Check SRP parameters early.
Check SRP parameters when they are received so we can send back an appropriate alert. Reviewed-by: Kurt Roeckx <kurt@openssl.org>
This commit is contained in:
parent
966fe81f9b
commit
d15d17bb64
@ -1469,6 +1469,12 @@ int ssl3_get_key_exchange(SSL *s)
|
|||||||
p+=i;
|
p+=i;
|
||||||
n-=param_len;
|
n-=param_len;
|
||||||
|
|
||||||
|
if (!srp_verify_server_param(s, &al))
|
||||||
|
{
|
||||||
|
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE,SSL_R_BAD_SRP_PARAMETERS);
|
||||||
|
goto f_err;
|
||||||
|
}
|
||||||
|
|
||||||
/* We must check if there is a certificate */
|
/* We must check if there is a certificate */
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
if (alg_a & SSL_aRSA)
|
if (alg_a & SSL_aRSA)
|
||||||
|
@ -2795,6 +2795,13 @@ int ssl3_get_client_key_exchange(SSL *s)
|
|||||||
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,ERR_R_BN_LIB);
|
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,ERR_R_BN_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
if (BN_ucmp(s->srp_ctx.A, s->srp_ctx.N) >= 0
|
||||||
|
|| BN_is_zero(s->srp_ctx.A))
|
||||||
|
{
|
||||||
|
al=SSL_AD_ILLEGAL_PARAMETER;
|
||||||
|
SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_SRP_PARAMETERS);
|
||||||
|
goto f_err;
|
||||||
|
}
|
||||||
if (s->session->srp_username != NULL)
|
if (s->session->srp_username != NULL)
|
||||||
OPENSSL_free(s->session->srp_username);
|
OPENSSL_free(s->session->srp_username);
|
||||||
s->session->srp_username = BUF_strdup(s->srp_ctx.login);
|
s->session->srp_username = BUF_strdup(s->srp_ctx.login);
|
||||||
|
@ -2325,6 +2325,7 @@ void ERR_load_SSL_strings(void);
|
|||||||
#define SSL_R_BAD_SRP_B_LENGTH 348
|
#define SSL_R_BAD_SRP_B_LENGTH 348
|
||||||
#define SSL_R_BAD_SRP_G_LENGTH 349
|
#define SSL_R_BAD_SRP_G_LENGTH 349
|
||||||
#define SSL_R_BAD_SRP_N_LENGTH 350
|
#define SSL_R_BAD_SRP_N_LENGTH 350
|
||||||
|
#define SSL_R_BAD_SRP_PARAMETERS 371
|
||||||
#define SSL_R_BAD_SRP_S_LENGTH 351
|
#define SSL_R_BAD_SRP_S_LENGTH 351
|
||||||
#define SSL_R_BAD_SRTP_MKI_VALUE 352
|
#define SSL_R_BAD_SRTP_MKI_VALUE 352
|
||||||
#define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 353
|
#define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 353
|
||||||
|
@ -329,6 +329,7 @@ static ERR_STRING_DATA SSL_str_reasons[]=
|
|||||||
{ERR_REASON(SSL_R_BAD_SRP_B_LENGTH) ,"bad srp b length"},
|
{ERR_REASON(SSL_R_BAD_SRP_B_LENGTH) ,"bad srp b length"},
|
||||||
{ERR_REASON(SSL_R_BAD_SRP_G_LENGTH) ,"bad srp g length"},
|
{ERR_REASON(SSL_R_BAD_SRP_G_LENGTH) ,"bad srp g length"},
|
||||||
{ERR_REASON(SSL_R_BAD_SRP_N_LENGTH) ,"bad srp n length"},
|
{ERR_REASON(SSL_R_BAD_SRP_N_LENGTH) ,"bad srp n length"},
|
||||||
|
{ERR_REASON(SSL_R_BAD_SRP_PARAMETERS) ,"bad srp parameters"},
|
||||||
{ERR_REASON(SSL_R_BAD_SRP_S_LENGTH) ,"bad srp s length"},
|
{ERR_REASON(SSL_R_BAD_SRP_S_LENGTH) ,"bad srp s length"},
|
||||||
{ERR_REASON(SSL_R_BAD_SRTP_MKI_VALUE) ,"bad srtp mki value"},
|
{ERR_REASON(SSL_R_BAD_SRTP_MKI_VALUE) ,"bad srtp mki value"},
|
||||||
{ERR_REASON(SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST),"bad srtp protection profile list"},
|
{ERR_REASON(SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST),"bad srtp protection profile list"},
|
||||||
|
@ -1184,6 +1184,9 @@ void ssl3_cbc_digest_record(
|
|||||||
void tls_fips_digest_extra(
|
void tls_fips_digest_extra(
|
||||||
const EVP_CIPHER_CTX *cipher_ctx, EVP_MD_CTX *mac_ctx,
|
const EVP_CIPHER_CTX *cipher_ctx, EVP_MD_CTX *mac_ctx,
|
||||||
const unsigned char *data, size_t data_len, size_t orig_len);
|
const unsigned char *data, size_t data_len, size_t orig_len);
|
||||||
|
|
||||||
|
int srp_verify_server_param(SSL *s, int *al);
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
#define ssl_init_wbio_buffer SSL_test_functions()->p_ssl_init_wbio_buffer
|
#define ssl_init_wbio_buffer SSL_test_functions()->p_ssl_init_wbio_buffer
|
||||||
|
@ -408,17 +408,47 @@ err:
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int srp_verify_server_param(SSL *s, int *al)
|
||||||
|
{
|
||||||
|
SRP_CTX *srp = &s->srp_ctx;
|
||||||
|
/* Sanity check parameters: we can quickly check B % N == 0
|
||||||
|
* by checking B != 0 since B < N
|
||||||
|
*/
|
||||||
|
if (BN_ucmp(srp->g, srp->N) >=0 || BN_ucmp(srp->B, srp->N) >= 0
|
||||||
|
|| BN_is_zero(srp->B))
|
||||||
|
{
|
||||||
|
*al = SSL3_AD_ILLEGAL_PARAMETER;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (BN_num_bits(srp->N) < srp->strength)
|
||||||
|
{
|
||||||
|
*al = TLS1_AD_INSUFFICIENT_SECURITY;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (srp->SRP_verify_param_callback)
|
||||||
|
{
|
||||||
|
if (srp->SRP_verify_param_callback(s, srp->SRP_cb_arg) <= 0)
|
||||||
|
{
|
||||||
|
*al = TLS1_AD_INSUFFICIENT_SECURITY;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if(!SRP_check_known_gN_param(srp->g, srp->N))
|
||||||
|
{
|
||||||
|
*al = TLS1_AD_INSUFFICIENT_SECURITY;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
int SRP_Calc_A_param(SSL *s)
|
int SRP_Calc_A_param(SSL *s)
|
||||||
{
|
{
|
||||||
unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
|
unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
|
||||||
|
|
||||||
if (BN_num_bits(s->srp_ctx.N) < s->srp_ctx.strength)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
if (s->srp_ctx.SRP_verify_param_callback ==NULL &&
|
|
||||||
!SRP_check_known_gN_param(s->srp_ctx.g,s->srp_ctx.N))
|
|
||||||
return -1 ;
|
|
||||||
|
|
||||||
RAND_bytes(rnd, sizeof(rnd));
|
RAND_bytes(rnd, sizeof(rnd));
|
||||||
s->srp_ctx.a = BN_bin2bn(rnd, sizeof(rnd), s->srp_ctx.a);
|
s->srp_ctx.a = BN_bin2bn(rnd, sizeof(rnd), s->srp_ctx.a);
|
||||||
OPENSSL_cleanse(rnd, sizeof(rnd));
|
OPENSSL_cleanse(rnd, sizeof(rnd));
|
||||||
@ -426,10 +456,6 @@ int SRP_Calc_A_param(SSL *s)
|
|||||||
if (!(s->srp_ctx.A = SRP_Calc_A(s->srp_ctx.a,s->srp_ctx.N,s->srp_ctx.g)))
|
if (!(s->srp_ctx.A = SRP_Calc_A(s->srp_ctx.a,s->srp_ctx.N,s->srp_ctx.g)))
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
/* We can have a callback to verify SRP param!! */
|
|
||||||
if (s->srp_ctx.SRP_verify_param_callback !=NULL)
|
|
||||||
return s->srp_ctx.SRP_verify_param_callback(s,s->srp_ctx.SRP_cb_arg);
|
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user