Home | History | Annotate | Download | only in socket
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "net/socket/nss_ssl_util.h"
      6 
      7 #include <nss.h>
      8 #include <secerr.h>
      9 #include <ssl.h>
     10 #include <sslerr.h>
     11 #include <sslproto.h>
     12 
     13 #include <string>
     14 
     15 #include "base/bind.h"
     16 #include "base/cpu.h"
     17 #include "base/lazy_instance.h"
     18 #include "base/logging.h"
     19 #include "base/memory/singleton.h"
     20 #include "base/threading/thread_restrictions.h"
     21 #include "base/values.h"
     22 #include "build/build_config.h"
     23 #include "crypto/nss_util.h"
     24 #include "net/base/net_errors.h"
     25 #include "net/base/net_log.h"
     26 #include "net/base/nss_memio.h"
     27 
     28 #if defined(OS_WIN)
     29 #include "base/win/windows_version.h"
     30 #endif
     31 
     32 namespace net {
     33 
     34 namespace {
     35 
     36 // CiphersRemove takes a zero-terminated array of cipher suite ids in
     37 // |to_remove| and sets every instance of them in |ciphers| to zero. It returns
     38 // true if it found and removed every element of |to_remove|. It assumes that
     39 // there are no duplicates in |ciphers| nor in |to_remove|.
     40 bool CiphersRemove(const uint16* to_remove, uint16* ciphers, size_t num) {
     41   size_t i, found = 0;
     42 
     43   for (i = 0; ; i++) {
     44     if (to_remove[i] == 0)
     45       break;
     46 
     47     for (size_t j = 0; j < num; j++) {
     48       if (to_remove[i] == ciphers[j]) {
     49         ciphers[j] = 0;
     50         found++;
     51         break;
     52       }
     53     }
     54   }
     55 
     56   return found == i;
     57 }
     58 
     59 // CiphersCompact takes an array of cipher suite ids in |ciphers|, where some
     60 // entries are zero, and moves the entries so that all the non-zero elements
     61 // are compacted at the end of the array.
     62 void CiphersCompact(uint16* ciphers, size_t num) {
     63   size_t j = num - 1;
     64 
     65   for (size_t i = num - 1; i < num; i--) {
     66     if (ciphers[i] == 0)
     67       continue;
     68     ciphers[j--] = ciphers[i];
     69   }
     70 }
     71 
     72 // CiphersCopy copies the zero-terminated array |in| to |out|. It returns the
     73 // number of cipher suite ids copied.
     74 size_t CiphersCopy(const uint16* in, uint16* out) {
     75   for (size_t i = 0; ; i++) {
     76     if (in[i] == 0)
     77       return i;
     78     out[i] = in[i];
     79   }
     80 }
     81 
     82 base::Value* NetLogSSLErrorCallback(int net_error,
     83                                     int ssl_lib_error,
     84                                     NetLog::LogLevel /* log_level */) {
     85   base::DictionaryValue* dict = new base::DictionaryValue();
     86   dict->SetInteger("net_error", net_error);
     87   if (ssl_lib_error)
     88     dict->SetInteger("ssl_lib_error", ssl_lib_error);
     89   return dict;
     90 }
     91 
     92 class NSSSSLInitSingleton {
     93  public:
     94   NSSSSLInitSingleton() : model_fd_(NULL) {
     95     crypto::EnsureNSSInit();
     96 
     97     NSS_SetDomesticPolicy();
     98 
     99     const PRUint16* const ssl_ciphers = SSL_GetImplementedCiphers();
    100     const PRUint16 num_ciphers = SSL_GetNumImplementedCiphers();
    101 
    102     // Disable ECDSA cipher suites on platforms that do not support ECDSA
    103     // signed certificates, as servers may use the presence of such
    104     // ciphersuites as a hint to send an ECDSA certificate.
    105     bool disableECDSA = false;
    106 #if defined(OS_WIN)
    107     if (base::win::GetVersion() < base::win::VERSION_VISTA)
    108       disableECDSA = true;
    109 #endif
    110 
    111     // Explicitly enable exactly those ciphers with keys of at least 80 bits
    112     for (int i = 0; i < num_ciphers; i++) {
    113       SSLCipherSuiteInfo info;
    114       if (SSL_GetCipherSuiteInfo(ssl_ciphers[i], &info,
    115                                  sizeof(info)) == SECSuccess) {
    116         bool enabled = info.effectiveKeyBits >= 80;
    117         if (info.authAlgorithm == ssl_auth_ecdsa && disableECDSA)
    118           enabled = false;
    119 
    120         // Trim the list of cipher suites in order to keep the size of the
    121         // ClientHello down. DSS, ECDH, CAMELLIA, SEED, ECC+3DES, and
    122         // HMAC-SHA256 cipher suites are disabled.
    123         if (info.symCipher == ssl_calg_camellia ||
    124             info.symCipher == ssl_calg_seed ||
    125             (info.symCipher == ssl_calg_3des && info.keaType != ssl_kea_rsa) ||
    126             info.authAlgorithm == ssl_auth_dsa ||
    127             info.macAlgorithm == ssl_hmac_sha256 ||
    128             info.nonStandard ||
    129             strcmp(info.keaTypeName, "ECDH") == 0) {
    130           enabled = false;
    131         }
    132 
    133         if (ssl_ciphers[i] == TLS_DHE_DSS_WITH_AES_128_CBC_SHA) {
    134           // Enabled to allow servers with only a DSA certificate to function.
    135           enabled = true;
    136         }
    137         SSL_CipherPrefSetDefault(ssl_ciphers[i], enabled);
    138       }
    139     }
    140 
    141     // Enable SSL.
    142     SSL_OptionSetDefault(SSL_SECURITY, PR_TRUE);
    143 
    144     // Calculate the order of ciphers that we'll use for NSS sockets. (Note
    145     // that, even if a cipher is specified in the ordering, it must still be
    146     // enabled in order to be included in a ClientHello.)
    147     //
    148     // Our top preference cipher suites are either forward-secret AES-GCM or
    149     // forward-secret ChaCha20-Poly1305. If the local machine has AES-NI then
    150     // we prefer AES-GCM, otherwise ChaCha20. The remainder of the cipher suite
    151     // preference is inheriented from NSS. */
    152     static const uint16 chacha_ciphers[] = {
    153       TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
    154       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
    155       0,
    156     };
    157     static const uint16 aes_gcm_ciphers[] = {
    158       TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
    159       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
    160       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
    161       0,
    162     };
    163     scoped_ptr<uint16[]> ciphers(new uint16[num_ciphers]);
    164     memcpy(ciphers.get(), ssl_ciphers, sizeof(uint16)*num_ciphers);
    165 
    166     if (CiphersRemove(chacha_ciphers, ciphers.get(), num_ciphers) &&
    167         CiphersRemove(aes_gcm_ciphers, ciphers.get(), num_ciphers)) {
    168       CiphersCompact(ciphers.get(), num_ciphers);
    169 
    170       const uint16* preference_ciphers = chacha_ciphers;
    171       const uint16* other_ciphers = aes_gcm_ciphers;
    172       base::CPU cpu;
    173 
    174       if (cpu.has_aesni() && cpu.has_avx()) {
    175         preference_ciphers = aes_gcm_ciphers;
    176         other_ciphers = chacha_ciphers;
    177       }
    178       unsigned i = CiphersCopy(preference_ciphers, ciphers.get());
    179       CiphersCopy(other_ciphers, &ciphers[i]);
    180 
    181       if ((model_fd_ = memio_CreateIOLayer(1, 1)) == NULL ||
    182           SSL_ImportFD(NULL, model_fd_) == NULL ||
    183           SECSuccess !=
    184               SSL_CipherOrderSet(model_fd_, ciphers.get(), num_ciphers)) {
    185         NOTREACHED();
    186         if (model_fd_) {
    187           PR_Close(model_fd_);
    188           model_fd_ = NULL;
    189         }
    190       }
    191     }
    192 
    193     // All other SSL options are set per-session by SSLClientSocket and
    194     // SSLServerSocket.
    195   }
    196 
    197   PRFileDesc* GetModelSocket() {
    198     return model_fd_;
    199   }
    200 
    201   ~NSSSSLInitSingleton() {
    202     // Have to clear the cache, or NSS_Shutdown fails with SEC_ERROR_BUSY.
    203     SSL_ClearSessionCache();
    204     if (model_fd_)
    205       PR_Close(model_fd_);
    206   }
    207 
    208  private:
    209   PRFileDesc* model_fd_;
    210 };
    211 
    212 base::LazyInstance<NSSSSLInitSingleton>::Leaky g_nss_ssl_init_singleton =
    213     LAZY_INSTANCE_INITIALIZER;
    214 
    215 }  // anonymous namespace
    216 
    217 // Initialize the NSS SSL library if it isn't already initialized.  This must
    218 // be called before any other NSS SSL functions.  This function is
    219 // thread-safe, and the NSS SSL library will only ever be initialized once.
    220 // The NSS SSL library will be properly shut down on program exit.
    221 void EnsureNSSSSLInit() {
    222   // Initializing SSL causes us to do blocking IO.
    223   // Temporarily allow it until we fix
    224   //   http://code.google.com/p/chromium/issues/detail?id=59847
    225   base::ThreadRestrictions::ScopedAllowIO allow_io;
    226 
    227   g_nss_ssl_init_singleton.Get();
    228 }
    229 
    230 PRFileDesc* GetNSSModelSocket() {
    231   return g_nss_ssl_init_singleton.Get().GetModelSocket();
    232 }
    233 
    234 // Map a Chromium net error code to an NSS error code.
    235 // See _MD_unix_map_default_error in the NSS source
    236 // tree for inspiration.
    237 PRErrorCode MapErrorToNSS(int result) {
    238   if (result >=0)
    239     return result;
    240 
    241   switch (result) {
    242     case ERR_IO_PENDING:
    243       return PR_WOULD_BLOCK_ERROR;
    244     case ERR_ACCESS_DENIED:
    245     case ERR_NETWORK_ACCESS_DENIED:
    246       // For connect, this could be mapped to PR_ADDRESS_NOT_SUPPORTED_ERROR.
    247       return PR_NO_ACCESS_RIGHTS_ERROR;
    248     case ERR_NOT_IMPLEMENTED:
    249       return PR_NOT_IMPLEMENTED_ERROR;
    250     case ERR_SOCKET_NOT_CONNECTED:
    251       return PR_NOT_CONNECTED_ERROR;
    252     case ERR_INTERNET_DISCONNECTED:  // Equivalent to ENETDOWN.
    253       return PR_NETWORK_UNREACHABLE_ERROR;  // Best approximation.
    254     case ERR_CONNECTION_TIMED_OUT:
    255     case ERR_TIMED_OUT:
    256       return PR_IO_TIMEOUT_ERROR;
    257     case ERR_CONNECTION_RESET:
    258       return PR_CONNECT_RESET_ERROR;
    259     case ERR_CONNECTION_ABORTED:
    260       return PR_CONNECT_ABORTED_ERROR;
    261     case ERR_CONNECTION_REFUSED:
    262       return PR_CONNECT_REFUSED_ERROR;
    263     case ERR_ADDRESS_UNREACHABLE:
    264       return PR_HOST_UNREACHABLE_ERROR;  // Also PR_NETWORK_UNREACHABLE_ERROR.
    265     case ERR_ADDRESS_INVALID:
    266       return PR_ADDRESS_NOT_AVAILABLE_ERROR;
    267     case ERR_NAME_NOT_RESOLVED:
    268       return PR_DIRECTORY_LOOKUP_ERROR;
    269     default:
    270       LOG(WARNING) << "MapErrorToNSS " << result
    271                    << " mapped to PR_UNKNOWN_ERROR";
    272       return PR_UNKNOWN_ERROR;
    273   }
    274 }
    275 
    276 // The default error mapping function.
    277 // Maps an NSS error code to a network error code.
    278 int MapNSSError(PRErrorCode err) {
    279   // TODO(port): fill this out as we learn what's important
    280   switch (err) {
    281     case PR_WOULD_BLOCK_ERROR:
    282       return ERR_IO_PENDING;
    283     case PR_ADDRESS_NOT_SUPPORTED_ERROR:  // For connect.
    284     case PR_NO_ACCESS_RIGHTS_ERROR:
    285       return ERR_ACCESS_DENIED;
    286     case PR_IO_TIMEOUT_ERROR:
    287       return ERR_TIMED_OUT;
    288     case PR_CONNECT_RESET_ERROR:
    289       return ERR_CONNECTION_RESET;
    290     case PR_CONNECT_ABORTED_ERROR:
    291       return ERR_CONNECTION_ABORTED;
    292     case PR_CONNECT_REFUSED_ERROR:
    293       return ERR_CONNECTION_REFUSED;
    294     case PR_NOT_CONNECTED_ERROR:
    295       return ERR_SOCKET_NOT_CONNECTED;
    296     case PR_HOST_UNREACHABLE_ERROR:
    297     case PR_NETWORK_UNREACHABLE_ERROR:
    298       return ERR_ADDRESS_UNREACHABLE;
    299     case PR_ADDRESS_NOT_AVAILABLE_ERROR:
    300       return ERR_ADDRESS_INVALID;
    301     case PR_INVALID_ARGUMENT_ERROR:
    302       return ERR_INVALID_ARGUMENT;
    303     case PR_END_OF_FILE_ERROR:
    304       return ERR_CONNECTION_CLOSED;
    305     case PR_NOT_IMPLEMENTED_ERROR:
    306       return ERR_NOT_IMPLEMENTED;
    307 
    308     case SEC_ERROR_LIBRARY_FAILURE:
    309       return ERR_UNEXPECTED;
    310     case SEC_ERROR_INVALID_ARGS:
    311       return ERR_INVALID_ARGUMENT;
    312     case SEC_ERROR_NO_MEMORY:
    313       return ERR_OUT_OF_MEMORY;
    314     case SEC_ERROR_NO_KEY:
    315       return ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY;
    316     case SEC_ERROR_INVALID_KEY:
    317     case SSL_ERROR_SIGN_HASHES_FAILURE:
    318       LOG(ERROR) << "ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED: NSS error " << err
    319                  << ", OS error " << PR_GetOSError();
    320       return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED;
    321     // A handshake (initial or renegotiation) may fail because some signature
    322     // (for example, the signature in the ServerKeyExchange message for an
    323     // ephemeral Diffie-Hellman cipher suite) is invalid.
    324     case SEC_ERROR_BAD_SIGNATURE:
    325       return ERR_SSL_PROTOCOL_ERROR;
    326 
    327     case SSL_ERROR_SSL_DISABLED:
    328       return ERR_NO_SSL_VERSIONS_ENABLED;
    329     case SSL_ERROR_NO_CYPHER_OVERLAP:
    330     case SSL_ERROR_PROTOCOL_VERSION_ALERT:
    331     case SSL_ERROR_UNSUPPORTED_VERSION:
    332       return ERR_SSL_VERSION_OR_CIPHER_MISMATCH;
    333     case SSL_ERROR_HANDSHAKE_FAILURE_ALERT:
    334     case SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT:
    335     case SSL_ERROR_ILLEGAL_PARAMETER_ALERT:
    336       return ERR_SSL_PROTOCOL_ERROR;
    337     case SSL_ERROR_DECOMPRESSION_FAILURE_ALERT:
    338       return ERR_SSL_DECOMPRESSION_FAILURE_ALERT;
    339     case SSL_ERROR_BAD_MAC_ALERT:
    340       return ERR_SSL_BAD_RECORD_MAC_ALERT;
    341     case SSL_ERROR_DECRYPT_ERROR_ALERT:
    342       return ERR_SSL_DECRYPT_ERROR_ALERT;
    343     case SSL_ERROR_UNRECOGNIZED_NAME_ALERT:
    344       return ERR_SSL_UNRECOGNIZED_NAME_ALERT;
    345     case SSL_ERROR_UNSAFE_NEGOTIATION:
    346       return ERR_SSL_UNSAFE_NEGOTIATION;
    347     case SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY:
    348       return ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY;
    349     case SSL_ERROR_HANDSHAKE_NOT_COMPLETED:
    350       return ERR_SSL_HANDSHAKE_NOT_COMPLETED;
    351     case SEC_ERROR_BAD_KEY:
    352     case SSL_ERROR_EXTRACT_PUBLIC_KEY_FAILURE:
    353     // TODO(wtc): the following errors may also occur in contexts unrelated
    354     // to the peer's public key.  We should add new error codes for them, or
    355     // map them to ERR_SSL_BAD_PEER_PUBLIC_KEY only in the right context.
    356     // General unsupported/unknown key algorithm error.
    357     case SEC_ERROR_UNSUPPORTED_KEYALG:
    358     // General DER decoding errors.
    359     case SEC_ERROR_BAD_DER:
    360     case SEC_ERROR_EXTRA_INPUT:
    361       return ERR_SSL_BAD_PEER_PUBLIC_KEY;
    362     // During renegotiation, the server presented a different certificate than
    363     // was used earlier.
    364     case SSL_ERROR_WRONG_CERTIFICATE:
    365       return ERR_SSL_SERVER_CERT_CHANGED;
    366     case SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT:
    367       return ERR_SSL_INAPPROPRIATE_FALLBACK;
    368 
    369     default: {
    370       const char* err_name = PR_ErrorToName(err);
    371       if (err_name == NULL)
    372         err_name = "";
    373       if (IS_SSL_ERROR(err)) {
    374         LOG(WARNING) << "Unknown SSL error " << err << " (" << err_name << ")"
    375                      << " mapped to net::ERR_SSL_PROTOCOL_ERROR";
    376         return ERR_SSL_PROTOCOL_ERROR;
    377       }
    378       LOG(WARNING) << "Unknown error " << err << " (" << err_name << ")"
    379                    << " mapped to net::ERR_FAILED";
    380       return ERR_FAILED;
    381     }
    382   }
    383 }
    384 
    385 // Returns parameters to attach to the NetLog when we receive an error in
    386 // response to a call to an NSS function.  Used instead of
    387 // NetLogSSLErrorCallback with events of type TYPE_SSL_NSS_ERROR.
    388 base::Value* NetLogSSLFailedNSSFunctionCallback(
    389     const char* function,
    390     const char* param,
    391     int ssl_lib_error,
    392     NetLog::LogLevel /* log_level */) {
    393   base::DictionaryValue* dict = new base::DictionaryValue();
    394   dict->SetString("function", function);
    395   if (param[0] != '\0')
    396     dict->SetString("param", param);
    397   dict->SetInteger("ssl_lib_error", ssl_lib_error);
    398   return dict;
    399 }
    400 
    401 void LogFailedNSSFunction(const BoundNetLog& net_log,
    402                           const char* function,
    403                           const char* param) {
    404   DCHECK(function);
    405   DCHECK(param);
    406   net_log.AddEvent(
    407       NetLog::TYPE_SSL_NSS_ERROR,
    408       base::Bind(&NetLogSSLFailedNSSFunctionCallback,
    409                  function, param, PR_GetError()));
    410 }
    411 
    412 NetLog::ParametersCallback CreateNetLogSSLErrorCallback(int net_error,
    413                                                         int ssl_lib_error) {
    414   return base::Bind(&NetLogSSLErrorCallback, net_error, ssl_lib_error);
    415 }
    416 
    417 }  // namespace net
    418