1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include "tls/s2n_tls13.h"
#include "api/s2n.h"
#include "crypto/s2n_rsa_pss.h"
#include "crypto/s2n_rsa_signing.h"
#include "tls/s2n_tls.h"
bool s2n_use_default_tls13_config_flag = false;
bool s2n_use_default_tls13_config()
{
return s2n_use_default_tls13_config_flag;
}
bool s2n_is_tls13_fully_supported()
{
/* Older versions of Openssl (eg 1.0.2) do not support RSA PSS, which is required for TLS 1.3. */
return s2n_is_rsa_pss_signing_supported() && s2n_is_rsa_pss_certs_supported();
}
int s2n_get_highest_fully_supported_tls_version()
{
return s2n_is_tls13_fully_supported() ? S2N_TLS13 : S2N_TLS12;
}
/* Allow TLS1.3 to be negotiated, and use the default TLS1.3 security policy.
* This is NOT the default behavior, and this method is deprecated.
*
* Please consider using the default behavior and configuring
* TLS1.2/TLS1.3 via explicit security policy instead.
*/
int s2n_enable_tls13()
{
return s2n_enable_tls13_in_test();
}
/* Allow TLS1.3 to be negotiated, and use the default TLS1.3 security policy.
* This is NOT the default behavior, and this method is deprecated.
*
* Please consider using the default behavior and configuring
* TLS1.2/TLS1.3 via explicit security policy instead.
*/
int s2n_enable_tls13_in_test()
{
s2n_highest_protocol_version = S2N_TLS13;
s2n_use_default_tls13_config_flag = true;
return S2N_SUCCESS;
}
/* Do NOT allow TLS1.3 to be negotiated, regardless of security policy.
* This is NOT the default behavior, and this method is deprecated.
*
* Please consider using the default behavior and configuring
* TLS1.2/TLS1.3 via explicit security policy instead.
*/
int s2n_disable_tls13_in_test()
{
POSIX_ENSURE(s2n_in_unit_test(), S2N_ERR_NOT_IN_UNIT_TEST);
s2n_highest_protocol_version = S2N_TLS12;
s2n_use_default_tls13_config_flag = false;
return S2N_SUCCESS;
}
/* Reset S2N to the default protocol version behavior.
*
* This method is intended for use in existing unit tests when the APIs
* to enable/disable TLS1.3 have already been called.
*/
int s2n_reset_tls13_in_test()
{
POSIX_ENSURE(s2n_in_unit_test(), S2N_ERR_NOT_IN_UNIT_TEST);
s2n_highest_protocol_version = S2N_TLS13;
s2n_use_default_tls13_config_flag = false;
return S2N_SUCCESS;
}
/* Returns whether a uint16 iana value is a valid TLS 1.3 cipher suite */
bool s2n_is_valid_tls13_cipher(const uint8_t version[2])
{
/* Valid TLS 1.3 Ciphers are
* 0x1301, 0x1302, 0x1303, 0x1304, 0x1305.
* (https://tools.ietf.org/html/rfc8446#appendix-B.4)
*/
return version[0] == 0x13 && version[1] >= 0x01 && version[1] <= 0x05;
}
/* Use middlebox compatibility mode for TLS1.3 by default.
* For now, only disable it when QUIC support is enabled.
*/
bool s2n_is_middlebox_compat_enabled(struct s2n_connection *conn)
{
return s2n_connection_get_protocol_version(conn) >= S2N_TLS13
&& !s2n_connection_is_quic_enabled(conn);
}
S2N_RESULT s2n_connection_validate_tls13_support(struct s2n_connection *conn)
{
RESULT_ENSURE_REF(conn);
/* If the underlying libcrypto supports all features of TLS1.3
* (including RSA-PSS, which is unsupported by some libraries),
* then we can always support TLS1.3.
*/
if (s2n_is_tls13_fully_supported()) {
return S2N_RESULT_OK;
}
/*
* If the underlying libcrypto doesn't support all features...
*/
/* There are some TLS servers in the wild that will choose options not offered by the client.
* So a server might choose to use RSA-PSS even if even if the client does not advertise support for RSA-PSS.
* Therefore, only servers can perform TLS1.3 without full feature support.
*/
RESULT_ENSURE(conn->mode == S2N_SERVER, S2N_ERR_RSA_PSS_NOT_SUPPORTED);
/* RSA signatures must use RSA-PSS in TLS1.3.
* So RSA-PSS is required for TLS1.3 servers if an RSA certificate is used.
*/
RESULT_ENSURE(!conn->config->is_rsa_cert_configured, S2N_ERR_RSA_PSS_NOT_SUPPORTED);
/* RSA-PSS is also required for TLS1.3 servers if client auth is requested, because the
* client might offer an RSA certificate.
*/
s2n_cert_auth_type client_auth_status = S2N_CERT_AUTH_NONE;
RESULT_GUARD_POSIX(s2n_connection_get_client_auth_type(conn, &client_auth_status));
RESULT_ENSURE(client_auth_status == S2N_CERT_AUTH_NONE, S2N_ERR_RSA_PSS_NOT_SUPPORTED);
return S2N_RESULT_OK;
}
bool s2n_connection_supports_tls13(struct s2n_connection *conn)
{
return s2n_result_is_ok(s2n_connection_validate_tls13_support(conn));
}
|