min_tls_version,
|
|
&max_tls_version))
|
|
return 0;
|
|
|
|
return (server_tls_version >= min_tls_version &&
|
|
server_tls_version <= max_tls_version);
|
|
}
|
|
|
|
int
|
|
ssl_legacy_stack_version(SSL *s, uint16_t version)
|
|
{
|
|
if (SSL_is_dtls(s))
|
|
return version == DTLS1_VERSION || version == DTLS1_2_VERSION;
|
|
|
|
return version == TLS1_VERSION || version == TLS1_1_VERSION ||
|
|
version == TLS1_2_VERSION;
|
|
}
|