123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503 |
- /*
- * OpenConnect (SSL + DTLS) VPN client
- *
- * Copyright © 2008-2015 Intel Corporation.
- *
- * Author: David Woodhouse <dwmw2@infradead.org>
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public License
- * version 2.1, as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- */
- #include <config.h>
- #include "openconnect-internal.h"
- #include "lzo.h"
- #include <unistd.h>
- #include <stdio.h>
- #include <stdint.h>
- #include <string.h>
- #include <stdlib.h>
- #include <errno.h>
- int print_esp_keys(struct openconnect_info *vpninfo, const char *name, struct esp *esp)
- {
- int i;
- const char *enctype, *mactype;
- char enckey[256], mackey[256];
- switch(vpninfo->esp_enc) {
- case ENC_AES_128_CBC:
- enctype = "AES-128-CBC (RFC3602)";
- break;
- case ENC_AES_256_CBC:
- enctype = "AES-256-CBC (RFC3602)";
- break;
- default:
- return -EINVAL;
- }
- switch(vpninfo->esp_hmac) {
- case HMAC_MD5:
- mactype = "HMAC-MD5-96 (RFC2403)";
- break;
- case HMAC_SHA1:
- mactype = "HMAC-SHA-1-96 (RFC2404)";
- break;
- case HMAC_SHA256:
- mactype = "HMAC-SHA-256-128 (RFC4868)";
- break;
- default:
- return -EINVAL;
- }
- for (i = 0; i < vpninfo->enc_key_len; i++)
- sprintf(enckey + (2 * i), "%02x", esp->enc_key[i]);
- for (i = 0; i < vpninfo->hmac_key_len; i++)
- sprintf(mackey + (2 * i), "%02x", esp->hmac_key[i]);
- vpn_progress(vpninfo, PRG_TRACE,
- _("Parameters for %s ESP: SPI 0x%08x\n"),
- name, (unsigned)ntohl(esp->spi));
- vpn_progress(vpninfo, PRG_TRACE,
- _("ESP encryption type %s key 0x%s\n"),
- enctype, enckey);
- vpn_progress(vpninfo, PRG_TRACE,
- _("ESP authentication type %s key 0x%s\n"),
- mactype, mackey);
- return 0;
- }
- int esp_setup(struct openconnect_info *vpninfo)
- {
- if (vpninfo->dtls_state == DTLS_DISABLED ||
- vpninfo->dtls_state == DTLS_NOSECRET)
- return -EINVAL;
- /* XX: set ESP DPD interval if not already set */
- if (!vpninfo->dtls_times.dpd) {
- if (vpninfo->esp_ssl_fallback)
- vpninfo->dtls_times.dpd = vpninfo->esp_ssl_fallback;
- else
- vpninfo->dtls_times.dpd = vpninfo->dtls_attempt_period;
- }
- print_esp_keys(vpninfo, _("incoming"), &vpninfo->esp_in[vpninfo->current_esp_in]);
- print_esp_keys(vpninfo, _("outgoing"), &vpninfo->esp_out);
- vpn_progress(vpninfo, PRG_DEBUG, _("Send ESP probes\n"));
- if (vpninfo->proto->udp_send_probes)
- vpninfo->proto->udp_send_probes(vpninfo);
- return 0;
- }
- int construct_esp_packet(struct openconnect_info *vpninfo, struct pkt *pkt, uint8_t next_hdr)
- {
- const int blksize = 16;
- int i, padlen, ret;
- if (!next_hdr) {
- if ((pkt->data[0] & 0xf0) == 0x60) /* iph->ip_v */
- next_hdr = IPPROTO_IPV6;
- else
- next_hdr = IPPROTO_IPIP;
- }
- /* This gets much more fun if the IV is variable-length */
- pkt->esp.spi = vpninfo->esp_out.spi;
- pkt->esp.seq = htonl(vpninfo->esp_out.seq++);
- padlen = blksize - 1 - ((pkt->len + 1) % blksize);
- for (i=0; i<padlen; i++)
- pkt->data[pkt->len + i] = i + 1;
- pkt->data[pkt->len + padlen] = padlen;
- pkt->data[pkt->len + padlen + 1] = next_hdr;
- memcpy(pkt->esp.iv, vpninfo->esp_out.iv, sizeof(pkt->esp.iv));
- ret = encrypt_esp_packet(vpninfo, pkt, pkt->len + padlen + 2);
- if (ret)
- return ret;
- return sizeof(pkt->esp) + pkt->len + padlen + 2 + vpninfo->hmac_out_len;
- }
- int esp_mainloop(struct openconnect_info *vpninfo, int *timeout, int readable)
- {
- struct esp *esp = &vpninfo->esp_in[vpninfo->current_esp_in];
- struct esp *old_esp = &vpninfo->esp_in[vpninfo->current_esp_in ^ 1];
- struct pkt *this;
- int work_done = 0;
- int ret;
- /* Some servers send us packets that are larger than negotiated
- MTU, or lack the ability to negotiate MTU (see gpst.c). We
- reserve some extra space to handle that */
- int receive_mtu = MAX(2048, vpninfo->ip_info.mtu + 256);
- if (vpninfo->dtls_state == DTLS_SLEEPING) {
- if (ka_check_deadline(timeout, time(NULL), vpninfo->new_dtls_started + vpninfo->dtls_attempt_period)
- || vpninfo->dtls_need_reconnect) {
- vpn_progress(vpninfo, PRG_DEBUG, _("Send ESP probes\n"));
- if (vpninfo->proto->udp_send_probes)
- vpninfo->proto->udp_send_probes(vpninfo);
- }
- }
- if (vpninfo->dtls_fd == -1)
- return 0;
- while (readable) {
- int len = receive_mtu + vpninfo->pkt_trailer;
- int i;
- struct pkt *pkt;
- if (!vpninfo->dtls_pkt) {
- vpninfo->dtls_pkt = alloc_pkt(vpninfo, len);
- if (!vpninfo->dtls_pkt) {
- vpn_progress(vpninfo, PRG_ERR, _("Allocation failed\n"));
- break;
- }
- }
- pkt = vpninfo->dtls_pkt;
- len = recv(vpninfo->dtls_fd, (void *)&pkt->esp, len + sizeof(pkt->esp), 0);
- if (!len)
- break;
- if (len < 0) {
- #ifdef _WIN32
- int err = WSAGetLastError();
- if (err == WSAEWOULDBLOCK)
- break;
- char *errstr = openconnect__win32_strerror(err);
- vpn_progress(vpninfo, PRG_ERR,
- _("ESP receive error: %s\n"),
- errstr);
- free(errstr);
- #else
- if (errno == EAGAIN || errno == EWOULDBLOCK)
- break;
- vpn_progress(vpninfo, PRG_ERR,
- _("ESP receive error: %s\n"),
- strerror(errno));
- #endif
- /* On *real* errors, close the UDP socket and try again later. */
- vpninfo->proto->udp_close(vpninfo);
- return 0;
- }
- work_done = 1;
- /* both supported algos (SHA1 and MD5) have 12-byte MAC lengths (RFC2403 and RFC2404) */
- if (len <= sizeof(pkt->esp) + vpninfo->hmac_out_len)
- continue;
- len -= sizeof(pkt->esp) + vpninfo->hmac_out_len;
- pkt->len = len;
- if (pkt->esp.spi == esp->spi) {
- if (decrypt_esp_packet(vpninfo, esp, pkt))
- continue;
- } else if (pkt->esp.spi == old_esp->spi &&
- ntohl(pkt->esp.seq) + esp->seq < vpninfo->old_esp_maxseq) {
- vpn_progress(vpninfo, PRG_TRACE,
- _("Received ESP packet from old SPI 0x%x, seq %u\n"),
- (unsigned)ntohl(old_esp->spi), (unsigned)ntohl(pkt->esp.seq));
- if (decrypt_esp_packet(vpninfo, old_esp, pkt))
- continue;
- } else {
- vpn_progress(vpninfo, PRG_DEBUG,
- _("Received ESP packet with invalid SPI 0x%08x\n"),
- (unsigned)ntohl(pkt->esp.spi));
- continue;
- }
- /* Possible values of the Next Header field are:
- 0x04: IP[v4]-in-IP
- 0x05: supposed to mean Internet Stream Protocol
- (XXX: but used for LZO compressed IPv4 packets by Juniper)
- 0x29: IPv6 encapsulation */
- if (pkt->data[len - 1] == 0x04)
- vpn_progress(vpninfo, PRG_TRACE, _("Received ESP Legacy IP packet of %d bytes\n"),
- len);
- else if (pkt->data[len - 1] == 0x05)
- vpn_progress(vpninfo, PRG_TRACE, _("Received ESP Legacy IP packet of %d bytes (LZO-compressed)\n"),
- len);
- else if (pkt->data[len - 1] == 0x29)
- vpn_progress(vpninfo, PRG_TRACE, _("Received ESP IPv6 packet of %d bytes\n"),
- len);
- else {
- vpn_progress(vpninfo, PRG_ERR,
- _("Received ESP packet of %d bytes with unrecognised payload type %02x\n"),
- len, pkt->data[len-1]);
- continue;
- }
- if (len <= 2 + pkt->data[len - 2]) {
- vpn_progress(vpninfo, PRG_ERR,
- _("Invalid padding length %02x in ESP\n"),
- pkt->data[len - 2]);
- continue;
- }
- pkt->len = len - 2 - pkt->data[len - 2];
- for (i = 0 ; i < pkt->data[len - 2]; i++) {
- if (pkt->data[pkt->len + i] != i + 1)
- break; /* We can't just 'continue' here because it
- * would only break out of this 'for' loop */
- }
- if (i != pkt->data[len - 2]) {
- vpn_progress(vpninfo, PRG_ERR,
- _("Invalid padding bytes in ESP\n"));
- continue; /* We can here, though */
- }
- vpninfo->dtls_times.last_rx = time(NULL);
- if (vpninfo->proto->udp_catch_probe) {
- if (vpninfo->proto->udp_catch_probe(vpninfo, pkt)) {
- if (vpninfo->dtls_state == DTLS_SLEEPING) {
- vpn_progress(vpninfo, PRG_INFO,
- _("ESP session established with server\n"));
- vpninfo->dtls_state = DTLS_CONNECTED;
- }
- continue;
- }
- }
- if (pkt->data[len - 1] == 0x05) {
- struct pkt *newpkt = alloc_pkt(vpninfo, receive_mtu + vpninfo->pkt_trailer);
- int newlen = receive_mtu;
- if (!newpkt) {
- vpn_progress(vpninfo, PRG_ERR,
- _("Failed to allocate memory to decrypt ESP packet\n"));
- continue;
- }
- if (av_lzo1x_decode(newpkt->data, &newlen,
- pkt->data, &pkt->len) || pkt->len) {
- vpn_progress(vpninfo, PRG_ERR,
- _("LZO decompression of ESP packet failed\n"));
- free_pkt(vpninfo, newpkt);
- continue;
- }
- newpkt->len = receive_mtu - newlen;
- vpn_progress(vpninfo, PRG_TRACE,
- _("LZO decompressed %d bytes into %d\n"),
- len - 2 - pkt->data[len-2], newpkt->len);
- queue_packet(&vpninfo->incoming_queue, newpkt);
- } else {
- queue_packet(&vpninfo->incoming_queue, pkt);
- vpninfo->dtls_pkt = NULL;
- }
- }
- if (vpninfo->dtls_state != DTLS_ESTABLISHED)
- return 0;
- switch (keepalive_action(&vpninfo->dtls_times, timeout)) {
- case KA_REKEY:
- vpn_progress(vpninfo, PRG_ERR, _("Rekey not implemented for ESP\n"));
- break;
- case KA_DPD_DEAD:
- vpn_progress(vpninfo, PRG_ERR, _("ESP detected dead peer\n"));
- if (vpninfo->proto->udp_close)
- vpninfo->proto->udp_close(vpninfo);
- if (vpninfo->proto->udp_send_probes)
- vpninfo->proto->udp_send_probes(vpninfo);
- return 1;
- case KA_DPD:
- vpn_progress(vpninfo, PRG_DEBUG, _("Send ESP probes for DPD\n"));
- if (vpninfo->proto->udp_send_probes)
- vpninfo->proto->udp_send_probes(vpninfo);
- work_done = 1;
- break;
- case KA_KEEPALIVE:
- vpn_progress(vpninfo, PRG_ERR, _("Keepalive not implemented for ESP\n"));
- break;
- case KA_NONE:
- break;
- }
- while (1) {
- int len;
- int ip_version;
- if (vpninfo->deflate_pkt) {
- this = vpninfo->deflate_pkt;
- len = this->len;
- ip_version = this->data[0] >> 4;
- } else {
- this = dequeue_packet(&vpninfo->outgoing_queue);
- if (!this)
- break;
- ip_version = this->data[0] >> 4;
- if (vpninfo->proto->proto == PROTO_PULSE) {
- uint8_t dontsend;
- /* Pulse can only accept ESP of the same protocol as the one
- * you connected to it with. The other has to go over IF-T/TLS. */
- if (vpninfo->dtls_addr->sa_family == AF_INET6)
- dontsend = 4;
- else
- dontsend = 6;
- if (ip_version == dontsend) {
- store_be32(&this->pulse.vendor, 0xa4c);
- store_be32(&this->pulse.type, 4);
- store_be32(&this->pulse.len, this->len + 16);
- queue_packet(&vpninfo->tcp_control_queue, this);
- work_done = 1;
- continue;
- }
- } else if (vpninfo->proto->proto == PROTO_NC &&
- vpninfo->dtls_addr->sa_family == AF_INET6) {
- /* Juniper/NC cannot do ESP-over-IPv6, and it cannot send
- * tunneled IPv6 packets at all; they just get dropped.
- * It shouldn't even send any ESP options/keys when connecting
- * to the server via IPv6. This should never happen.
- */
- vpninfo->quit_reason = "Juniper/NC ESP tunnel over IPv6 should never happen.";
- return 1;
- }
- /* XX: Must precede in-place encryption of the packet, because
- IP header fields (version and TOS) are garbled afterward.
- If TOS optname is set, we want to copy the TOS/TCLASS header
- to the outer UDP packet */
- if (vpninfo->dtls_tos_optname)
- udp_tos_update(vpninfo, this);
- len = construct_esp_packet(vpninfo, this, 0);
- if (len < 0) {
- /* Should we disable ESP? */
- free_pkt(vpninfo, this);
- work_done = 1;
- continue;
- }
- }
- ret = send(vpninfo->dtls_fd, (void *)&this->esp, len, 0);
- if (ret < 0) {
- /* Not that this is likely to happen with UDP, but... */
- if (errno == ENOBUFS || errno == EAGAIN || errno == EWOULDBLOCK) {
- vpninfo->deflate_pkt = this;
- this->len = len;
- vpn_progress(vpninfo, PRG_DEBUG,
- _("Requeueing failed ESP send: %s\n"),
- strerror(errno));
- monitor_write_fd(vpninfo, dtls);
- return work_done;
- } else {
- /* A real error in sending. Fall back to TCP? */
- vpn_progress(vpninfo, PRG_ERR,
- _("Failed to send ESP packet: %s\n"),
- strerror(errno));
- }
- } else {
- vpninfo->dtls_times.last_tx = time(NULL);
- vpn_progress(vpninfo, PRG_TRACE, _("Sent ESP IPv%d packet of %d bytes\n"),
- ip_version, len);
- }
- if (this == vpninfo->deflate_pkt) {
- unmonitor_write_fd(vpninfo, dtls);
- vpninfo->deflate_pkt = NULL;
- }
- free_pkt(vpninfo, this);
- work_done = 1;
- }
- return work_done;
- }
- void esp_close(struct openconnect_info *vpninfo)
- {
- /* We close and reopen the socket in case we roamed and our
- local IP address has changed. */
- if (vpninfo->dtls_fd != -1) {
- unmonitor_fd(vpninfo, dtls);
- closesocket(vpninfo->dtls_fd);
- vpninfo->dtls_fd = -1;
- }
- if (vpninfo->dtls_state > DTLS_DISABLED)
- vpninfo->dtls_state = DTLS_SLEEPING;
- if (vpninfo->deflate_pkt) {
- free_pkt(vpninfo, vpninfo->deflate_pkt);
- vpninfo->deflate_pkt = NULL;
- }
- }
- void esp_shutdown(struct openconnect_info *vpninfo)
- {
- destroy_esp_ciphers(&vpninfo->esp_in[0]);
- destroy_esp_ciphers(&vpninfo->esp_in[1]);
- destroy_esp_ciphers(&vpninfo->esp_out);
- if (vpninfo->proto->udp_close)
- vpninfo->proto->udp_close(vpninfo);
- if (vpninfo->dtls_state != DTLS_DISABLED)
- vpninfo->dtls_state = DTLS_NOSECRET;
- }
- int openconnect_setup_esp_keys(struct openconnect_info *vpninfo, int new_keys)
- {
- struct esp *esp_in;
- int ret;
- if (vpninfo->dtls_state == DTLS_DISABLED)
- return -EOPNOTSUPP;
- if (!vpninfo->dtls_addr)
- return -EINVAL;
- if (vpninfo->esp_hmac == HMAC_SHA256)
- vpninfo->hmac_out_len = 16;
- else /* MD5 and SHA1 */
- vpninfo->hmac_out_len = 12;
- if (new_keys) {
- vpninfo->old_esp_maxseq = vpninfo->esp_in[vpninfo->current_esp_in].seq + 32;
- vpninfo->current_esp_in ^= 1;
- }
- esp_in = &vpninfo->esp_in[vpninfo->current_esp_in];
- if (new_keys) {
- if (openconnect_random(&esp_in->spi, sizeof(esp_in->spi)) ||
- openconnect_random((void *)&esp_in->enc_key, vpninfo->enc_key_len) ||
- openconnect_random((void *)&esp_in->hmac_key, vpninfo->hmac_key_len)) {
- vpn_progress(vpninfo, PRG_ERR,
- _("Failed to generate random keys for ESP\n"));
- return -EIO;
- }
- }
- if (openconnect_random(vpninfo->esp_out.iv, sizeof(vpninfo->esp_out.iv))) {
- vpn_progress(vpninfo, PRG_ERR,
- _("Failed to generate initial IV for ESP\n"));
- return -EIO;
- }
- /* This is the minimum; some implementations may increase it */
- vpninfo->pkt_trailer = MAX_ESP_PAD + MAX_IV_SIZE + MAX_HMAC_SIZE;
- vpninfo->esp_out.seq = vpninfo->esp_out.seq_backlog = 0;
- esp_in->seq = esp_in->seq_backlog = 0;
- ret = init_esp_ciphers(vpninfo, &vpninfo->esp_out, esp_in);
- if (ret)
- return ret;
- if (vpninfo->dtls_state == DTLS_NOSECRET)
- vpninfo->dtls_state = DTLS_SECRET;
- return 0;
- }
|