crypto.go 6.69 KB
Newer Older
Marten Seemann's avatar
Marten Seemann committed
1 2 3
package libp2ptls

import (
Marten Seemann's avatar
Marten Seemann committed
4 5
	"crypto/ecdsa"
	"crypto/elliptic"
Marten Seemann's avatar
Marten Seemann committed
6 7 8
	"crypto/rand"
	"crypto/tls"
	"crypto/x509"
Marten Seemann's avatar
Marten Seemann committed
9 10
	"crypto/x509/pkix"
	"encoding/asn1"
Marten Seemann's avatar
Marten Seemann committed
11
	"errors"
Marten Seemann's avatar
Marten Seemann committed
12
	"fmt"
Marten Seemann's avatar
Marten Seemann committed
13 14 15
	"math/big"
	"time"

16 17
	"golang.org/x/sys/cpu"

18 19
	ic "github.com/libp2p/go-libp2p-core/crypto"
	"github.com/libp2p/go-libp2p-core/peer"
Marten Seemann's avatar
Marten Seemann committed
20 21
)

Marten Seemann's avatar
Marten Seemann committed
22
const certValidityPeriod = 100 * 365 * 24 * time.Hour // ~100 years
23
const certificatePrefix = "libp2p-tls-handshake:"
24
const alpn string = "libp2p"
Marten Seemann's avatar
Marten Seemann committed
25 26 27 28 29 30 31

var extensionID = getPrefixedExtensionID([]int{1, 1})

type signedKey struct {
	PubKey    []byte
	Signature []byte
}
32

Marten Seemann's avatar
Marten Seemann committed
33 34
// Identity is used to secure connections
type Identity struct {
35
	config tls.Config
Marten Seemann's avatar
Marten Seemann committed
36 37 38
}

// NewIdentity creates a new identity
39
func NewIdentity(privKey ic.PrivKey) (*Identity, error) {
Marten Seemann's avatar
Marten Seemann committed
40
	cert, err := keyToCertificate(privKey)
Marten Seemann's avatar
Marten Seemann committed
41 42 43
	if err != nil {
		return nil, err
	}
44 45
	return &Identity{
		config: tls.Config{
46 47 48 49 50
			MinVersion:               tls.VersionTLS13,
			PreferServerCipherSuites: preferServerCipherSuites(),
			InsecureSkipVerify:       true, // This is not insecure here. We will verify the cert chain ourselves.
			ClientAuth:               tls.RequireAnyClientCert,
			Certificates:             []tls.Certificate{*cert},
51 52 53
			VerifyPeerCertificate: func(_ [][]byte, _ [][]*x509.Certificate) error {
				panic("tls config not specialized for peer")
			},
54
			NextProtos:             []string{alpn},
Marten Seemann's avatar
Marten Seemann committed
55
			SessionTicketsDisabled: true,
56 57 58 59 60 61 62
		},
	}, nil
}

// ConfigForAny is a short-hand for ConfigForPeer("").
func (i *Identity) ConfigForAny() (*tls.Config, <-chan ic.PubKey) {
	return i.ConfigForPeer("")
Marten Seemann's avatar
Marten Seemann committed
63 64
}

65 66 67 68 69 70
// ConfigForPeer creates a new single-use tls.Config that verifies the peer's
// certificate chain and returns the peer's public key via the channel. If the
// peer ID is empty, the returned config will accept any peer.
//
// It should be used to create a new tls.Config before securing either an
// incoming or outgoing connection.
71 72
func (i *Identity) ConfigForPeer(
	remote peer.ID,
73 74
) (*tls.Config, <-chan ic.PubKey) {
	keyCh := make(chan ic.PubKey, 1)
Marten Seemann's avatar
Marten Seemann committed
75 76 77
	// We need to check the peer ID in the VerifyPeerCertificate callback.
	// The tls.Config it is also used for listening, and we might also have concurrent dials.
	// Clone it so we can check for the specific peer ID we're dialing here.
78
	conf := i.config.Clone()
Marten Seemann's avatar
Marten Seemann committed
79 80 81
	// We're using InsecureSkipVerify, so the verifiedChains parameter will always be empty.
	// We need to parse the certificates ourselves from the raw certs.
	conf.VerifyPeerCertificate = func(rawCerts [][]byte, _ [][]*x509.Certificate) error {
82 83
		defer close(keyCh)

Marten Seemann's avatar
Marten Seemann committed
84 85 86 87 88 89 90 91
		chain := make([]*x509.Certificate, len(rawCerts))
		for i := 0; i < len(rawCerts); i++ {
			cert, err := x509.ParseCertificate(rawCerts[i])
			if err != nil {
				return err
			}
			chain[i] = cert
		}
92

Marten Seemann's avatar
Marten Seemann committed
93 94 95 96
		pubKey, err := getRemotePubKey(chain)
		if err != nil {
			return err
		}
97
		if remote != "" && !remote.MatchesPublicKey(pubKey) {
Marten Seemann's avatar
Marten Seemann committed
98 99
			return errors.New("peer IDs don't match")
		}
100
		keyCh <- pubKey
Marten Seemann's avatar
Marten Seemann committed
101 102
		return nil
	}
103
	return conf, keyCh
Marten Seemann's avatar
Marten Seemann committed
104 105
}

106
// getRemotePubKey derives the remote's public key from the certificate chain.
Marten Seemann's avatar
Marten Seemann committed
107 108 109 110
func getRemotePubKey(chain []*x509.Certificate) (ic.PubKey, error) {
	if len(chain) != 1 {
		return nil, errors.New("expected one certificates in the chain")
	}
Marten Seemann's avatar
Marten Seemann committed
111
	cert := chain[0]
Marten Seemann's avatar
Marten Seemann committed
112
	pool := x509.NewCertPool()
Marten Seemann's avatar
Marten Seemann committed
113 114
	pool.AddCert(cert)
	if _, err := cert.Verify(x509.VerifyOptions{Roots: pool}); err != nil {
115 116 117
		// If we return an x509 error here, it will be sent on the wire.
		// Wrap the error to avoid that.
		return nil, fmt.Errorf("certificate verification failed: %s", err)
Marten Seemann's avatar
Marten Seemann committed
118
	}
Marten Seemann's avatar
Marten Seemann committed
119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136

	var found bool
	var keyExt pkix.Extension
	// find the libp2p key extension, skipping all unknown extensions
	for _, ext := range cert.Extensions {
		if extensionIDEqual(ext.Id, extensionID) {
			keyExt = ext
			found = true
			break
		}
	}
	if !found {
		return nil, errors.New("expected certificate to contain the key extension")
	}
	var sk signedKey
	if _, err := asn1.Unmarshal(keyExt.Value, &sk); err != nil {
		return nil, fmt.Errorf("unmarshalling signed certificate failed: %s", err)
	}
137
	pubKey, err := ic.UnmarshalPublicKey(sk.PubKey)
Marten Seemann's avatar
Marten Seemann committed
138 139 140 141
	if err != nil {
		return nil, fmt.Errorf("unmarshalling public key failed: %s", err)
	}
	certKeyPub, err := x509.MarshalPKIXPublicKey(cert.PublicKey)
Marten Seemann's avatar
Marten Seemann committed
142 143 144
	if err != nil {
		return nil, err
	}
145
	valid, err := pubKey.Verify(append([]byte(certificatePrefix), certKeyPub...), sk.Signature)
Marten Seemann's avatar
Marten Seemann committed
146 147
	if err != nil {
		return nil, fmt.Errorf("signature verification failed: %s", err)
Marten Seemann's avatar
Marten Seemann committed
148
	}
Marten Seemann's avatar
Marten Seemann committed
149 150 151 152
	if !valid {
		return nil, errors.New("signature invalid")
	}
	return pubKey, nil
Marten Seemann's avatar
Marten Seemann committed
153 154
}

Marten Seemann's avatar
Marten Seemann committed
155 156
func keyToCertificate(sk ic.PrivKey) (*tls.Certificate, error) {
	certKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
Marten Seemann's avatar
Marten Seemann committed
157
	if err != nil {
Marten Seemann's avatar
Marten Seemann committed
158
		return nil, err
Marten Seemann's avatar
Marten Seemann committed
159 160
	}

161
	keyBytes, err := ic.MarshalPublicKey(sk.GetPublic())
Marten Seemann's avatar
Marten Seemann committed
162
	if err != nil {
Marten Seemann's avatar
Marten Seemann committed
163
		return nil, err
Marten Seemann's avatar
Marten Seemann committed
164
	}
Marten Seemann's avatar
Marten Seemann committed
165 166 167 168
	certKeyPub, err := x509.MarshalPKIXPublicKey(certKey.Public())
	if err != nil {
		return nil, err
	}
169
	signature, err := sk.Sign(append([]byte(certificatePrefix), certKeyPub...))
Marten Seemann's avatar
Marten Seemann committed
170 171 172 173 174 175 176 177 178
	if err != nil {
		return nil, err
	}
	value, err := asn1.Marshal(signedKey{
		PubKey:    keyBytes,
		Signature: signature,
	})
	if err != nil {
		return nil, err
Marten Seemann's avatar
Marten Seemann committed
179
	}
Marten Seemann's avatar
Marten Seemann committed
180 181

	sn, err := rand.Int(rand.Reader, big.NewInt(1<<62))
Marten Seemann's avatar
Marten Seemann committed
182
	if err != nil {
Marten Seemann's avatar
Marten Seemann committed
183 184 185 186 187 188 189 190 191 192
		return nil, err
	}
	tmpl := &x509.Certificate{
		SerialNumber: sn,
		NotBefore:    time.Time{},
		NotAfter:     time.Now().Add(certValidityPeriod),
		// after calling CreateCertificate, these will end up in Certificate.Extensions
		ExtraExtensions: []pkix.Extension{
			{Id: extensionID, Value: value},
		},
Marten Seemann's avatar
Marten Seemann committed
193
	}
Marten Seemann's avatar
Marten Seemann committed
194
	certDER, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, certKey.Public(), certKey)
Marten Seemann's avatar
Marten Seemann committed
195
	if err != nil {
Marten Seemann's avatar
Marten Seemann committed
196
		return nil, err
Marten Seemann's avatar
Marten Seemann committed
197
	}
Marten Seemann's avatar
Marten Seemann committed
198 199 200 201
	return &tls.Certificate{
		Certificate: [][]byte{certDER},
		PrivateKey:  certKey,
	}, nil
Marten Seemann's avatar
Marten Seemann committed
202
}
203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224

// We want nodes without AES hardware (e.g. ARM) support to always use ChaCha.
// Only if both nodes have AES hardware support (e.g. x86), AES should be used.
// x86->x86: AES, ARM->x86: ChaCha, x86->ARM: ChaCha and ARM->ARM: Chacha
// This function returns true if we don't have AES hardware support, and false otherwise.
// Thus, ARM servers will always use their own cipher suite preferences (ChaCha first),
// and x86 servers will aways use the client's cipher suite preferences.
func preferServerCipherSuites() bool {
	// Copied from the Go TLS implementation.

	// Check the cpu flags for each platform that has optimized GCM implementations.
	// Worst case, these variables will just all be false.
	var (
		hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
		hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
		// Keep in sync with crypto/aes/cipher_s390x.go.
		hasGCMAsmS390X = cpu.S390X.HasAES && cpu.S390X.HasAESCBC && cpu.S390X.HasAESCTR && (cpu.S390X.HasGHASH || cpu.S390X.HasAESGCM)

		hasGCMAsm = hasGCMAsmAMD64 || hasGCMAsmARM64 || hasGCMAsmS390X
	)
	return !hasGCMAsm
}