You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					283 lines
				
				8.9 KiB
			
		
		
			
		
	
	
					283 lines
				
				8.9 KiB
			| 
											2 years ago
										 | /** | ||
|  |  * A Javascript implementation of AES Cipher Suites for TLS. | ||
|  |  * | ||
|  |  * @author Dave Longley | ||
|  |  * | ||
|  |  * Copyright (c) 2009-2015 Digital Bazaar, Inc. | ||
|  |  * | ||
|  |  */ | ||
|  | var forge = require('./forge'); | ||
|  | require('./aes'); | ||
|  | require('./tls'); | ||
|  | 
 | ||
|  | var tls = module.exports = forge.tls; | ||
|  | 
 | ||
|  | /** | ||
|  |  * Supported cipher suites. | ||
|  |  */ | ||
|  | tls.CipherSuites['TLS_RSA_WITH_AES_128_CBC_SHA'] = { | ||
|  |   id: [0x00, 0x2f], | ||
|  |   name: 'TLS_RSA_WITH_AES_128_CBC_SHA', | ||
|  |   initSecurityParameters: function(sp) { | ||
|  |     sp.bulk_cipher_algorithm = tls.BulkCipherAlgorithm.aes; | ||
|  |     sp.cipher_type = tls.CipherType.block; | ||
|  |     sp.enc_key_length = 16; | ||
|  |     sp.block_length = 16; | ||
|  |     sp.fixed_iv_length = 16; | ||
|  |     sp.record_iv_length = 16; | ||
|  |     sp.mac_algorithm = tls.MACAlgorithm.hmac_sha1; | ||
|  |     sp.mac_length = 20; | ||
|  |     sp.mac_key_length = 20; | ||
|  |   }, | ||
|  |   initConnectionState: initConnectionState | ||
|  | }; | ||
|  | tls.CipherSuites['TLS_RSA_WITH_AES_256_CBC_SHA'] = { | ||
|  |   id: [0x00, 0x35], | ||
|  |   name: 'TLS_RSA_WITH_AES_256_CBC_SHA', | ||
|  |   initSecurityParameters: function(sp) { | ||
|  |     sp.bulk_cipher_algorithm = tls.BulkCipherAlgorithm.aes; | ||
|  |     sp.cipher_type = tls.CipherType.block; | ||
|  |     sp.enc_key_length = 32; | ||
|  |     sp.block_length = 16; | ||
|  |     sp.fixed_iv_length = 16; | ||
|  |     sp.record_iv_length = 16; | ||
|  |     sp.mac_algorithm = tls.MACAlgorithm.hmac_sha1; | ||
|  |     sp.mac_length = 20; | ||
|  |     sp.mac_key_length = 20; | ||
|  |   }, | ||
|  |   initConnectionState: initConnectionState | ||
|  | }; | ||
|  | 
 | ||
|  | function initConnectionState(state, c, sp) { | ||
|  |   var client = (c.entity === forge.tls.ConnectionEnd.client); | ||
|  | 
 | ||
|  |   // cipher setup
 | ||
|  |   state.read.cipherState = { | ||
|  |     init: false, | ||
|  |     cipher: forge.cipher.createDecipher('AES-CBC', client ? | ||
|  |       sp.keys.server_write_key : sp.keys.client_write_key), | ||
|  |     iv: client ? sp.keys.server_write_IV : sp.keys.client_write_IV | ||
|  |   }; | ||
|  |   state.write.cipherState = { | ||
|  |     init: false, | ||
|  |     cipher: forge.cipher.createCipher('AES-CBC', client ? | ||
|  |       sp.keys.client_write_key : sp.keys.server_write_key), | ||
|  |     iv: client ? sp.keys.client_write_IV : sp.keys.server_write_IV | ||
|  |   }; | ||
|  |   state.read.cipherFunction = decrypt_aes_cbc_sha1; | ||
|  |   state.write.cipherFunction = encrypt_aes_cbc_sha1; | ||
|  | 
 | ||
|  |   // MAC setup
 | ||
|  |   state.read.macLength = state.write.macLength = sp.mac_length; | ||
|  |   state.read.macFunction = state.write.macFunction = tls.hmac_sha1; | ||
|  | } | ||
|  | 
 | ||
|  | /** | ||
|  |  * Encrypts the TLSCompressed record into a TLSCipherText record using AES | ||
|  |  * in CBC mode. | ||
|  |  * | ||
|  |  * @param record the TLSCompressed record to encrypt. | ||
|  |  * @param s the ConnectionState to use. | ||
|  |  * | ||
|  |  * @return true on success, false on failure. | ||
|  |  */ | ||
|  | function encrypt_aes_cbc_sha1(record, s) { | ||
|  |   var rval = false; | ||
|  | 
 | ||
|  |   // append MAC to fragment, update sequence number
 | ||
|  |   var mac = s.macFunction(s.macKey, s.sequenceNumber, record); | ||
|  |   record.fragment.putBytes(mac); | ||
|  |   s.updateSequenceNumber(); | ||
|  | 
 | ||
|  |   // TLS 1.1+ use an explicit IV every time to protect against CBC attacks
 | ||
|  |   var iv; | ||
|  |   if(record.version.minor === tls.Versions.TLS_1_0.minor) { | ||
|  |     // use the pre-generated IV when initializing for TLS 1.0, otherwise use
 | ||
|  |     // the residue from the previous encryption
 | ||
|  |     iv = s.cipherState.init ? null : s.cipherState.iv; | ||
|  |   } else { | ||
|  |     iv = forge.random.getBytesSync(16); | ||
|  |   } | ||
|  | 
 | ||
|  |   s.cipherState.init = true; | ||
|  | 
 | ||
|  |   // start cipher
 | ||
|  |   var cipher = s.cipherState.cipher; | ||
|  |   cipher.start({iv: iv}); | ||
|  | 
 | ||
|  |   // TLS 1.1+ write IV into output
 | ||
|  |   if(record.version.minor >= tls.Versions.TLS_1_1.minor) { | ||
|  |     cipher.output.putBytes(iv); | ||
|  |   } | ||
|  | 
 | ||
|  |   // do encryption (default padding is appropriate)
 | ||
|  |   cipher.update(record.fragment); | ||
|  |   if(cipher.finish(encrypt_aes_cbc_sha1_padding)) { | ||
|  |     // set record fragment to encrypted output
 | ||
|  |     record.fragment = cipher.output; | ||
|  |     record.length = record.fragment.length(); | ||
|  |     rval = true; | ||
|  |   } | ||
|  | 
 | ||
|  |   return rval; | ||
|  | } | ||
|  | 
 | ||
|  | /** | ||
|  |  * Handles padding for aes_cbc_sha1 in encrypt mode. | ||
|  |  * | ||
|  |  * @param blockSize the block size. | ||
|  |  * @param input the input buffer. | ||
|  |  * @param decrypt true in decrypt mode, false in encrypt mode. | ||
|  |  * | ||
|  |  * @return true on success, false on failure. | ||
|  |  */ | ||
|  | function encrypt_aes_cbc_sha1_padding(blockSize, input, decrypt) { | ||
|  |   /* The encrypted data length (TLSCiphertext.length) is one more than the sum | ||
|  |    of SecurityParameters.block_length, TLSCompressed.length, | ||
|  |    SecurityParameters.mac_length, and padding_length. | ||
|  | 
 | ||
|  |    The padding may be any length up to 255 bytes long, as long as it results in | ||
|  |    the TLSCiphertext.length being an integral multiple of the block length. | ||
|  |    Lengths longer than necessary might be desirable to frustrate attacks on a | ||
|  |    protocol based on analysis of the lengths of exchanged messages. Each uint8 | ||
|  |    in the padding data vector must be filled with the padding length value. | ||
|  | 
 | ||
|  |    The padding length should be such that the total size of the | ||
|  |    GenericBlockCipher structure is a multiple of the cipher's block length. | ||
|  |    Legal values range from zero to 255, inclusive. This length specifies the | ||
|  |    length of the padding field exclusive of the padding_length field itself. | ||
|  | 
 | ||
|  |    This is slightly different from PKCS#7 because the padding value is 1 | ||
|  |    less than the actual number of padding bytes if you include the | ||
|  |    padding_length uint8 itself as a padding byte. */ | ||
|  |   if(!decrypt) { | ||
|  |     // get the number of padding bytes required to reach the blockSize and
 | ||
|  |     // subtract 1 for the padding value (to make room for the padding_length
 | ||
|  |     // uint8)
 | ||
|  |     var padding = blockSize - (input.length() % blockSize); | ||
|  |     input.fillWithByte(padding - 1, padding); | ||
|  |   } | ||
|  |   return true; | ||
|  | } | ||
|  | 
 | ||
|  | /** | ||
|  |  * Handles padding for aes_cbc_sha1 in decrypt mode. | ||
|  |  * | ||
|  |  * @param blockSize the block size. | ||
|  |  * @param output the output buffer. | ||
|  |  * @param decrypt true in decrypt mode, false in encrypt mode. | ||
|  |  * | ||
|  |  * @return true on success, false on failure. | ||
|  |  */ | ||
|  | function decrypt_aes_cbc_sha1_padding(blockSize, output, decrypt) { | ||
|  |   var rval = true; | ||
|  |   if(decrypt) { | ||
|  |     /* The last byte in the output specifies the number of padding bytes not | ||
|  |       including itself. Each of the padding bytes has the same value as that | ||
|  |       last byte (known as the padding_length). Here we check all padding | ||
|  |       bytes to ensure they have the value of padding_length even if one of | ||
|  |       them is bad in order to ward-off timing attacks. */ | ||
|  |     var len = output.length(); | ||
|  |     var paddingLength = output.last(); | ||
|  |     for(var i = len - 1 - paddingLength; i < len - 1; ++i) { | ||
|  |       rval = rval && (output.at(i) == paddingLength); | ||
|  |     } | ||
|  |     if(rval) { | ||
|  |       // trim off padding bytes and last padding length byte
 | ||
|  |       output.truncate(paddingLength + 1); | ||
|  |     } | ||
|  |   } | ||
|  |   return rval; | ||
|  | } | ||
|  | 
 | ||
|  | /** | ||
|  |  * Decrypts a TLSCipherText record into a TLSCompressed record using | ||
|  |  * AES in CBC mode. | ||
|  |  * | ||
|  |  * @param record the TLSCipherText record to decrypt. | ||
|  |  * @param s the ConnectionState to use. | ||
|  |  * | ||
|  |  * @return true on success, false on failure. | ||
|  |  */ | ||
|  | function decrypt_aes_cbc_sha1(record, s) { | ||
|  |   var rval = false; | ||
|  | 
 | ||
|  |   var iv; | ||
|  |   if(record.version.minor === tls.Versions.TLS_1_0.minor) { | ||
|  |     // use pre-generated IV when initializing for TLS 1.0, otherwise use the
 | ||
|  |     // residue from the previous decryption
 | ||
|  |     iv = s.cipherState.init ? null : s.cipherState.iv; | ||
|  |   } else { | ||
|  |     // TLS 1.1+ use an explicit IV every time to protect against CBC attacks
 | ||
|  |     // that is appended to the record fragment
 | ||
|  |     iv = record.fragment.getBytes(16); | ||
|  |   } | ||
|  | 
 | ||
|  |   s.cipherState.init = true; | ||
|  | 
 | ||
|  |   // start cipher
 | ||
|  |   var cipher = s.cipherState.cipher; | ||
|  |   cipher.start({iv: iv}); | ||
|  | 
 | ||
|  |   // do decryption
 | ||
|  |   cipher.update(record.fragment); | ||
|  |   rval = cipher.finish(decrypt_aes_cbc_sha1_padding); | ||
|  | 
 | ||
|  |   // even if decryption fails, keep going to minimize timing attacks
 | ||
|  | 
 | ||
|  |   // decrypted data:
 | ||
|  |   // first (len - 20) bytes = application data
 | ||
|  |   // last 20 bytes          = MAC
 | ||
|  |   var macLen = s.macLength; | ||
|  | 
 | ||
|  |   // create a random MAC to check against should the mac length check fail
 | ||
|  |   // Note: do this regardless of the failure to keep timing consistent
 | ||
|  |   var mac = forge.random.getBytesSync(macLen); | ||
|  | 
 | ||
|  |   // get fragment and mac
 | ||
|  |   var len = cipher.output.length(); | ||
|  |   if(len >= macLen) { | ||
|  |     record.fragment = cipher.output.getBytes(len - macLen); | ||
|  |     mac = cipher.output.getBytes(macLen); | ||
|  |   } else { | ||
|  |     // bad data, but get bytes anyway to try to keep timing consistent
 | ||
|  |     record.fragment = cipher.output.getBytes(); | ||
|  |   } | ||
|  |   record.fragment = forge.util.createBuffer(record.fragment); | ||
|  |   record.length = record.fragment.length(); | ||
|  | 
 | ||
|  |   // see if data integrity checks out, update sequence number
 | ||
|  |   var mac2 = s.macFunction(s.macKey, s.sequenceNumber, record); | ||
|  |   s.updateSequenceNumber(); | ||
|  |   rval = compareMacs(s.macKey, mac, mac2) && rval; | ||
|  |   return rval; | ||
|  | } | ||
|  | 
 | ||
|  | /** | ||
|  |  * Safely compare two MACs. This function will compare two MACs in a way | ||
|  |  * that protects against timing attacks. | ||
|  |  * | ||
|  |  * TODO: Expose elsewhere as a utility API. | ||
|  |  * | ||
|  |  * See: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2011/february/double-hmac-verification/
 | ||
|  |  * | ||
|  |  * @param key the MAC key to use. | ||
|  |  * @param mac1 as a binary-encoded string of bytes. | ||
|  |  * @param mac2 as a binary-encoded string of bytes. | ||
|  |  * | ||
|  |  * @return true if the MACs are the same, false if not. | ||
|  |  */ | ||
|  | function compareMacs(key, mac1, mac2) { | ||
|  |   var hmac = forge.hmac.create(); | ||
|  | 
 | ||
|  |   hmac.start('SHA1', key); | ||
|  |   hmac.update(mac1); | ||
|  |   mac1 = hmac.digest().getBytes(); | ||
|  | 
 | ||
|  |   hmac.start(null, null); | ||
|  |   hmac.update(mac2); | ||
|  |   mac2 = hmac.digest().getBytes(); | ||
|  | 
 | ||
|  |   return mac1 === mac2; | ||
|  | } |