src/usr.sbin/rpki-client/tak.c

340 lines
7.6 KiB
C
Raw Normal View History

2023-06-29 10:53:26 +00:00
/* $OpenBSD: tak.c,v 1.11 2023/06/29 10:28:25 tb Exp $ */
/*
* Copyright (c) 2022 Job Snijders <job@fastly.com>
* Copyright (c) 2022 Theo Buehler <tb@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <err.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <openssl/asn1.h>
#include <openssl/asn1t.h>
#include <openssl/safestack.h>
#include <openssl/stack.h>
#include <openssl/x509.h>
#include <openssl/x509v3.h>
#include "extern.h"
/*
* Parse results and data of the Trust Anchor Key file.
*/
struct parse {
const char *fn; /* TAK file name */
struct tak *res; /* results */
};
extern ASN1_OBJECT *tak_oid;
/*
* ASN.1 templates for Trust Anchor Keys (draft-ietf-sidrops-signed-tal-12)
*/
DECLARE_STACK_OF(ASN1_IA5STRING);
#ifndef DEFINE_STACK_OF
#define sk_ASN1_IA5STRING_num(st) SKM_sk_num(ASN1_IA5STRING, (st))
#define sk_ASN1_IA5STRING_value(st, i) SKM_sk_value(ASN1_IA5STRING, (st), (i))
#endif
typedef struct {
STACK_OF(ASN1_UTF8STRING) *comments;
STACK_OF(ASN1_IA5STRING) *certificateURIs;
X509_PUBKEY *subjectPublicKeyInfo;
} TAKey;
typedef struct {
ASN1_INTEGER *version;
TAKey *current;
TAKey *predecessor;
TAKey *successor;
} TAK;
ASN1_SEQUENCE(TAKey) = {
ASN1_SEQUENCE_OF(TAKey, comments, ASN1_UTF8STRING),
ASN1_SEQUENCE_OF(TAKey, certificateURIs, ASN1_IA5STRING),
ASN1_SIMPLE(TAKey, subjectPublicKeyInfo, X509_PUBKEY),
} ASN1_SEQUENCE_END(TAKey);
ASN1_SEQUENCE(TAK) = {
ASN1_EXP_OPT(TAK, version, ASN1_INTEGER, 0),
ASN1_SIMPLE(TAK, current, TAKey),
ASN1_EXP_OPT(TAK, predecessor, TAKey, 0),
ASN1_EXP_OPT(TAK, successor, TAKey, 1),
} ASN1_SEQUENCE_END(TAK);
DECLARE_ASN1_FUNCTIONS(TAK);
IMPLEMENT_ASN1_FUNCTIONS(TAK);
/*
* On success return pointer to allocated & valid takey structure,
* on failure return NULL.
*/
static struct takey *
parse_takey(const char *fn, const TAKey *takey)
{
const ASN1_UTF8STRING *comment;
const ASN1_IA5STRING *certURI;
EVP_PKEY *pkey;
RSA *r;
struct takey *res = NULL;
unsigned char *der = NULL, *rder = NULL;
unsigned char md[SHA_DIGEST_LENGTH];
size_t i;
int rdersz, rc = 0;
if ((res = calloc(1, sizeof(struct takey))) == NULL)
err(1, NULL);
res->commentsz = sk_ASN1_UTF8STRING_num(takey->comments);
if (res->commentsz > 0) {
res->comments = calloc(res->commentsz, sizeof(char *));
if (res->comments == NULL)
err(1, NULL);
for (i = 0; i < res->commentsz; i++) {
comment = sk_ASN1_UTF8STRING_value(takey->comments, i);
res->comments[i] = strndup(comment->data, comment->length);
if (res->comments[i] == NULL)
err(1, NULL);
}
}
res->urisz = sk_ASN1_IA5STRING_num(takey->certificateURIs);
if (res->urisz == 0) {
warnx("%s: Signed TAL requires at least 1 CertificateURI", fn);
goto out;
}
if ((res->uris = calloc(res->urisz, sizeof(char *))) == NULL)
err(1, NULL);
for (i = 0; i < res->urisz; i++) {
certURI = sk_ASN1_IA5STRING_value(takey->certificateURIs, i);
if (!valid_uri(certURI->data, certURI->length, NULL)) {
warnx("%s: invalid TA URI", fn);
goto out;
}
/* XXX: enforce that protocol is rsync or https. */
res->uris[i] = strndup(certURI->data, certURI->length);
if (res->uris[i] == NULL)
err(1, NULL);
}
if ((pkey = X509_PUBKEY_get0(takey->subjectPublicKeyInfo)) == NULL) {
warnx("%s: X509_PUBKEY_get0 failed", fn);
goto out;
}
if ((r = EVP_PKEY_get0_RSA(pkey)) == NULL) {
warnx("%s: EVP_PKEY_get0_RSA failed", fn);
goto out;
}
if ((rdersz = i2d_RSAPublicKey(r, &rder)) <= 0) {
warnx("%s: i2d_RSAPublicKey failed", fn);
goto out;
}
if (!EVP_Digest(rder, rdersz, md, NULL, EVP_sha1(), NULL)) {
warnx("%s: EVP_Digest failed", fn);
goto out;
}
res->ski = hex_encode(md, SHA_DIGEST_LENGTH);
if ((res->pubkeysz = i2d_PUBKEY(pkey, &der)) <= 0) {
warnx("%s: i2d_PUBKEY failed", fn);
goto out;
}
res->pubkey = der;
der = NULL;
rc = 1;
out:
if (rc == 0) {
takey_free(res);
res = NULL;
}
free(der);
free(rder);
return res;
}
/*
* Parses the eContent segment of an TAK file
* Returns zero on failure, non-zero on success.
*/
static int
tak_parse_econtent(const unsigned char *d, size_t dsz, struct parse *p)
{
TAK *tak;
const char *fn;
int rc = 0;
fn = p->fn;
if ((tak = d2i_TAK(NULL, &d, dsz)) == NULL) {
2023-06-29 10:53:26 +00:00
warnx("%s: failed to parse Trust Anchor Key", fn);
goto out;
}
if (!valid_econtent_version(fn, tak->version, 0))
goto out;
p->res->current = parse_takey(fn, tak->current);
if (p->res->current == NULL)
goto out;
if (tak->predecessor != NULL) {
p->res->predecessor = parse_takey(fn, tak->predecessor);
if (p->res->predecessor == NULL)
goto out;
}
if (tak->successor != NULL) {
p->res->successor = parse_takey(fn, tak->successor);
if (p->res->successor == NULL)
goto out;
}
rc = 1;
out:
TAK_free(tak);
return rc;
}
/*
* Parse a full draft-ietf-sidrops-signed-tal file.
* Returns the TAK or NULL if the object was malformed.
*/
struct tak *
tak_parse(X509 **x509, const char *fn, const unsigned char *der, size_t len)
{
struct parse p;
2023-06-20 20:38:03 +00:00
struct cert *cert = NULL;
unsigned char *cms;
size_t cmsz;
time_t signtime = 0;
int rc = 0;
memset(&p, 0, sizeof(struct parse));
p.fn = fn;
cms = cms_parse_validate(x509, fn, der, len, tak_oid, &cmsz, &signtime);
if (cms == NULL)
return NULL;
if ((p.res = calloc(1, sizeof(struct tak))) == NULL)
err(1, NULL);
p.res->signtime = signtime;
if (!x509_get_aia(*x509, fn, &p.res->aia))
goto out;
if (!x509_get_aki(*x509, fn, &p.res->aki))
goto out;
if (!x509_get_sia(*x509, fn, &p.res->sia))
goto out;
if (!x509_get_ski(*x509, fn, &p.res->ski))
goto out;
if (p.res->aia == NULL || p.res->aki == NULL || p.res->sia == NULL ||
p.res->ski == NULL) {
warnx("%s: RFC 6487 section 4.8: "
"missing AIA, AKI, SIA, or SKI X509 extension", fn);
goto out;
}
if (!x509_get_notbefore(*x509, fn, &p.res->notbefore))
goto out;
if (!x509_get_notafter(*x509, fn, &p.res->notafter))
goto out;
if (!x509_inherits(*x509)) {
warnx("%s: RFC 3779 extension not set to inherit", fn);
goto out;
}
if (!tak_parse_econtent(cms, cmsz, &p))
goto out;
2023-06-20 20:38:03 +00:00
if ((cert = cert_parse_ee_cert(fn, *x509)) == NULL)
goto out;
if (strcmp(p.res->aki, p.res->current->ski) != 0) {
warnx("%s: current TAKey's SKI does not match EE AKI", fn);
goto out;
}
rc = 1;
out:
if (rc == 0) {
tak_free(p.res);
p.res = NULL;
X509_free(*x509);
*x509 = NULL;
}
2023-06-20 20:38:03 +00:00
cert_free(cert);
free(cms);
return p.res;
}
/*
* Free TAKey pointer.
*/
void
takey_free(struct takey *t)
{
size_t i;
if (t == NULL)
return;
for (i = 0; i < t->commentsz; i++)
free(t->comments[i]);
for (i = 0; i < t->urisz; i++)
free(t->uris[i]);
free(t->comments);
free(t->uris);
free(t->ski);
free(t->pubkey);
free(t);
}
/*
* Free an TAK pointer.
* Safe to call with NULL.
*/
void
tak_free(struct tak *t)
{
if (t == NULL)
return;
takey_free(t->current);
takey_free(t->predecessor);
takey_free(t->successor);
free(t->aia);
free(t->aki);
free(t->ski);
free(t);
}