You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					283 lines
				
				8.9 KiB
			
		
		
			
		
	
	
					283 lines
				
				8.9 KiB
			| 
								 
											2 years ago
										 
									 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * A Javascript implementation of AES Cipher Suites for TLS.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @author Dave Longley
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Copyright (c) 2009-2015 Digital Bazaar, Inc.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var forge = require('./forge');
							 | 
						||
| 
								 | 
							
								require('./aes');
							 | 
						||
| 
								 | 
							
								require('./tls');
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								var tls = module.exports = forge.tls;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Supported cipher suites.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.CipherSuites['TLS_RSA_WITH_AES_128_CBC_SHA'] = {
							 | 
						||
| 
								 | 
							
								  id: [0x00, 0x2f],
							 | 
						||
| 
								 | 
							
								  name: 'TLS_RSA_WITH_AES_128_CBC_SHA',
							 | 
						||
| 
								 | 
							
								  initSecurityParameters: function(sp) {
							 | 
						||
| 
								 | 
							
								    sp.bulk_cipher_algorithm = tls.BulkCipherAlgorithm.aes;
							 | 
						||
| 
								 | 
							
								    sp.cipher_type = tls.CipherType.block;
							 | 
						||
| 
								 | 
							
								    sp.enc_key_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.block_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.fixed_iv_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.record_iv_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.mac_algorithm = tls.MACAlgorithm.hmac_sha1;
							 | 
						||
| 
								 | 
							
								    sp.mac_length = 20;
							 | 
						||
| 
								 | 
							
								    sp.mac_key_length = 20;
							 | 
						||
| 
								 | 
							
								  },
							 | 
						||
| 
								 | 
							
								  initConnectionState: initConnectionState
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								tls.CipherSuites['TLS_RSA_WITH_AES_256_CBC_SHA'] = {
							 | 
						||
| 
								 | 
							
								  id: [0x00, 0x35],
							 | 
						||
| 
								 | 
							
								  name: 'TLS_RSA_WITH_AES_256_CBC_SHA',
							 | 
						||
| 
								 | 
							
								  initSecurityParameters: function(sp) {
							 | 
						||
| 
								 | 
							
								    sp.bulk_cipher_algorithm = tls.BulkCipherAlgorithm.aes;
							 | 
						||
| 
								 | 
							
								    sp.cipher_type = tls.CipherType.block;
							 | 
						||
| 
								 | 
							
								    sp.enc_key_length = 32;
							 | 
						||
| 
								 | 
							
								    sp.block_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.fixed_iv_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.record_iv_length = 16;
							 | 
						||
| 
								 | 
							
								    sp.mac_algorithm = tls.MACAlgorithm.hmac_sha1;
							 | 
						||
| 
								 | 
							
								    sp.mac_length = 20;
							 | 
						||
| 
								 | 
							
								    sp.mac_key_length = 20;
							 | 
						||
| 
								 | 
							
								  },
							 | 
						||
| 
								 | 
							
								  initConnectionState: initConnectionState
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								function initConnectionState(state, c, sp) {
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === forge.tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // cipher setup
							 | 
						||
| 
								 | 
							
								  state.read.cipherState = {
							 | 
						||
| 
								 | 
							
								    init: false,
							 | 
						||
| 
								 | 
							
								    cipher: forge.cipher.createDecipher('AES-CBC', client ?
							 | 
						||
| 
								 | 
							
								      sp.keys.server_write_key : sp.keys.client_write_key),
							 | 
						||
| 
								 | 
							
								    iv: client ? sp.keys.server_write_IV : sp.keys.client_write_IV
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  state.write.cipherState = {
							 | 
						||
| 
								 | 
							
								    init: false,
							 | 
						||
| 
								 | 
							
								    cipher: forge.cipher.createCipher('AES-CBC', client ?
							 | 
						||
| 
								 | 
							
								      sp.keys.client_write_key : sp.keys.server_write_key),
							 | 
						||
| 
								 | 
							
								    iv: client ? sp.keys.client_write_IV : sp.keys.server_write_IV
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  state.read.cipherFunction = decrypt_aes_cbc_sha1;
							 | 
						||
| 
								 | 
							
								  state.write.cipherFunction = encrypt_aes_cbc_sha1;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // MAC setup
							 | 
						||
| 
								 | 
							
								  state.read.macLength = state.write.macLength = sp.mac_length;
							 | 
						||
| 
								 | 
							
								  state.read.macFunction = state.write.macFunction = tls.hmac_sha1;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Encrypts the TLSCompressed record into a TLSCipherText record using AES
							 | 
						||
| 
								 | 
							
								 * in CBC mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param record the TLSCompressed record to encrypt.
							 | 
						||
| 
								 | 
							
								 * @param s the ConnectionState to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								function encrypt_aes_cbc_sha1(record, s) {
							 | 
						||
| 
								 | 
							
								  var rval = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // append MAC to fragment, update sequence number
							 | 
						||
| 
								 | 
							
								  var mac = s.macFunction(s.macKey, s.sequenceNumber, record);
							 | 
						||
| 
								 | 
							
								  record.fragment.putBytes(mac);
							 | 
						||
| 
								 | 
							
								  s.updateSequenceNumber();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TLS 1.1+ use an explicit IV every time to protect against CBC attacks
							 | 
						||
| 
								 | 
							
								  var iv;
							 | 
						||
| 
								 | 
							
								  if(record.version.minor === tls.Versions.TLS_1_0.minor) {
							 | 
						||
| 
								 | 
							
								    // use the pre-generated IV when initializing for TLS 1.0, otherwise use
							 | 
						||
| 
								 | 
							
								    // the residue from the previous encryption
							 | 
						||
| 
								 | 
							
								    iv = s.cipherState.init ? null : s.cipherState.iv;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    iv = forge.random.getBytesSync(16);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  s.cipherState.init = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // start cipher
							 | 
						||
| 
								 | 
							
								  var cipher = s.cipherState.cipher;
							 | 
						||
| 
								 | 
							
								  cipher.start({iv: iv});
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TLS 1.1+ write IV into output
							 | 
						||
| 
								 | 
							
								  if(record.version.minor >= tls.Versions.TLS_1_1.minor) {
							 | 
						||
| 
								 | 
							
								    cipher.output.putBytes(iv);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do encryption (default padding is appropriate)
							 | 
						||
| 
								 | 
							
								  cipher.update(record.fragment);
							 | 
						||
| 
								 | 
							
								  if(cipher.finish(encrypt_aes_cbc_sha1_padding)) {
							 | 
						||
| 
								 | 
							
								    // set record fragment to encrypted output
							 | 
						||
| 
								 | 
							
								    record.fragment = cipher.output;
							 | 
						||
| 
								 | 
							
								    record.length = record.fragment.length();
							 | 
						||
| 
								 | 
							
								    rval = true;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Handles padding for aes_cbc_sha1 in encrypt mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param blockSize the block size.
							 | 
						||
| 
								 | 
							
								 * @param input the input buffer.
							 | 
						||
| 
								 | 
							
								 * @param decrypt true in decrypt mode, false in encrypt mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								function encrypt_aes_cbc_sha1_padding(blockSize, input, decrypt) {
							 | 
						||
| 
								 | 
							
								  /* The encrypted data length (TLSCiphertext.length) is one more than the sum
							 | 
						||
| 
								 | 
							
								   of SecurityParameters.block_length, TLSCompressed.length,
							 | 
						||
| 
								 | 
							
								   SecurityParameters.mac_length, and padding_length.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								   The padding may be any length up to 255 bytes long, as long as it results in
							 | 
						||
| 
								 | 
							
								   the TLSCiphertext.length being an integral multiple of the block length.
							 | 
						||
| 
								 | 
							
								   Lengths longer than necessary might be desirable to frustrate attacks on a
							 | 
						||
| 
								 | 
							
								   protocol based on analysis of the lengths of exchanged messages. Each uint8
							 | 
						||
| 
								 | 
							
								   in the padding data vector must be filled with the padding length value.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								   The padding length should be such that the total size of the
							 | 
						||
| 
								 | 
							
								   GenericBlockCipher structure is a multiple of the cipher's block length.
							 | 
						||
| 
								 | 
							
								   Legal values range from zero to 255, inclusive. This length specifies the
							 | 
						||
| 
								 | 
							
								   length of the padding field exclusive of the padding_length field itself.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								   This is slightly different from PKCS#7 because the padding value is 1
							 | 
						||
| 
								 | 
							
								   less than the actual number of padding bytes if you include the
							 | 
						||
| 
								 | 
							
								   padding_length uint8 itself as a padding byte. */
							 | 
						||
| 
								 | 
							
								  if(!decrypt) {
							 | 
						||
| 
								 | 
							
								    // get the number of padding bytes required to reach the blockSize and
							 | 
						||
| 
								 | 
							
								    // subtract 1 for the padding value (to make room for the padding_length
							 | 
						||
| 
								 | 
							
								    // uint8)
							 | 
						||
| 
								 | 
							
								    var padding = blockSize - (input.length() % blockSize);
							 | 
						||
| 
								 | 
							
								    input.fillWithByte(padding - 1, padding);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return true;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Handles padding for aes_cbc_sha1 in decrypt mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param blockSize the block size.
							 | 
						||
| 
								 | 
							
								 * @param output the output buffer.
							 | 
						||
| 
								 | 
							
								 * @param decrypt true in decrypt mode, false in encrypt mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								function decrypt_aes_cbc_sha1_padding(blockSize, output, decrypt) {
							 | 
						||
| 
								 | 
							
								  var rval = true;
							 | 
						||
| 
								 | 
							
								  if(decrypt) {
							 | 
						||
| 
								 | 
							
								    /* The last byte in the output specifies the number of padding bytes not
							 | 
						||
| 
								 | 
							
								      including itself. Each of the padding bytes has the same value as that
							 | 
						||
| 
								 | 
							
								      last byte (known as the padding_length). Here we check all padding
							 | 
						||
| 
								 | 
							
								      bytes to ensure they have the value of padding_length even if one of
							 | 
						||
| 
								 | 
							
								      them is bad in order to ward-off timing attacks. */
							 | 
						||
| 
								 | 
							
								    var len = output.length();
							 | 
						||
| 
								 | 
							
								    var paddingLength = output.last();
							 | 
						||
| 
								 | 
							
								    for(var i = len - 1 - paddingLength; i < len - 1; ++i) {
							 | 
						||
| 
								 | 
							
								      rval = rval && (output.at(i) == paddingLength);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    if(rval) {
							 | 
						||
| 
								 | 
							
								      // trim off padding bytes and last padding length byte
							 | 
						||
| 
								 | 
							
								      output.truncate(paddingLength + 1);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Decrypts a TLSCipherText record into a TLSCompressed record using
							 | 
						||
| 
								 | 
							
								 * AES in CBC mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param record the TLSCipherText record to decrypt.
							 | 
						||
| 
								 | 
							
								 * @param s the ConnectionState to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								function decrypt_aes_cbc_sha1(record, s) {
							 | 
						||
| 
								 | 
							
								  var rval = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var iv;
							 | 
						||
| 
								 | 
							
								  if(record.version.minor === tls.Versions.TLS_1_0.minor) {
							 | 
						||
| 
								 | 
							
								    // use pre-generated IV when initializing for TLS 1.0, otherwise use the
							 | 
						||
| 
								 | 
							
								    // residue from the previous decryption
							 | 
						||
| 
								 | 
							
								    iv = s.cipherState.init ? null : s.cipherState.iv;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // TLS 1.1+ use an explicit IV every time to protect against CBC attacks
							 | 
						||
| 
								 | 
							
								    // that is appended to the record fragment
							 | 
						||
| 
								 | 
							
								    iv = record.fragment.getBytes(16);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  s.cipherState.init = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // start cipher
							 | 
						||
| 
								 | 
							
								  var cipher = s.cipherState.cipher;
							 | 
						||
| 
								 | 
							
								  cipher.start({iv: iv});
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do decryption
							 | 
						||
| 
								 | 
							
								  cipher.update(record.fragment);
							 | 
						||
| 
								 | 
							
								  rval = cipher.finish(decrypt_aes_cbc_sha1_padding);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // even if decryption fails, keep going to minimize timing attacks
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // decrypted data:
							 | 
						||
| 
								 | 
							
								  // first (len - 20) bytes = application data
							 | 
						||
| 
								 | 
							
								  // last 20 bytes          = MAC
							 | 
						||
| 
								 | 
							
								  var macLen = s.macLength;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create a random MAC to check against should the mac length check fail
							 | 
						||
| 
								 | 
							
								  // Note: do this regardless of the failure to keep timing consistent
							 | 
						||
| 
								 | 
							
								  var mac = forge.random.getBytesSync(macLen);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get fragment and mac
							 | 
						||
| 
								 | 
							
								  var len = cipher.output.length();
							 | 
						||
| 
								 | 
							
								  if(len >= macLen) {
							 | 
						||
| 
								 | 
							
								    record.fragment = cipher.output.getBytes(len - macLen);
							 | 
						||
| 
								 | 
							
								    mac = cipher.output.getBytes(macLen);
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // bad data, but get bytes anyway to try to keep timing consistent
							 | 
						||
| 
								 | 
							
								    record.fragment = cipher.output.getBytes();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  record.fragment = forge.util.createBuffer(record.fragment);
							 | 
						||
| 
								 | 
							
								  record.length = record.fragment.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // see if data integrity checks out, update sequence number
							 | 
						||
| 
								 | 
							
								  var mac2 = s.macFunction(s.macKey, s.sequenceNumber, record);
							 | 
						||
| 
								 | 
							
								  s.updateSequenceNumber();
							 | 
						||
| 
								 | 
							
								  rval = compareMacs(s.macKey, mac, mac2) && rval;
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Safely compare two MACs. This function will compare two MACs in a way
							 | 
						||
| 
								 | 
							
								 * that protects against timing attacks.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * TODO: Expose elsewhere as a utility API.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * See: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2011/february/double-hmac-verification/
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param key the MAC key to use.
							 | 
						||
| 
								 | 
							
								 * @param mac1 as a binary-encoded string of bytes.
							 | 
						||
| 
								 | 
							
								 * @param mac2 as a binary-encoded string of bytes.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true if the MACs are the same, false if not.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								function compareMacs(key, mac1, mac2) {
							 | 
						||
| 
								 | 
							
								  var hmac = forge.hmac.create();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  hmac.start('SHA1', key);
							 | 
						||
| 
								 | 
							
								  hmac.update(mac1);
							 | 
						||
| 
								 | 
							
								  mac1 = hmac.digest().getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  hmac.start(null, null);
							 | 
						||
| 
								 | 
							
								  hmac.update(mac2);
							 | 
						||
| 
								 | 
							
								  mac2 = hmac.digest().getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return mac1 === mac2;
							 | 
						||
| 
								 | 
							
								}
							 |