All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.tls.AbstractTlsServer Maven / Gradle / Ivy

There is a newer version: 1.0.6
Show newest version
package org.bouncycastle.tls;

import org.bouncycastle.tls.crypto.TlsCrypto;
import org.bouncycastle.tls.crypto.TlsDHConfig;
import org.bouncycastle.tls.crypto.TlsECConfig;
import org.bouncycastle.util.Integers;

import java.io.IOException;
import java.util.LinkedHashMap;
import java.util.Map;
import java.util.Vector;

/**
 * Base class for a TLS server.
 */
public abstract class AbstractTlsServer
    extends AbstractTlsPeer
    implements TlsServer
{
    protected TlsServerContext context;
    protected ProtocolVersion[] protocolVersions;
    protected int[] cipherSuites;

    protected int[] offeredCipherSuites;
    protected Map clientExtensions;

    protected boolean encryptThenMACOffered;
    protected short maxFragmentLengthOffered;
    protected boolean truncatedHMacOffered;
    protected boolean clientSentECPointFormats;
    protected CertificateStatusRequest certificateStatusRequest;
    protected Vector statusRequestV2;
    protected Vector trustedCAKeys;

    protected int selectedCipherSuite;
    protected Vector clientProtocolNames;
    protected ProtocolName selectedProtocolName;

    protected final Map serverExtensions = new LinkedHashMap<>();

    public AbstractTlsServer(TlsCrypto crypto)
    {
        super(crypto);
    }

    protected boolean allowCertificateStatus()
    {
        return true;
    }

    protected boolean allowEncryptThenMAC()
    {
        return true;
    }

    protected boolean allowMultiCertStatus()
    {
        return false;
    }

    protected boolean allowTruncatedHMac()
    {
        return false;
    }

    protected boolean allowTrustedCAIndication()
    {
        return false;
    }

    /** @deprecated Use 'serverExtensions' directly, it is now never null */
    protected Map checkServerExtensions()
    {
        return serverExtensions;
    }

    protected String getDetailMessageNoCipherSuite()
    {
        return "No selectable cipher suite";
    }

    protected int getMaximumDefaultCurveBits()
    {
        return NamedGroup.getCurveBits(NamedGroup.secp521r1);
    }

    protected int getMaximumDefaultFiniteFieldBits()
    {
        return NamedGroup.getFiniteFieldBits(NamedGroup.ffdhe8192);
    }

    protected int getMaximumNegotiableCurveBits()
    {
        int maxBits = 0;
        int[] clientSupportedGroups = context.getSecurityParametersHandshake().getClientSupportedGroups();
        if (clientSupportedGroups != null)
        {
            for (int i = 0; i < clientSupportedGroups.length; ++i)
            {
                maxBits = Math.max(maxBits, NamedGroup.getCurveBits(clientSupportedGroups[i]));
            }
        }
        else
        {
            /*
             * RFC 4492 4. A client that proposes ECC cipher suites may choose not to include these
             * extensions. In this case, the server is free to choose any one of the elliptic curves or point
             * formats [...].
             */
            maxBits = getMaximumDefaultCurveBits();
        }
        return maxBits;
    }

    protected int getMaximumNegotiableFiniteFieldBits()
    {
        int maxBits = 0;
        boolean anyPeerFF = false;
        int[] clientSupportedGroups = context.getSecurityParametersHandshake().getClientSupportedGroups();
        if (clientSupportedGroups != null)
        {
            for (int i = 0; i < clientSupportedGroups.length; ++i)
            {
                anyPeerFF |= NamedGroup.isFiniteField(clientSupportedGroups[i]);
                maxBits = Math.max(maxBits, NamedGroup.getFiniteFieldBits(clientSupportedGroups[i]));
            }
        }
        if (!anyPeerFF)
        {
            /*
             * RFC 7919 4. If [...] the Supported Groups extension is either absent from the ClientHello
             * entirely or contains no FFDHE groups (i.e., no codepoints between 256 and 511, inclusive), then
             * the server [...] MAY select an FFDHE cipher suite and offer an FFDHE group of its choice [...].
             */
            maxBits = getMaximumDefaultFiniteFieldBits();
        }
        return maxBits;
    }

    protected Vector getProtocolNames()
    {
        return null;
    }

    protected boolean isSelectableCipherSuite(int cipherSuite, int availCurveBits, int availFiniteFieldBits,
        Vector sigAlgs)
    {
        return TlsUtils.isValidVersionForCipherSuite(cipherSuite, context.getServerVersion())
            && availCurveBits >= TlsECCUtils.getMinimumCurveBits(cipherSuite)
            && availFiniteFieldBits >= TlsDHUtils.getMinimumFiniteFieldBits(cipherSuite)
            && TlsUtils.isValidCipherSuiteForSignatureAlgorithms(cipherSuite, sigAlgs);
    }

    protected boolean preferLocalCipherSuites()
    {
        return false;
    }

    protected boolean selectCipherSuite(int cipherSuite) throws IOException
    {
        this.selectedCipherSuite = cipherSuite;
        return true;
    }

    protected int selectDH(int minimumFiniteFieldBits)
    {
        boolean anyPeerFF = false;
        int[] clientSupportedGroups = context.getSecurityParametersHandshake().getClientSupportedGroups();
        if (clientSupportedGroups != null)
        {
            // Try to find a supported named group of the required size from the client's list.
            for (int i = 0; i < clientSupportedGroups.length; ++i)
            {
                int namedGroup = clientSupportedGroups[i];
                anyPeerFF |= NamedGroup.isFiniteField(namedGroup);

                if (NamedGroup.getFiniteFieldBits(namedGroup) >= minimumFiniteFieldBits)
                {
                    // This default server implementation supports all NamedGroup finite fields
                    return namedGroup;
                }
            }
        }
        if (!anyPeerFF)
        {
            /*
             * RFC 7919 4. If [...] the Supported Groups extension is either absent from the ClientHello
             * entirely or contains no FFDHE groups (i.e., no codepoints between 256 and 511, inclusive), then
             * the server [...] MAY select an FFDHE cipher suite and offer an FFDHE group of its choice [...].
             */
            return selectDHDefault(minimumFiniteFieldBits);
        }
        return -1;
    }

    protected int selectDHDefault(int minimumFiniteFieldBits)
    {
        return minimumFiniteFieldBits <= 2048 ? NamedGroup.ffdhe2048
            :  minimumFiniteFieldBits <= 3072 ? NamedGroup.ffdhe3072
            :  minimumFiniteFieldBits <= 4096 ? NamedGroup.ffdhe4096
            :  minimumFiniteFieldBits <= 6144 ? NamedGroup.ffdhe6144
            :  minimumFiniteFieldBits <= 8192 ? NamedGroup.ffdhe8192
            :  -1;
    }

    protected int selectECDH(int minimumCurveBits)
    {
        int[] clientSupportedGroups = context.getSecurityParametersHandshake().getClientSupportedGroups();
        if (clientSupportedGroups == null)
        {
            /*
             * RFC 4492 4. A client that proposes ECC cipher suites may choose not to include these
             * extensions. In this case, the server is free to choose any one of the elliptic curves or point
             * formats [...].
             */
            return selectECDHDefault(minimumCurveBits);
        }

        // Try to find a supported named group of the required size from the client's list.
        for (int i = 0; i < clientSupportedGroups.length; ++i)
        {
            int namedGroup = clientSupportedGroups[i];
            if (NamedGroup.getCurveBits(namedGroup) >= minimumCurveBits)
            {
                // This default server implementation supports all NamedGroup curves
                return namedGroup;
            }
        }

        return -1;
    }

    protected int selectECDHDefault(int minimumCurveBits)
    {
        return minimumCurveBits <= 256 ? NamedGroup.secp256r1
            :  minimumCurveBits <= 384 ? NamedGroup.secp384r1
            :  minimumCurveBits <= 521 ? NamedGroup.secp521r1
            :  -1;
    }

    protected ProtocolName selectProtocolName() throws IOException
    {
        Vector serverProtocolNames = getProtocolNames();
        if (null == serverProtocolNames || serverProtocolNames.isEmpty())
        {
            return null;
        }

        ProtocolName result = selectProtocolName(clientProtocolNames, serverProtocolNames);
        if (null == result)
        {
            throw new TlsFatalAlert(AlertDescription.no_application_protocol);
        }

        return result;
    }

    protected ProtocolName selectProtocolName(Vector clientProtocolNames, Vector serverProtocolNames)
    {
        for (int i = 0; i < serverProtocolNames.size(); ++i)
        {
            ProtocolName serverProtocolName = (ProtocolName)serverProtocolNames.elementAt(i);
            if (clientProtocolNames.contains(serverProtocolName))
            {
                return serverProtocolName;
            }
        }
        return null;
    }

    protected boolean shouldSelectProtocolNameEarly()
    {
        return true;
    }

    protected boolean preferLocalClientCertificateTypes()
    {
        return false;
    }

    protected short[] getAllowedClientCertificateTypes()
    {
        return null;
    }

    /**
     * RFC 9146 DTLS connection ID.
     * 

* This method will be called if a connection_id extension was sent by the client. * If the return value is non-null, the server will send this connection ID to the client to use in future packets. * As future communication doesn't include the connection IDs length, this should either be fixed-length * or include the connection ID's length. (see explanation in RFC 9146 4. "cid:") * @return The connection ID to use. */ protected byte[] getNewConnectionID() { return null; } public void init(TlsServerContext context) { this.context = context; this.protocolVersions = getSupportedVersions(); this.cipherSuites = getSupportedCipherSuites(); } public ProtocolVersion[] getProtocolVersions() { return protocolVersions; } public int[] getCipherSuites() { return cipherSuites; } public void notifyHandshakeBeginning() throws IOException { super.notifyHandshakeBeginning(); this.offeredCipherSuites = null; this.clientExtensions = null; this.encryptThenMACOffered = false; this.maxFragmentLengthOffered = 0; this.truncatedHMacOffered = false; this.clientSentECPointFormats = false; this.certificateStatusRequest = null; this.selectedCipherSuite = -1; this.selectedProtocolName = null; this.serverExtensions.clear(); } public TlsSession getSessionToResume(byte[] sessionID) { return null; } public byte[] getNewSessionID() { return null; } public TlsPSKExternal getExternalPSK(Vector identities) { return null; } public void notifySession(TlsSession session) { } public void notifyClientVersion(ProtocolVersion clientVersion) throws IOException { } public void notifyFallback(boolean isFallback) throws IOException { /* * RFC 7507 3. If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest * protocol version supported by the server is higher than the version indicated in * ClientHello.client_version, the server MUST respond with a fatal inappropriate_fallback * alert [..]. */ if (isFallback) { ProtocolVersion[] serverVersions = getProtocolVersions(); ProtocolVersion clientVersion = context.getClientVersion(); ProtocolVersion latestServerVersion; if (clientVersion.isTLS()) { latestServerVersion = ProtocolVersion.getLatestTLS(serverVersions); } else if (clientVersion.isDTLS()) { latestServerVersion = ProtocolVersion.getLatestDTLS(serverVersions); } else { throw new TlsFatalAlert(AlertDescription.internal_error); } if (null != latestServerVersion && latestServerVersion.isLaterVersionOf(clientVersion)) { throw new TlsFatalAlert(AlertDescription.inappropriate_fallback); } } } public void notifyOfferedCipherSuites(int[] offeredCipherSuites) throws IOException { this.offeredCipherSuites = offeredCipherSuites; } public void processClientExtensions(Map clientExtensions) throws IOException { this.clientExtensions = clientExtensions; if (null != clientExtensions) { this.clientProtocolNames = TlsExtensionsUtils.getALPNExtensionClient(clientExtensions); if (shouldSelectProtocolNameEarly()) { if (null != clientProtocolNames && !clientProtocolNames.isEmpty()) { this.selectedProtocolName = selectProtocolName(); } } // TODO[tls13] Don't need these if we have negotiated (D)TLS 1.3+ { this.encryptThenMACOffered = TlsExtensionsUtils.hasEncryptThenMACExtension(clientExtensions); this.truncatedHMacOffered = TlsExtensionsUtils.hasTruncatedHMacExtension(clientExtensions); this.statusRequestV2 = TlsExtensionsUtils.getStatusRequestV2Extension(clientExtensions); this.trustedCAKeys = TlsExtensionsUtils.getTrustedCAKeysExtensionClient(clientExtensions); // We only support uncompressed format, this is just to validate the extension, and note its presence. this.clientSentECPointFormats = (null != TlsExtensionsUtils.getSupportedPointFormatsExtension(clientExtensions)); } this.certificateStatusRequest = TlsExtensionsUtils.getStatusRequestExtension(clientExtensions); this.maxFragmentLengthOffered = TlsExtensionsUtils.getMaxFragmentLengthExtension(clientExtensions); if (maxFragmentLengthOffered >= 0 && !MaxFragmentLength.isValid(maxFragmentLengthOffered)) { throw new TlsFatalAlert(AlertDescription.illegal_parameter); } } } public ProtocolVersion getServerVersion() throws IOException { ProtocolVersion[] serverVersions = getProtocolVersions(); ProtocolVersion[] clientVersions = context.getClientSupportedVersions(); for (int i = 0; i < clientVersions.length; ++i) { ProtocolVersion clientVersion = clientVersions[i]; if (ProtocolVersion.contains(serverVersions, clientVersion)) { return clientVersion; } } throw new TlsFatalAlert(AlertDescription.protocol_version); } public int[] getSupportedGroups() throws IOException { // TODO[tls13] The rest of this class assumes all named groups are supported return new int[]{ NamedGroup.x25519, NamedGroup.x448, NamedGroup.secp256r1, NamedGroup.secp384r1, NamedGroup.ffdhe2048, NamedGroup.ffdhe3072, NamedGroup.ffdhe4096 }; } public int getSelectedCipherSuite() throws IOException { SecurityParameters securityParameters = context.getSecurityParametersHandshake(); ProtocolVersion negotiatedVersion = securityParameters.getNegotiatedVersion(); if (TlsUtils.isTLSv13(negotiatedVersion)) { int commonCipherSuite13 = TlsUtils.getCommonCipherSuite13(negotiatedVersion, offeredCipherSuites, getCipherSuites(), preferLocalCipherSuites()); if (commonCipherSuite13 >= 0 && selectCipherSuite(commonCipherSuite13)) { return commonCipherSuite13; } } else { /* * RFC 5246 7.4.3. In order to negotiate correctly, the server MUST check any candidate * cipher suites against the "signature_algorithms" extension before selecting them. This is * somewhat inelegant but is a compromise designed to minimize changes to the original * cipher suite design. */ Vector sigAlgs = TlsUtils.getUsableSignatureAlgorithms(securityParameters.getClientSigAlgs()); /* * RFC 4429 5.1. A server that receives a ClientHello containing one or both of these * extensions MUST use the client's enumerated capabilities to guide its selection of an * appropriate cipher suite. One of the proposed ECC cipher suites must be negotiated only * if the server can successfully complete the handshake while using the curves and point * formats supported by the client [...]. */ int availCurveBits = getMaximumNegotiableCurveBits(); int availFiniteFieldBits = getMaximumNegotiableFiniteFieldBits(); int[] cipherSuites = TlsUtils.getCommonCipherSuites(offeredCipherSuites, getCipherSuites(), preferLocalCipherSuites()); for (int i = 0; i < cipherSuites.length; ++i) { int cipherSuite = cipherSuites[i]; if (isSelectableCipherSuite(cipherSuite, availCurveBits, availFiniteFieldBits, sigAlgs) && selectCipherSuite(cipherSuite)) { return cipherSuite; } } } throw new TlsFatalAlert(AlertDescription.handshake_failure, getDetailMessageNoCipherSuite()); } // Hashtable is (Integer -> byte[]) public Map getServerExtensions() throws IOException { final boolean isTLSv13 = TlsUtils.isTLSv13(context); if (isTLSv13) { if (null != this.certificateStatusRequest && allowCertificateStatus()) { /* * TODO[tls13] RFC 8446 4.4.2.1. OCSP Status and SCT Extensions. * * OCSP information is carried in an extension for a CertificateEntry. */ } } else { if (this.encryptThenMACOffered && allowEncryptThenMAC()) { /* * RFC 7366 3. If a server receives an encrypt-then-MAC request extension from a client * and then selects a stream or Authenticated Encryption with Associated Data (AEAD) * ciphersuite, it MUST NOT send an encrypt-then-MAC response extension back to the * client. */ if (TlsUtils.isBlockCipherSuite(this.selectedCipherSuite)) { TlsExtensionsUtils.addEncryptThenMACExtension(serverExtensions); } } if (this.truncatedHMacOffered && allowTruncatedHMac()) { TlsExtensionsUtils.addTruncatedHMacExtension(serverExtensions); } if (this.clientSentECPointFormats && TlsECCUtils.isECCCipherSuite(this.selectedCipherSuite)) { /* * RFC 4492 5.2. A server that selects an ECC cipher suite in response to a ClientHello * message including a Supported Point Formats Extension appends this extension (along * with others) to its ServerHello message, enumerating the point formats it can parse. */ TlsExtensionsUtils.addSupportedPointFormatsExtension(serverExtensions, new short[]{ ECPointFormat.uncompressed }); } // TODO[tls13] See RFC 8446 4.4.2.1 if (null != this.statusRequestV2 && allowMultiCertStatus()) { /* * RFC 6961 2.2. If a server returns a "CertificateStatus" message in response to a * "status_request_v2" request, then the server MUST have included an extension of type * "status_request_v2" with empty "extension_data" in the extended server hello.. */ TlsExtensionsUtils.addEmptyExtensionData(serverExtensions, TlsExtensionsUtils.EXT_status_request_v2); } else if (null != this.certificateStatusRequest && allowCertificateStatus()) { /* * RFC 6066 8. If a server returns a "CertificateStatus" message, then the server MUST * have included an extension of type "status_request" with empty "extension_data" in * the extended server hello. */ TlsExtensionsUtils.addEmptyExtensionData(serverExtensions, TlsExtensionsUtils.EXT_status_request); } if (null != this.trustedCAKeys && allowTrustedCAIndication()) { TlsExtensionsUtils.addTrustedCAKeysExtensionServer(serverExtensions); } } if (this.maxFragmentLengthOffered >= 0 && MaxFragmentLength.isValid(maxFragmentLengthOffered)) { TlsExtensionsUtils.addMaxFragmentLengthExtension(serverExtensions, this.maxFragmentLengthOffered); } // RFC 7250 4.2 for server_certificate_type short[] serverCertTypes = TlsExtensionsUtils.getServerCertificateTypeExtensionClient(clientExtensions); if (serverCertTypes != null) { TlsCredentials credentials = getCredentials(); if (credentials != null) { // TODO An X509 certificate should still be usable as RawPublicKey short serverCertificateType = credentials.getCertificate().getCertificateType(); if (CertificateType.OpenPGP == serverCertificateType && isTLSv13) { throw new TlsFatalAlert(AlertDescription.internal_error, "The OpenPGP certificate type MUST NOT be used with TLS 1.3"); } if (!TlsUtils.contains(serverCertTypes, 0, serverCertTypes.length, serverCertificateType)) { // outcome 2: we support the extension but have no common types throw new TlsFatalAlert(AlertDescription.unsupported_certificate); } // outcome 3: we support the extension and have a common type TlsExtensionsUtils.addServerCertificateTypeExtensionServer(serverExtensions, serverCertificateType); } } // TODO If we won't be sending a CertificateRequest, this extension can be ignored // RFC 7250 4.2 for client_certificate_type short[] remoteClientCertTypes = TlsExtensionsUtils.getClientCertificateTypeExtensionClient(clientExtensions); if (remoteClientCertTypes != null) { short[] localClientCertTypes = getAllowedClientCertificateTypes(); if (localClientCertTypes != null) { short[] preferredTypes; short[] nonPreferredTypes; if (preferLocalClientCertificateTypes()) { preferredTypes = localClientCertTypes; nonPreferredTypes = remoteClientCertTypes; } else { preferredTypes = remoteClientCertTypes; nonPreferredTypes = localClientCertTypes; } short selectedType = -1; for (int i = 0; i < preferredTypes.length; i++) { short preferredType = preferredTypes[i]; if (CertificateType.OpenPGP == preferredType && isTLSv13) { continue; } if (TlsUtils.contains(nonPreferredTypes, 0, nonPreferredTypes.length, preferredType)) { selectedType = preferredType; break; } } // TODO Shouldn't be an error unless we REQUIRE client authentication if (selectedType == -1) { // outcome 2: we support the extension but have no common types throw new TlsFatalAlert(AlertDescription.unsupported_certificate); } // outcome 3: we support the extension and have a common type TlsExtensionsUtils.addClientCertificateTypeExtensionServer(serverExtensions, selectedType); } // else outcome 1: we don't support the extension } return serverExtensions; } @Override public void getServerExtensionsForConnection(Map serverExtensions) throws IOException { if (!shouldSelectProtocolNameEarly()) { if (null != clientProtocolNames && !clientProtocolNames.isEmpty()) { this.selectedProtocolName = selectProtocolName(); } } /* * RFC 7301 3.1. When session resumption or session tickets [...] are used, the previous * contents of this extension are irrelevant, and only the values in the new handshake * messages are considered. */ if (null == selectedProtocolName) { serverExtensions.remove(TlsExtensionsUtils.EXT_application_layer_protocol_negotiation); } else { TlsExtensionsUtils.addALPNExtensionServer(serverExtensions, selectedProtocolName); } if (ProtocolVersion.DTLSv12.equals(context.getServerVersion())) { /* * RFC 9146 3. When a DTLS session is resumed or renegotiated, the "connection_id" extension is * negotiated afresh. */ if (clientExtensions != null && clientExtensions.containsKey(Integers.valueOf(ExtensionType.connection_id))) { byte[] serverConnectionID = getNewConnectionID(); if (serverConnectionID != null) { TlsExtensionsUtils.addConnectionIDExtension(serverExtensions, serverConnectionID); } } } } public Vector getServerSupplementalData() throws IOException { return null; } public CertificateStatus getCertificateStatus() throws IOException { return null; } public CertificateRequest getCertificateRequest() throws IOException { return null; } public TlsPSKIdentityManager getPSKIdentityManager() throws IOException { return null; } public TlsSRPLoginParameters getSRPLoginParameters() throws IOException { return null; } public TlsDHConfig getDHConfig() throws IOException { int minimumFiniteFieldBits = TlsDHUtils.getMinimumFiniteFieldBits(selectedCipherSuite); int namedGroup = selectDH(minimumFiniteFieldBits); return TlsDHUtils.createNamedDHConfig(context, namedGroup); } public TlsECConfig getECDHConfig() throws IOException { int minimumCurveBits = TlsECCUtils.getMinimumCurveBits(selectedCipherSuite); int namedGroup = selectECDH(minimumCurveBits); return TlsECCUtils.createNamedECConfig(context, namedGroup); } public void processClientSupplementalData(Vector clientSupplementalData) throws IOException { if (clientSupplementalData != null) { throw new TlsFatalAlert(AlertDescription.unexpected_message); } } public void notifyClientCertificate(Certificate clientCertificate) throws IOException { throw new TlsFatalAlert(AlertDescription.internal_error); } public NewSessionTicket getNewSessionTicket() throws IOException { /* * RFC 5077 3.3. If the server determines that it does not want to include a ticket after it * has included the SessionTicket extension in the ServerHello, then it sends a zero-length * ticket in the NewSessionTicket handshake message. */ return new NewSessionTicket(0L, TlsUtils.EMPTY_BYTES); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy