github.com/miolini/go@v0.0.0-20160405192216-fca68c8cb408/src/crypto/tls/handshake_client.go (about) 1 // Copyright 2009 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package tls 6 7 import ( 8 "bytes" 9 "crypto" 10 "crypto/ecdsa" 11 "crypto/rsa" 12 "crypto/subtle" 13 "crypto/x509" 14 "errors" 15 "fmt" 16 "io" 17 "net" 18 "strconv" 19 "strings" 20 ) 21 22 type clientHandshakeState struct { 23 c *Conn 24 serverHello *serverHelloMsg 25 hello *clientHelloMsg 26 suite *cipherSuite 27 finishedHash finishedHash 28 masterSecret []byte 29 session *ClientSessionState 30 } 31 32 func (c *Conn) clientHandshake() error { 33 if c.config == nil { 34 c.config = defaultConfig() 35 } 36 37 if len(c.config.ServerName) == 0 && !c.config.InsecureSkipVerify { 38 return errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config") 39 } 40 41 nextProtosLength := 0 42 for _, proto := range c.config.NextProtos { 43 if l := len(proto); l == 0 || l > 255 { 44 return errors.New("tls: invalid NextProtos value") 45 } else { 46 nextProtosLength += 1 + l 47 } 48 } 49 if nextProtosLength > 0xffff { 50 return errors.New("tls: NextProtos values too large") 51 } 52 53 hello := &clientHelloMsg{ 54 vers: c.config.maxVersion(), 55 compressionMethods: []uint8{compressionNone}, 56 random: make([]byte, 32), 57 ocspStapling: true, 58 scts: true, 59 serverName: hostnameInSNI(c.config.ServerName), 60 supportedCurves: c.config.curvePreferences(), 61 supportedPoints: []uint8{pointFormatUncompressed}, 62 nextProtoNeg: len(c.config.NextProtos) > 0, 63 secureRenegotiation: true, 64 alpnProtocols: c.config.NextProtos, 65 } 66 67 possibleCipherSuites := c.config.cipherSuites() 68 hello.cipherSuites = make([]uint16, 0, len(possibleCipherSuites)) 69 70 NextCipherSuite: 71 for _, suiteId := range possibleCipherSuites { 72 for _, suite := range cipherSuites { 73 if suite.id != suiteId { 74 continue 75 } 76 // Don't advertise TLS 1.2-only cipher suites unless 77 // we're attempting TLS 1.2. 78 if hello.vers < VersionTLS12 && suite.flags&suiteTLS12 != 0 { 79 continue 80 } 81 hello.cipherSuites = append(hello.cipherSuites, suiteId) 82 continue NextCipherSuite 83 } 84 } 85 86 _, err := io.ReadFull(c.config.rand(), hello.random) 87 if err != nil { 88 c.sendAlert(alertInternalError) 89 return errors.New("tls: short read from Rand: " + err.Error()) 90 } 91 92 if hello.vers >= VersionTLS12 { 93 hello.signatureAndHashes = supportedSignatureAlgorithms 94 } 95 96 var session *ClientSessionState 97 var cacheKey string 98 sessionCache := c.config.ClientSessionCache 99 if c.config.SessionTicketsDisabled { 100 sessionCache = nil 101 } 102 103 if sessionCache != nil { 104 hello.ticketSupported = true 105 106 // Try to resume a previously negotiated TLS session, if 107 // available. 108 cacheKey = clientSessionCacheKey(c.conn.RemoteAddr(), c.config) 109 candidateSession, ok := sessionCache.Get(cacheKey) 110 if ok { 111 // Check that the ciphersuite/version used for the 112 // previous session are still valid. 113 cipherSuiteOk := false 114 for _, id := range hello.cipherSuites { 115 if id == candidateSession.cipherSuite { 116 cipherSuiteOk = true 117 break 118 } 119 } 120 121 versOk := candidateSession.vers >= c.config.minVersion() && 122 candidateSession.vers <= c.config.maxVersion() 123 if versOk && cipherSuiteOk { 124 session = candidateSession 125 } 126 } 127 } 128 129 if session != nil { 130 hello.sessionTicket = session.sessionTicket 131 // A random session ID is used to detect when the 132 // server accepted the ticket and is resuming a session 133 // (see RFC 5077). 134 hello.sessionId = make([]byte, 16) 135 if _, err := io.ReadFull(c.config.rand(), hello.sessionId); err != nil { 136 c.sendAlert(alertInternalError) 137 return errors.New("tls: short read from Rand: " + err.Error()) 138 } 139 } 140 141 if _, err := c.writeRecord(recordTypeHandshake, hello.marshal()); err != nil { 142 return err 143 } 144 145 msg, err := c.readHandshake() 146 if err != nil { 147 return err 148 } 149 serverHello, ok := msg.(*serverHelloMsg) 150 if !ok { 151 c.sendAlert(alertUnexpectedMessage) 152 return unexpectedMessageError(serverHello, msg) 153 } 154 155 vers, ok := c.config.mutualVersion(serverHello.vers) 156 if !ok || vers < VersionTLS10 { 157 // TLS 1.0 is the minimum version supported as a client. 158 c.sendAlert(alertProtocolVersion) 159 return fmt.Errorf("tls: server selected unsupported protocol version %x", serverHello.vers) 160 } 161 c.vers = vers 162 c.haveVers = true 163 164 suite := mutualCipherSuite(hello.cipherSuites, serverHello.cipherSuite) 165 if suite == nil { 166 c.sendAlert(alertHandshakeFailure) 167 return errors.New("tls: server chose an unconfigured cipher suite") 168 } 169 170 hs := &clientHandshakeState{ 171 c: c, 172 serverHello: serverHello, 173 hello: hello, 174 suite: suite, 175 finishedHash: newFinishedHash(c.vers, suite), 176 session: session, 177 } 178 179 isResume, err := hs.processServerHello() 180 if err != nil { 181 return err 182 } 183 184 // No signatures of the handshake are needed in a resumption. 185 // Otherwise, in a full handshake, if we don't have any certificates 186 // configured then we will never send a CertificateVerify message and 187 // thus no signatures are needed in that case either. 188 if isResume || len(c.config.Certificates) == 0 { 189 hs.finishedHash.discardHandshakeBuffer() 190 } 191 192 hs.finishedHash.Write(hs.hello.marshal()) 193 hs.finishedHash.Write(hs.serverHello.marshal()) 194 195 if isResume { 196 if err := hs.establishKeys(); err != nil { 197 return err 198 } 199 if err := hs.readSessionTicket(); err != nil { 200 return err 201 } 202 if err := hs.readFinished(c.firstFinished[:]); err != nil { 203 return err 204 } 205 if err := hs.sendFinished(nil); err != nil { 206 return err 207 } 208 } else { 209 if err := hs.doFullHandshake(); err != nil { 210 return err 211 } 212 if err := hs.establishKeys(); err != nil { 213 return err 214 } 215 if err := hs.sendFinished(c.firstFinished[:]); err != nil { 216 return err 217 } 218 if err := hs.readSessionTicket(); err != nil { 219 return err 220 } 221 if err := hs.readFinished(nil); err != nil { 222 return err 223 } 224 } 225 226 if sessionCache != nil && hs.session != nil && session != hs.session { 227 sessionCache.Put(cacheKey, hs.session) 228 } 229 230 c.didResume = isResume 231 c.handshakeComplete = true 232 c.cipherSuite = suite.id 233 return nil 234 } 235 236 func (hs *clientHandshakeState) doFullHandshake() error { 237 c := hs.c 238 239 msg, err := c.readHandshake() 240 if err != nil { 241 return err 242 } 243 certMsg, ok := msg.(*certificateMsg) 244 if !ok || len(certMsg.certificates) == 0 { 245 c.sendAlert(alertUnexpectedMessage) 246 return unexpectedMessageError(certMsg, msg) 247 } 248 hs.finishedHash.Write(certMsg.marshal()) 249 250 certs := make([]*x509.Certificate, len(certMsg.certificates)) 251 for i, asn1Data := range certMsg.certificates { 252 cert, err := x509.ParseCertificate(asn1Data) 253 if err != nil { 254 c.sendAlert(alertBadCertificate) 255 return errors.New("tls: failed to parse certificate from server: " + err.Error()) 256 } 257 certs[i] = cert 258 } 259 260 if !c.config.InsecureSkipVerify { 261 opts := x509.VerifyOptions{ 262 Roots: c.config.RootCAs, 263 CurrentTime: c.config.time(), 264 DNSName: c.config.ServerName, 265 Intermediates: x509.NewCertPool(), 266 } 267 268 for i, cert := range certs { 269 if i == 0 { 270 continue 271 } 272 opts.Intermediates.AddCert(cert) 273 } 274 c.verifiedChains, err = certs[0].Verify(opts) 275 if err != nil { 276 c.sendAlert(alertBadCertificate) 277 return err 278 } 279 } 280 281 switch certs[0].PublicKey.(type) { 282 case *rsa.PublicKey, *ecdsa.PublicKey: 283 break 284 default: 285 c.sendAlert(alertUnsupportedCertificate) 286 return fmt.Errorf("tls: server's certificate contains an unsupported type of public key: %T", certs[0].PublicKey) 287 } 288 289 c.peerCertificates = certs 290 291 if hs.serverHello.ocspStapling { 292 msg, err = c.readHandshake() 293 if err != nil { 294 return err 295 } 296 cs, ok := msg.(*certificateStatusMsg) 297 if !ok { 298 c.sendAlert(alertUnexpectedMessage) 299 return unexpectedMessageError(cs, msg) 300 } 301 hs.finishedHash.Write(cs.marshal()) 302 303 if cs.statusType == statusTypeOCSP { 304 c.ocspResponse = cs.response 305 } 306 } 307 308 msg, err = c.readHandshake() 309 if err != nil { 310 return err 311 } 312 313 keyAgreement := hs.suite.ka(c.vers) 314 315 skx, ok := msg.(*serverKeyExchangeMsg) 316 if ok { 317 hs.finishedHash.Write(skx.marshal()) 318 err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, certs[0], skx) 319 if err != nil { 320 c.sendAlert(alertUnexpectedMessage) 321 return err 322 } 323 324 msg, err = c.readHandshake() 325 if err != nil { 326 return err 327 } 328 } 329 330 var chainToSend *Certificate 331 var certRequested bool 332 certReq, ok := msg.(*certificateRequestMsg) 333 if ok { 334 certRequested = true 335 336 // RFC 4346 on the certificateAuthorities field: 337 // A list of the distinguished names of acceptable certificate 338 // authorities. These distinguished names may specify a desired 339 // distinguished name for a root CA or for a subordinate CA; 340 // thus, this message can be used to describe both known roots 341 // and a desired authorization space. If the 342 // certificate_authorities list is empty then the client MAY 343 // send any certificate of the appropriate 344 // ClientCertificateType, unless there is some external 345 // arrangement to the contrary. 346 347 hs.finishedHash.Write(certReq.marshal()) 348 349 var rsaAvail, ecdsaAvail bool 350 for _, certType := range certReq.certificateTypes { 351 switch certType { 352 case certTypeRSASign: 353 rsaAvail = true 354 case certTypeECDSASign: 355 ecdsaAvail = true 356 } 357 } 358 359 // We need to search our list of client certs for one 360 // where SignatureAlgorithm is acceptable to the server and the 361 // Issuer is in certReq.certificateAuthorities 362 findCert: 363 for i, chain := range c.config.Certificates { 364 if !rsaAvail && !ecdsaAvail { 365 continue 366 } 367 368 for j, cert := range chain.Certificate { 369 x509Cert := chain.Leaf 370 // parse the certificate if this isn't the leaf 371 // node, or if chain.Leaf was nil 372 if j != 0 || x509Cert == nil { 373 if x509Cert, err = x509.ParseCertificate(cert); err != nil { 374 c.sendAlert(alertInternalError) 375 return errors.New("tls: failed to parse client certificate #" + strconv.Itoa(i) + ": " + err.Error()) 376 } 377 } 378 379 switch { 380 case rsaAvail && x509Cert.PublicKeyAlgorithm == x509.RSA: 381 case ecdsaAvail && x509Cert.PublicKeyAlgorithm == x509.ECDSA: 382 default: 383 continue findCert 384 } 385 386 if len(certReq.certificateAuthorities) == 0 { 387 // they gave us an empty list, so just take the 388 // first cert from c.config.Certificates 389 chainToSend = &chain 390 break findCert 391 } 392 393 for _, ca := range certReq.certificateAuthorities { 394 if bytes.Equal(x509Cert.RawIssuer, ca) { 395 chainToSend = &chain 396 break findCert 397 } 398 } 399 } 400 } 401 402 msg, err = c.readHandshake() 403 if err != nil { 404 return err 405 } 406 } 407 408 shd, ok := msg.(*serverHelloDoneMsg) 409 if !ok { 410 c.sendAlert(alertUnexpectedMessage) 411 return unexpectedMessageError(shd, msg) 412 } 413 hs.finishedHash.Write(shd.marshal()) 414 415 // If the server requested a certificate then we have to send a 416 // Certificate message, even if it's empty because we don't have a 417 // certificate to send. 418 if certRequested { 419 certMsg = new(certificateMsg) 420 if chainToSend != nil { 421 certMsg.certificates = chainToSend.Certificate 422 } 423 hs.finishedHash.Write(certMsg.marshal()) 424 if _, err := c.writeRecord(recordTypeHandshake, certMsg.marshal()); err != nil { 425 return err 426 } 427 } 428 429 preMasterSecret, ckx, err := keyAgreement.generateClientKeyExchange(c.config, hs.hello, certs[0]) 430 if err != nil { 431 c.sendAlert(alertInternalError) 432 return err 433 } 434 if ckx != nil { 435 hs.finishedHash.Write(ckx.marshal()) 436 if _, err := c.writeRecord(recordTypeHandshake, ckx.marshal()); err != nil { 437 return err 438 } 439 } 440 441 if chainToSend != nil { 442 certVerify := &certificateVerifyMsg{ 443 hasSignatureAndHash: c.vers >= VersionTLS12, 444 } 445 446 key, ok := chainToSend.PrivateKey.(crypto.Signer) 447 if !ok { 448 c.sendAlert(alertInternalError) 449 return fmt.Errorf("tls: client certificate private key of type %T does not implement crypto.Signer", chainToSend.PrivateKey) 450 } 451 452 var signatureType uint8 453 switch key.Public().(type) { 454 case *ecdsa.PublicKey: 455 signatureType = signatureECDSA 456 case *rsa.PublicKey: 457 signatureType = signatureRSA 458 default: 459 c.sendAlert(alertInternalError) 460 return fmt.Errorf("tls: failed to sign handshake with client certificate: unknown client certificate key type: %T", key) 461 } 462 463 certVerify.signatureAndHash, err = hs.finishedHash.selectClientCertSignatureAlgorithm(certReq.signatureAndHashes, signatureType) 464 if err != nil { 465 c.sendAlert(alertInternalError) 466 return err 467 } 468 digest, hashFunc, err := hs.finishedHash.hashForClientCertificate(certVerify.signatureAndHash, hs.masterSecret) 469 if err != nil { 470 c.sendAlert(alertInternalError) 471 return err 472 } 473 certVerify.signature, err = key.Sign(c.config.rand(), digest, hashFunc) 474 if err != nil { 475 c.sendAlert(alertInternalError) 476 return err 477 } 478 479 hs.finishedHash.Write(certVerify.marshal()) 480 if _, err := c.writeRecord(recordTypeHandshake, certVerify.marshal()); err != nil { 481 return err 482 } 483 } 484 485 hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.hello.random, hs.serverHello.random) 486 487 hs.finishedHash.discardHandshakeBuffer() 488 489 return nil 490 } 491 492 func (hs *clientHandshakeState) establishKeys() error { 493 c := hs.c 494 495 clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV := 496 keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen) 497 var clientCipher, serverCipher interface{} 498 var clientHash, serverHash macFunction 499 if hs.suite.cipher != nil { 500 clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */) 501 clientHash = hs.suite.mac(c.vers, clientMAC) 502 serverCipher = hs.suite.cipher(serverKey, serverIV, true /* for reading */) 503 serverHash = hs.suite.mac(c.vers, serverMAC) 504 } else { 505 clientCipher = hs.suite.aead(clientKey, clientIV) 506 serverCipher = hs.suite.aead(serverKey, serverIV) 507 } 508 509 c.in.prepareCipherSpec(c.vers, serverCipher, serverHash) 510 c.out.prepareCipherSpec(c.vers, clientCipher, clientHash) 511 return nil 512 } 513 514 func (hs *clientHandshakeState) serverResumedSession() bool { 515 // If the server responded with the same sessionId then it means the 516 // sessionTicket is being used to resume a TLS session. 517 return hs.session != nil && hs.hello.sessionId != nil && 518 bytes.Equal(hs.serverHello.sessionId, hs.hello.sessionId) 519 } 520 521 func (hs *clientHandshakeState) processServerHello() (bool, error) { 522 c := hs.c 523 524 if hs.serverHello.compressionMethod != compressionNone { 525 c.sendAlert(alertUnexpectedMessage) 526 return false, errors.New("tls: server selected unsupported compression format") 527 } 528 529 clientDidNPN := hs.hello.nextProtoNeg 530 clientDidALPN := len(hs.hello.alpnProtocols) > 0 531 serverHasNPN := hs.serverHello.nextProtoNeg 532 serverHasALPN := len(hs.serverHello.alpnProtocol) > 0 533 534 if !clientDidNPN && serverHasNPN { 535 c.sendAlert(alertHandshakeFailure) 536 return false, errors.New("server advertised unrequested NPN extension") 537 } 538 539 if !clientDidALPN && serverHasALPN { 540 c.sendAlert(alertHandshakeFailure) 541 return false, errors.New("server advertised unrequested ALPN extension") 542 } 543 544 if serverHasNPN && serverHasALPN { 545 c.sendAlert(alertHandshakeFailure) 546 return false, errors.New("server advertised both NPN and ALPN extensions") 547 } 548 549 if serverHasALPN { 550 c.clientProtocol = hs.serverHello.alpnProtocol 551 c.clientProtocolFallback = false 552 } 553 c.scts = hs.serverHello.scts 554 555 if !hs.serverResumedSession() { 556 return false, nil 557 } 558 559 // Restore masterSecret and peerCerts from previous state 560 hs.masterSecret = hs.session.masterSecret 561 c.peerCertificates = hs.session.serverCertificates 562 c.verifiedChains = hs.session.verifiedChains 563 return true, nil 564 } 565 566 func (hs *clientHandshakeState) readFinished(out []byte) error { 567 c := hs.c 568 569 c.readRecord(recordTypeChangeCipherSpec) 570 if err := c.in.error(); err != nil { 571 return err 572 } 573 574 msg, err := c.readHandshake() 575 if err != nil { 576 return err 577 } 578 serverFinished, ok := msg.(*finishedMsg) 579 if !ok { 580 c.sendAlert(alertUnexpectedMessage) 581 return unexpectedMessageError(serverFinished, msg) 582 } 583 584 verify := hs.finishedHash.serverSum(hs.masterSecret) 585 if len(verify) != len(serverFinished.verifyData) || 586 subtle.ConstantTimeCompare(verify, serverFinished.verifyData) != 1 { 587 c.sendAlert(alertHandshakeFailure) 588 return errors.New("tls: server's Finished message was incorrect") 589 } 590 hs.finishedHash.Write(serverFinished.marshal()) 591 copy(out, verify) 592 return nil 593 } 594 595 func (hs *clientHandshakeState) readSessionTicket() error { 596 if !hs.serverHello.ticketSupported { 597 return nil 598 } 599 600 c := hs.c 601 msg, err := c.readHandshake() 602 if err != nil { 603 return err 604 } 605 sessionTicketMsg, ok := msg.(*newSessionTicketMsg) 606 if !ok { 607 c.sendAlert(alertUnexpectedMessage) 608 return unexpectedMessageError(sessionTicketMsg, msg) 609 } 610 hs.finishedHash.Write(sessionTicketMsg.marshal()) 611 612 hs.session = &ClientSessionState{ 613 sessionTicket: sessionTicketMsg.ticket, 614 vers: c.vers, 615 cipherSuite: hs.suite.id, 616 masterSecret: hs.masterSecret, 617 serverCertificates: c.peerCertificates, 618 verifiedChains: c.verifiedChains, 619 } 620 621 return nil 622 } 623 624 func (hs *clientHandshakeState) sendFinished(out []byte) error { 625 c := hs.c 626 627 if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil { 628 return err 629 } 630 if hs.serverHello.nextProtoNeg { 631 nextProto := new(nextProtoMsg) 632 proto, fallback := mutualProtocol(c.config.NextProtos, hs.serverHello.nextProtos) 633 nextProto.proto = proto 634 c.clientProtocol = proto 635 c.clientProtocolFallback = fallback 636 637 hs.finishedHash.Write(nextProto.marshal()) 638 if _, err := c.writeRecord(recordTypeHandshake, nextProto.marshal()); err != nil { 639 return err 640 } 641 } 642 643 finished := new(finishedMsg) 644 finished.verifyData = hs.finishedHash.clientSum(hs.masterSecret) 645 hs.finishedHash.Write(finished.marshal()) 646 if _, err := c.writeRecord(recordTypeHandshake, finished.marshal()); err != nil { 647 return err 648 } 649 copy(out, finished.verifyData) 650 return nil 651 } 652 653 // clientSessionCacheKey returns a key used to cache sessionTickets that could 654 // be used to resume previously negotiated TLS sessions with a server. 655 func clientSessionCacheKey(serverAddr net.Addr, config *Config) string { 656 if len(config.ServerName) > 0 { 657 return config.ServerName 658 } 659 return serverAddr.String() 660 } 661 662 // mutualProtocol finds the mutual Next Protocol Negotiation or ALPN protocol 663 // given list of possible protocols and a list of the preference order. The 664 // first list must not be empty. It returns the resulting protocol and flag 665 // indicating if the fallback case was reached. 666 func mutualProtocol(protos, preferenceProtos []string) (string, bool) { 667 for _, s := range preferenceProtos { 668 for _, c := range protos { 669 if s == c { 670 return s, false 671 } 672 } 673 } 674 675 return protos[0], true 676 } 677 678 // hostnameInSNI converts name into an approriate hostname for SNI. 679 // Literal IP addresses and absolute FQDNs are not permitted as SNI values. 680 // See https://tools.ietf.org/html/rfc6066#section-3. 681 func hostnameInSNI(name string) string { 682 host := name 683 if len(host) > 0 && host[0] == '[' && host[len(host)-1] == ']' { 684 host = host[1 : len(host)-1] 685 } 686 if i := strings.LastIndex(host, "%"); i > 0 { 687 host = host[:i] 688 } 689 if net.ParseIP(host) != nil { 690 return "" 691 } 692 if len(name) > 0 && name[len(name)-1] == '.' { 693 name = name[:len(name)-1] 694 } 695 return name 696 }