mirror of
https://github.com/XTLS/REALITY.git
synced 2025-08-22 14:38:35 +00:00
crypto/tls: ensure the ECDSA curve matches the signature algorithm
Change-Id: I6a6a4656c1b47ba6bd652d4da18922cb6b80a8ab Reviewed-on: https://go-review.googlesource.com/c/go/+/675836 Reviewed-by: Roland Shoemaker <roland@golang.org> Auto-Submit: Filippo Valsorda <filippo@golang.org> TryBot-Bypass: Filippo Valsorda <filippo@golang.org> Reviewed-by: David Chase <drchase@google.com> Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
This commit is contained in:
parent
4a4e2b7bb3
commit
722d440e19
59
auth.go
59
auth.go
@ -163,73 +163,64 @@ var rsaSignatureSchemes = []struct {
|
|||||||
{PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11},
|
{PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11},
|
||||||
}
|
}
|
||||||
|
|
||||||
// signatureSchemesForCertificate returns the list of supported SignatureSchemes
|
func signatureSchemesForPublicKey(version uint16, pub crypto.PublicKey) []SignatureScheme {
|
||||||
// for a given certificate, based on the public key and the protocol version,
|
switch pub := pub.(type) {
|
||||||
// and optionally filtered by its explicit SupportedSignatureAlgorithms.
|
|
||||||
func signatureSchemesForCertificate(version uint16, cert *Certificate) []SignatureScheme {
|
|
||||||
priv, ok := cert.PrivateKey.(crypto.Signer)
|
|
||||||
if !ok {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
var sigAlgs []SignatureScheme
|
|
||||||
switch pub := priv.Public().(type) {
|
|
||||||
case *ecdsa.PublicKey:
|
case *ecdsa.PublicKey:
|
||||||
if version != VersionTLS13 {
|
if version < VersionTLS13 {
|
||||||
// In TLS 1.2 and earlier, ECDSA algorithms are not
|
// In TLS 1.2 and earlier, ECDSA algorithms are not
|
||||||
// constrained to a single curve.
|
// constrained to a single curve.
|
||||||
sigAlgs = []SignatureScheme{
|
return []SignatureScheme{
|
||||||
ECDSAWithP256AndSHA256,
|
ECDSAWithP256AndSHA256,
|
||||||
ECDSAWithP384AndSHA384,
|
ECDSAWithP384AndSHA384,
|
||||||
ECDSAWithP521AndSHA512,
|
ECDSAWithP521AndSHA512,
|
||||||
ECDSAWithSHA1,
|
ECDSAWithSHA1,
|
||||||
}
|
}
|
||||||
break
|
|
||||||
}
|
}
|
||||||
switch pub.Curve {
|
switch pub.Curve {
|
||||||
case elliptic.P256():
|
case elliptic.P256():
|
||||||
sigAlgs = []SignatureScheme{ECDSAWithP256AndSHA256}
|
return []SignatureScheme{ECDSAWithP256AndSHA256}
|
||||||
case elliptic.P384():
|
case elliptic.P384():
|
||||||
sigAlgs = []SignatureScheme{ECDSAWithP384AndSHA384}
|
return []SignatureScheme{ECDSAWithP384AndSHA384}
|
||||||
case elliptic.P521():
|
case elliptic.P521():
|
||||||
sigAlgs = []SignatureScheme{ECDSAWithP521AndSHA512}
|
return []SignatureScheme{ECDSAWithP521AndSHA512}
|
||||||
default:
|
default:
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
case *rsa.PublicKey:
|
case *rsa.PublicKey:
|
||||||
size := pub.Size()
|
size := pub.Size()
|
||||||
sigAlgs = make([]SignatureScheme, 0, len(rsaSignatureSchemes))
|
sigAlgs := make([]SignatureScheme, 0, len(rsaSignatureSchemes))
|
||||||
for _, candidate := range rsaSignatureSchemes {
|
for _, candidate := range rsaSignatureSchemes {
|
||||||
if size >= candidate.minModulusBytes {
|
if size >= candidate.minModulusBytes {
|
||||||
sigAlgs = append(sigAlgs, candidate.scheme)
|
sigAlgs = append(sigAlgs, candidate.scheme)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return sigAlgs
|
||||||
case ed25519.PublicKey:
|
case ed25519.PublicKey:
|
||||||
sigAlgs = []SignatureScheme{Ed25519}
|
return []SignatureScheme{Ed25519}
|
||||||
default:
|
default:
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if cert.SupportedSignatureAlgorithms != nil {
|
|
||||||
sigAlgs = slices.DeleteFunc(sigAlgs, func(sigAlg SignatureScheme) bool {
|
|
||||||
return !isSupportedSignatureAlgorithm(sigAlg, cert.SupportedSignatureAlgorithms)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// Filter out any unsupported signature algorithms, for example due to
|
|
||||||
// FIPS 140-3 policy, tlssha1=0, or protocol version.
|
|
||||||
sigAlgs = slices.DeleteFunc(sigAlgs, func(sigAlg SignatureScheme) bool {
|
|
||||||
return isDisabledSignatureAlgorithm(version, sigAlg, false)
|
|
||||||
})
|
|
||||||
|
|
||||||
return sigAlgs
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// selectSignatureScheme picks a SignatureScheme from the peer's preference list
|
// selectSignatureScheme picks a SignatureScheme from the peer's preference list
|
||||||
// that works with the selected certificate. It's only called for protocol
|
// that works with the selected certificate. It's only called for protocol
|
||||||
// versions that support signature algorithms, so TLS 1.2 and 1.3.
|
// versions that support signature algorithms, so TLS 1.2 and 1.3.
|
||||||
func selectSignatureScheme(vers uint16, c *Certificate, peerAlgs []SignatureScheme) (SignatureScheme, error) {
|
func selectSignatureScheme(vers uint16, c *Certificate, peerAlgs []SignatureScheme) (SignatureScheme, error) {
|
||||||
supportedAlgs := signatureSchemesForCertificate(vers, c)
|
priv, ok := c.PrivateKey.(crypto.Signer)
|
||||||
|
if !ok {
|
||||||
|
return 0, unsupportedCertificateError(c)
|
||||||
|
}
|
||||||
|
supportedAlgs := signatureSchemesForPublicKey(vers, priv.Public())
|
||||||
|
if c.SupportedSignatureAlgorithms != nil {
|
||||||
|
supportedAlgs = slices.DeleteFunc(supportedAlgs, func(sigAlg SignatureScheme) bool {
|
||||||
|
return !isSupportedSignatureAlgorithm(sigAlg, c.SupportedSignatureAlgorithms)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
// Filter out any unsupported signature algorithms, for example due to
|
||||||
|
// FIPS 140-3 policy, tlssha1=0, or protocol version.
|
||||||
|
supportedAlgs = slices.DeleteFunc(supportedAlgs, func(sigAlg SignatureScheme) bool {
|
||||||
|
return isDisabledSignatureAlgorithm(vers, sigAlg, false)
|
||||||
|
})
|
||||||
if len(supportedAlgs) == 0 {
|
if len(supportedAlgs) == 0 {
|
||||||
return 0, unsupportedCertificateError(c)
|
return 0, unsupportedCertificateError(c)
|
||||||
}
|
}
|
||||||
|
@ -677,7 +677,8 @@ func (hs *clientHandshakeStateTLS13) readServerCertificate() error {
|
|||||||
// See RFC 8446, Section 4.4.3.
|
// See RFC 8446, Section 4.4.3.
|
||||||
// We don't use hs.hello.supportedSignatureAlgorithms because it might
|
// We don't use hs.hello.supportedSignatureAlgorithms because it might
|
||||||
// include PKCS#1 v1.5 and SHA-1 if the ClientHello also supported TLS 1.2.
|
// include PKCS#1 v1.5 and SHA-1 if the ClientHello also supported TLS 1.2.
|
||||||
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) {
|
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) ||
|
||||||
|
!isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, signatureSchemesForPublicKey(c.vers, c.peerCertificates[0].PublicKey)) {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: certificate used with invalid signature algorithm")
|
return errors.New("tls: certificate used with invalid signature algorithm")
|
||||||
}
|
}
|
||||||
|
@ -1196,7 +1196,8 @@ func (hs *serverHandshakeStateTLS13) readClientCertificate() error {
|
|||||||
// See RFC 8446, Section 4.4.3.
|
// See RFC 8446, Section 4.4.3.
|
||||||
// We don't use certReq.supportedSignatureAlgorithms because it would
|
// We don't use certReq.supportedSignatureAlgorithms because it would
|
||||||
// require keeping the certificateRequestMsgTLS13 around in the hs.
|
// require keeping the certificateRequestMsgTLS13 around in the hs.
|
||||||
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) {
|
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) ||
|
||||||
|
!isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, signatureSchemesForPublicKey(c.vers, c.peerCertificates[0].PublicKey)) {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: client certificate used with invalid signature algorithm")
|
return errors.New("tls: client certificate used with invalid signature algorithm")
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user