Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 1 | // Copyright 2009 The Go Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style |
| 3 | // license that can be found in the LICENSE file. |
| 4 | |
| 5 | package tls |
| 6 | |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 7 | import ( |
Adam Langley | e308d55 | 2011-02-01 11:02:48 -0500 | [diff] [blame] | 8 | "crypto" |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 9 | "crypto/rsa" |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 10 | "crypto/subtle" |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 11 | "crypto/x509" |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 12 | "io" |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 13 | "os" |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 14 | ) |
| 15 | |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 16 | func (c *Conn) serverHandshake() os.Error { |
| 17 | config := c.config |
| 18 | msg, err := c.readHandshake() |
| 19 | if err != nil { |
| 20 | return err |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 21 | } |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 22 | clientHello, ok := msg.(*clientHelloMsg) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 23 | if !ok { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 24 | return c.sendAlert(alertUnexpectedMessage) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 25 | } |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 26 | vers, ok := mutualVersion(clientHello.vers) |
| 27 | if !ok { |
| 28 | return c.sendAlert(alertProtocolVersion) |
| 29 | } |
| 30 | c.vers = vers |
| 31 | c.haveVers = true |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 32 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 33 | finishedHash := newFinishedHash() |
| 34 | finishedHash.Write(clientHello.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 35 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 36 | hello := new(serverHelloMsg) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 37 | |
Adam Langley | 4883b73 | 2010-12-16 17:10:50 -0500 | [diff] [blame] | 38 | supportedCurve := false |
| 39 | Curves: |
| 40 | for _, curve := range clientHello.supportedCurves { |
| 41 | switch curve { |
| 42 | case curveP256, curveP384, curveP521: |
| 43 | supportedCurve = true |
| 44 | break Curves |
| 45 | } |
| 46 | } |
| 47 | |
| 48 | supportedPointFormat := false |
| 49 | for _, pointFormat := range clientHello.supportedPoints { |
| 50 | if pointFormat == pointFormatUncompressed { |
| 51 | supportedPointFormat = true |
| 52 | break |
| 53 | } |
| 54 | } |
| 55 | |
| 56 | ellipticOk := supportedCurve && supportedPointFormat |
| 57 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 58 | var suite *cipherSuite |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 59 | var suiteId uint16 |
Adam Langley | ab2aca5 | 2011-02-05 13:56:36 -0500 | [diff] [blame] | 60 | FindCipherSuite: |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 61 | for _, id := range clientHello.cipherSuites { |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 62 | for _, supported := range config.cipherSuites() { |
| 63 | if id == supported { |
| 64 | suite = cipherSuites[id] |
Adam Langley | 4883b73 | 2010-12-16 17:10:50 -0500 | [diff] [blame] | 65 | // Don't select a ciphersuite which we can't |
| 66 | // support for this client. |
| 67 | if suite.elliptic && !ellipticOk { |
| 68 | continue |
| 69 | } |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 70 | suiteId = id |
Adam Langley | ab2aca5 | 2011-02-05 13:56:36 -0500 | [diff] [blame] | 71 | break FindCipherSuite |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 72 | } |
| 73 | } |
| 74 | } |
| 75 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 76 | foundCompression := false |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 77 | // We only support null compression, so check that the client offered it. |
| 78 | for _, compression := range clientHello.compressionMethods { |
| 79 | if compression == compressionNone { |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 80 | foundCompression = true |
| 81 | break |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 82 | } |
| 83 | } |
| 84 | |
| 85 | if suite == nil || !foundCompression { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 86 | return c.sendAlert(alertHandshakeFailure) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 87 | } |
| 88 | |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 89 | hello.vers = vers |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 90 | hello.cipherSuite = suiteId |
Russ Cox | b15c424 | 2010-12-07 16:15:15 -0500 | [diff] [blame] | 91 | t := uint32(config.time()) |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 92 | hello.random = make([]byte, 32) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 93 | hello.random[0] = byte(t >> 24) |
| 94 | hello.random[1] = byte(t >> 16) |
| 95 | hello.random[2] = byte(t >> 8) |
| 96 | hello.random[3] = byte(t) |
Russ Cox | b15c424 | 2010-12-07 16:15:15 -0500 | [diff] [blame] | 97 | _, err = io.ReadFull(config.rand(), hello.random[4:]) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 98 | if err != nil { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 99 | return c.sendAlert(alertInternalError) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 100 | } |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 101 | hello.compressionMethod = compressionNone |
Adam Langley | 9ebb596 | 2009-12-23 11:13:09 -0800 | [diff] [blame] | 102 | if clientHello.nextProtoNeg { |
| 103 | hello.nextProtoNeg = true |
| 104 | hello.nextProtos = config.NextProtos |
| 105 | } |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 106 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 107 | finishedHash.Write(hello.marshal()) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 108 | c.writeRecord(recordTypeHandshake, hello.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 109 | |
| 110 | if len(config.Certificates) == 0 { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 111 | return c.sendAlert(alertInternalError) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 112 | } |
| 113 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 114 | certMsg := new(certificateMsg) |
| 115 | certMsg.certificates = config.Certificates[0].Certificate |
| 116 | finishedHash.Write(certMsg.marshal()) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 117 | c.writeRecord(recordTypeHandshake, certMsg.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 118 | |
Adam Langley | 4883b73 | 2010-12-16 17:10:50 -0500 | [diff] [blame] | 119 | keyAgreement := suite.ka() |
| 120 | |
| 121 | skx, err := keyAgreement.generateServerKeyExchange(config, clientHello, hello) |
| 122 | if err != nil { |
| 123 | c.sendAlert(alertHandshakeFailure) |
| 124 | return err |
| 125 | } |
| 126 | if skx != nil { |
| 127 | finishedHash.Write(skx.marshal()) |
| 128 | c.writeRecord(recordTypeHandshake, skx.marshal()) |
| 129 | } |
| 130 | |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 131 | if config.AuthenticateClient { |
| 132 | // Request a client certificate |
| 133 | certReq := new(certificateRequestMsg) |
| 134 | certReq.certificateTypes = []byte{certTypeRSASign} |
| 135 | // An empty list of certificateAuthorities signals to |
| 136 | // the client that it may send any certificate in response |
| 137 | // to our request. |
| 138 | |
| 139 | finishedHash.Write(certReq.marshal()) |
| 140 | c.writeRecord(recordTypeHandshake, certReq.marshal()) |
| 141 | } |
| 142 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 143 | helloDone := new(serverHelloDoneMsg) |
| 144 | finishedHash.Write(helloDone.marshal()) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 145 | c.writeRecord(recordTypeHandshake, helloDone.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 146 | |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 147 | var pub *rsa.PublicKey |
| 148 | if config.AuthenticateClient { |
| 149 | // Get client certificate |
| 150 | msg, err = c.readHandshake() |
| 151 | if err != nil { |
| 152 | return err |
| 153 | } |
| 154 | certMsg, ok = msg.(*certificateMsg) |
| 155 | if !ok { |
| 156 | return c.sendAlert(alertUnexpectedMessage) |
| 157 | } |
| 158 | finishedHash.Write(certMsg.marshal()) |
| 159 | |
| 160 | certs := make([]*x509.Certificate, len(certMsg.certificates)) |
| 161 | for i, asn1Data := range certMsg.certificates { |
| 162 | cert, err := x509.ParseCertificate(asn1Data) |
| 163 | if err != nil { |
Adam Langley | f6e2eab | 2010-10-11 10:39:56 -0400 | [diff] [blame] | 164 | c.sendAlert(alertBadCertificate) |
| 165 | return os.ErrorString("could not parse client's certificate: " + err.String()) |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 166 | } |
| 167 | certs[i] = cert |
| 168 | } |
| 169 | |
| 170 | // TODO(agl): do better validation of certs: max path length, name restrictions etc. |
| 171 | for i := 1; i < len(certs); i++ { |
| 172 | if err := certs[i-1].CheckSignatureFrom(certs[i]); err != nil { |
Adam Langley | f6e2eab | 2010-10-11 10:39:56 -0400 | [diff] [blame] | 173 | c.sendAlert(alertBadCertificate) |
| 174 | return os.ErrorString("could not validate certificate signature: " + err.String()) |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 175 | } |
| 176 | } |
| 177 | |
| 178 | if len(certs) > 0 { |
| 179 | key, ok := certs[0].PublicKey.(*rsa.PublicKey) |
| 180 | if !ok { |
| 181 | return c.sendAlert(alertUnsupportedCertificate) |
| 182 | } |
| 183 | pub = key |
| 184 | c.peerCertificates = certs |
| 185 | } |
| 186 | } |
| 187 | |
| 188 | // Get client key exchange |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 189 | msg, err = c.readHandshake() |
| 190 | if err != nil { |
| 191 | return err |
| 192 | } |
| 193 | ckx, ok := msg.(*clientKeyExchangeMsg) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 194 | if !ok { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 195 | return c.sendAlert(alertUnexpectedMessage) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 196 | } |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 197 | finishedHash.Write(ckx.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 198 | |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 199 | // If we received a client cert in response to our certificate request message, |
| 200 | // the client will send us a certificateVerifyMsg immediately after the |
| 201 | // clientKeyExchangeMsg. This message is a MD5SHA1 digest of all preceeding |
| 202 | // handshake-layer messages that is signed using the private key corresponding |
| 203 | // to the client's certificate. This allows us to verify that the client is in |
| 204 | // posession of the private key of the certificate. |
| 205 | if len(c.peerCertificates) > 0 { |
| 206 | msg, err = c.readHandshake() |
| 207 | if err != nil { |
| 208 | return err |
| 209 | } |
| 210 | certVerify, ok := msg.(*certificateVerifyMsg) |
| 211 | if !ok { |
| 212 | return c.sendAlert(alertUnexpectedMessage) |
| 213 | } |
| 214 | |
| 215 | digest := make([]byte, 36) |
| 216 | copy(digest[0:16], finishedHash.serverMD5.Sum()) |
| 217 | copy(digest[16:36], finishedHash.serverSHA1.Sum()) |
Adam Langley | e308d55 | 2011-02-01 11:02:48 -0500 | [diff] [blame] | 218 | err = rsa.VerifyPKCS1v15(pub, crypto.MD5SHA1, digest, certVerify.signature) |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 219 | if err != nil { |
Adam Langley | f6e2eab | 2010-10-11 10:39:56 -0400 | [diff] [blame] | 220 | c.sendAlert(alertBadCertificate) |
| 221 | return os.ErrorString("could not validate signature of connection nonces: " + err.String()) |
Mikkel Krautz | c47123d | 2010-08-16 11:22:22 -0400 | [diff] [blame] | 222 | } |
| 223 | |
| 224 | finishedHash.Write(certVerify.marshal()) |
| 225 | } |
| 226 | |
Adam Langley | 4883b73 | 2010-12-16 17:10:50 -0500 | [diff] [blame] | 227 | preMasterSecret, err := keyAgreement.processClientKeyExchange(config, ckx) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 228 | if err != nil { |
Adam Langley | 4883b73 | 2010-12-16 17:10:50 -0500 | [diff] [blame] | 229 | c.sendAlert(alertHandshakeFailure) |
| 230 | return err |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 231 | } |
| 232 | |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 233 | masterSecret, clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV := |
| 234 | keysFromPreMasterSecret10(preMasterSecret, clientHello.random, hello.random, suite.macLen, suite.keyLen, suite.ivLen) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 235 | |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 236 | clientCipher := suite.cipher(clientKey, clientIV, true /* for reading */ ) |
| 237 | clientHash := suite.mac(clientMAC) |
| 238 | c.in.prepareCipherSpec(clientCipher, clientHash) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 239 | c.readRecord(recordTypeChangeCipherSpec) |
| 240 | if err := c.error(); err != nil { |
| 241 | return err |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 242 | } |
| 243 | |
Adam Langley | 9ebb596 | 2009-12-23 11:13:09 -0800 | [diff] [blame] | 244 | if hello.nextProtoNeg { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 245 | msg, err = c.readHandshake() |
| 246 | if err != nil { |
| 247 | return err |
| 248 | } |
| 249 | nextProto, ok := msg.(*nextProtoMsg) |
Adam Langley | 9ebb596 | 2009-12-23 11:13:09 -0800 | [diff] [blame] | 250 | if !ok { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 251 | return c.sendAlert(alertUnexpectedMessage) |
Adam Langley | 9ebb596 | 2009-12-23 11:13:09 -0800 | [diff] [blame] | 252 | } |
| 253 | finishedHash.Write(nextProto.marshal()) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 254 | c.clientProtocol = nextProto.proto |
Adam Langley | 9ebb596 | 2009-12-23 11:13:09 -0800 | [diff] [blame] | 255 | } |
| 256 | |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 257 | msg, err = c.readHandshake() |
| 258 | if err != nil { |
| 259 | return err |
| 260 | } |
| 261 | clientFinished, ok := msg.(*finishedMsg) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 262 | if !ok { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 263 | return c.sendAlert(alertUnexpectedMessage) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 264 | } |
| 265 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 266 | verify := finishedHash.clientSum(masterSecret) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 267 | if len(verify) != len(clientFinished.verifyData) || |
| 268 | subtle.ConstantTimeCompare(verify, clientFinished.verifyData) != 1 { |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 269 | return c.sendAlert(alertHandshakeFailure) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 270 | } |
| 271 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 272 | finishedHash.Write(clientFinished.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 273 | |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 274 | serverCipher := suite.cipher(serverKey, serverIV, false /* not for reading */ ) |
| 275 | serverHash := suite.mac(serverMAC) |
| 276 | c.out.prepareCipherSpec(serverCipher, serverHash) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 277 | c.writeRecord(recordTypeChangeCipherSpec, []byte{1}) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 278 | |
Robert Griesemer | 5a1d332 | 2009-12-15 15:33:31 -0800 | [diff] [blame] | 279 | finished := new(finishedMsg) |
| 280 | finished.verifyData = finishedHash.serverSum(masterSecret) |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 281 | c.writeRecord(recordTypeHandshake, finished.marshal()) |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 282 | |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 283 | c.handshakeComplete = true |
Adam Langley | eedf5c4 | 2010-12-15 11:49:55 -0500 | [diff] [blame] | 284 | c.cipherSuite = suiteId |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 285 | |
Russ Cox | 72d9322 | 2010-04-26 22:19:04 -0700 | [diff] [blame] | 286 | return nil |
Adam Langley | 5e598c5 | 2009-11-05 15:44:32 -0800 | [diff] [blame] | 287 | } |