Skip to content

Commit cca140b

Browse files
authored
Merge pull request #9981 from gilles-peskine-arm/tls_hs_defrag_in-3.6-badmac_seen
[Backport 3.6] Defragment incoming TLS handshake messages (reuse badmac_seen)
2 parents c811fb7 + 4726d20 commit cca140b

File tree

7 files changed

+147
-49
lines changed

7 files changed

+147
-49
lines changed

ChangeLog.d/tls-hs-defrag-in.txt

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
Bugfix
2+
* Support re-assembly of fragmented handshake messages in TLS, as mandated
3+
by the spec. Lack of support was causing handshake failures with some
4+
servers, especially with TLS 1.3 in practice (though both protocol
5+
version could be affected in principle, and both are fixed now).

include/mbedtls/ssl.h

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1724,7 +1724,16 @@ struct mbedtls_ssl_context {
17241724
int MBEDTLS_PRIVATE(early_data_state);
17251725
#endif
17261726

1727-
unsigned MBEDTLS_PRIVATE(badmac_seen); /*!< records with a bad MAC received */
1727+
/** Multipurpose field.
1728+
*
1729+
* - DTLS: records with a bad MAC received.
1730+
* - TLS: accumulated length of handshake fragments (up to \c in_hslen).
1731+
*
1732+
* This field is multipurpose in order to preserve the ABI in the
1733+
* Mbed TLS 3.6 LTS branch. Until 3.6.2, it was only used in DTLS
1734+
* and called `badmac_seen`.
1735+
*/
1736+
unsigned MBEDTLS_PRIVATE(badmac_seen_or_in_hsfraglen);
17281737

17291738
#if defined(MBEDTLS_X509_CRT_PARSE_C)
17301739
/** Callback to customize X.509 certificate chain verification */

library/ssl_misc.h

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1830,10 +1830,11 @@ void mbedtls_ssl_set_timer(mbedtls_ssl_context *ssl, uint32_t millisecs);
18301830
MBEDTLS_CHECK_RETURN_CRITICAL
18311831
int mbedtls_ssl_check_timer(mbedtls_ssl_context *ssl);
18321832

1833-
void mbedtls_ssl_reset_in_out_pointers(mbedtls_ssl_context *ssl);
1833+
void mbedtls_ssl_reset_in_pointers(mbedtls_ssl_context *ssl);
1834+
void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl);
1835+
void mbedtls_ssl_reset_out_pointers(mbedtls_ssl_context *ssl);
18341836
void mbedtls_ssl_update_out_pointers(mbedtls_ssl_context *ssl,
18351837
mbedtls_ssl_transform *transform);
1836-
void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl);
18371838

18381839
MBEDTLS_CHECK_RETURN_CRITICAL
18391840
int mbedtls_ssl_session_reset_int(mbedtls_ssl_context *ssl, int partial);

library/ssl_msg.c

Lines changed: 103 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@
2525
#include "constant_time_internal.h"
2626
#include "mbedtls/constant_time.h"
2727

28+
#include <limits.h>
2829
#include <string.h>
2930

3031
#if defined(MBEDTLS_USE_PSA_CRYPTO)
@@ -3220,13 +3221,17 @@ static uint32_t ssl_get_hs_total_len(mbedtls_ssl_context const *ssl)
32203221

32213222
int mbedtls_ssl_prepare_handshake_record(mbedtls_ssl_context *ssl)
32223223
{
3223-
if (ssl->in_msglen < mbedtls_ssl_hs_hdr_len(ssl)) {
3224+
/* First handshake fragment must at least include the header. */
3225+
if (ssl->in_msglen < mbedtls_ssl_hs_hdr_len(ssl) && ssl->in_hslen == 0) {
32243226
MBEDTLS_SSL_DEBUG_MSG(1, ("handshake message too short: %" MBEDTLS_PRINTF_SIZET,
32253227
ssl->in_msglen));
32263228
return MBEDTLS_ERR_SSL_INVALID_RECORD;
32273229
}
32283230

3229-
ssl->in_hslen = mbedtls_ssl_hs_hdr_len(ssl) + ssl_get_hs_total_len(ssl);
3231+
if (ssl->in_hslen == 0) {
3232+
ssl->in_hslen = mbedtls_ssl_hs_hdr_len(ssl) + ssl_get_hs_total_len(ssl);
3233+
ssl->badmac_seen_or_in_hsfraglen = 0;
3234+
}
32303235

32313236
MBEDTLS_SSL_DEBUG_MSG(3, ("handshake message: msglen ="
32323237
" %" MBEDTLS_PRINTF_SIZET ", type = %u, hslen = %"
@@ -3292,10 +3297,67 @@ int mbedtls_ssl_prepare_handshake_record(mbedtls_ssl_context *ssl)
32923297
}
32933298
} else
32943299
#endif /* MBEDTLS_SSL_PROTO_DTLS */
3295-
/* With TLS we don't handle fragmentation (for now) */
3296-
if (ssl->in_msglen < ssl->in_hslen) {
3297-
MBEDTLS_SSL_DEBUG_MSG(1, ("TLS handshake fragmentation not supported"));
3298-
return MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
3300+
if (ssl->badmac_seen_or_in_hsfraglen <= ssl->in_hslen) {
3301+
int ret;
3302+
const size_t hs_remain = ssl->in_hslen - ssl->badmac_seen_or_in_hsfraglen;
3303+
MBEDTLS_SSL_DEBUG_MSG(3,
3304+
("handshake fragment: %u .. %"
3305+
MBEDTLS_PRINTF_SIZET " of %"
3306+
MBEDTLS_PRINTF_SIZET " msglen %" MBEDTLS_PRINTF_SIZET,
3307+
ssl->badmac_seen_or_in_hsfraglen,
3308+
(size_t) ssl->badmac_seen_or_in_hsfraglen +
3309+
(hs_remain <= ssl->in_msglen ? hs_remain : ssl->in_msglen),
3310+
ssl->in_hslen, ssl->in_msglen));
3311+
if (ssl->in_msglen < hs_remain) {
3312+
/* ssl->in_msglen is a 25-bit value since it is the sum of the
3313+
* header length plus the payload length, the header length is 4
3314+
* and the payload length was received on the wire encoded as
3315+
* 3 octets. We don't support 16-bit platforms; more specifically,
3316+
* we assume that both unsigned and size_t are at least 32 bits.
3317+
* Therefore there is no possible integer overflow here.
3318+
*/
3319+
ssl->badmac_seen_or_in_hsfraglen += (unsigned) ssl->in_msglen;
3320+
ssl->in_hdr = ssl->in_msg + ssl->in_msglen;
3321+
ssl->in_msglen = 0;
3322+
mbedtls_ssl_update_in_pointers(ssl);
3323+
return MBEDTLS_ERR_SSL_CONTINUE_PROCESSING;
3324+
}
3325+
if (ssl->badmac_seen_or_in_hsfraglen > 0) {
3326+
/*
3327+
* At in_first_hdr we have a sequence of records that cover the next handshake
3328+
* record, each with its own record header that we need to remove.
3329+
* Note that the reassembled record size may not equal the size of the message,
3330+
* there may be more messages after it, complete or partial.
3331+
*/
3332+
unsigned char *in_first_hdr = ssl->in_buf + MBEDTLS_SSL_SEQUENCE_NUMBER_LEN;
3333+
unsigned char *p = in_first_hdr, *q = NULL;
3334+
size_t merged_rec_len = 0;
3335+
do {
3336+
mbedtls_record rec;
3337+
ret = ssl_parse_record_header(ssl, p, mbedtls_ssl_in_hdr_len(ssl), &rec);
3338+
if (ret != 0) {
3339+
return ret;
3340+
}
3341+
merged_rec_len += rec.data_len;
3342+
p = rec.buf + rec.buf_len;
3343+
if (q != NULL) {
3344+
memmove(q, rec.buf + rec.data_offset, rec.data_len);
3345+
q += rec.data_len;
3346+
} else {
3347+
q = p;
3348+
}
3349+
} while (merged_rec_len < ssl->in_hslen);
3350+
ssl->in_hdr = in_first_hdr;
3351+
mbedtls_ssl_update_in_pointers(ssl);
3352+
ssl->in_msglen = merged_rec_len;
3353+
/* Adjust message length. */
3354+
MBEDTLS_PUT_UINT16_BE(merged_rec_len, ssl->in_len, 0);
3355+
ssl->badmac_seen_or_in_hsfraglen = 0;
3356+
MBEDTLS_SSL_DEBUG_BUF(4, "reassembled record",
3357+
ssl->in_hdr, mbedtls_ssl_in_hdr_len(ssl) + merged_rec_len);
3358+
}
3359+
} else {
3360+
return MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
32993361
}
33003362

33013363
return 0;
@@ -4640,6 +4702,16 @@ static int ssl_consume_current_message(mbedtls_ssl_context *ssl)
46404702
return MBEDTLS_ERR_SSL_INTERNAL_ERROR;
46414703
}
46424704

4705+
if (ssl->badmac_seen_or_in_hsfraglen != 0) {
4706+
/* Not all handshake fragments have arrived, do not consume. */
4707+
MBEDTLS_SSL_DEBUG_MSG(3,
4708+
("waiting for more fragments (%u of %"
4709+
MBEDTLS_PRINTF_SIZET ", %" MBEDTLS_PRINTF_SIZET " left)",
4710+
ssl->badmac_seen_or_in_hsfraglen, ssl->in_hslen,
4711+
ssl->in_hslen - ssl->badmac_seen_or_in_hsfraglen));
4712+
return 0;
4713+
}
4714+
46434715
/*
46444716
* Get next Handshake message in the current record
46454717
*/
@@ -4665,6 +4737,7 @@ static int ssl_consume_current_message(mbedtls_ssl_context *ssl)
46654737
ssl->in_msglen -= ssl->in_hslen;
46664738
memmove(ssl->in_msg, ssl->in_msg + ssl->in_hslen,
46674739
ssl->in_msglen);
4740+
MBEDTLS_PUT_UINT16_BE(ssl->in_msglen, ssl->in_len, 0);
46684741

46694742
MBEDTLS_SSL_DEBUG_BUF(4, "remaining content in record",
46704743
ssl->in_msg, ssl->in_msglen);
@@ -4967,10 +5040,12 @@ static int ssl_get_next_record(mbedtls_ssl_context *ssl)
49675040
return ret;
49685041
}
49695042

4970-
if (ssl->conf->badmac_limit != 0 &&
4971-
++ssl->badmac_seen >= ssl->conf->badmac_limit) {
4972-
MBEDTLS_SSL_DEBUG_MSG(1, ("too many records with bad MAC"));
4973-
return MBEDTLS_ERR_SSL_INVALID_MAC;
5043+
if (ssl->conf->badmac_limit != 0) {
5044+
++ssl->badmac_seen_or_in_hsfraglen;
5045+
if (ssl->badmac_seen_or_in_hsfraglen >= ssl->conf->badmac_limit) {
5046+
MBEDTLS_SSL_DEBUG_MSG(1, ("too many records with bad MAC"));
5047+
return MBEDTLS_ERR_SSL_INVALID_MAC;
5048+
}
49745049
}
49755050

49765051
/* As above, invalid records cause
@@ -5339,7 +5414,7 @@ void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl)
53395414
} else
53405415
#endif
53415416
{
5342-
ssl->in_ctr = ssl->in_hdr - MBEDTLS_SSL_SEQUENCE_NUMBER_LEN;
5417+
ssl->in_ctr = ssl->in_buf;
53435418
ssl->in_len = ssl->in_hdr + 3;
53445419
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
53455420
ssl->in_cid = ssl->in_len;
@@ -5355,24 +5430,35 @@ void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl)
53555430
* Setup an SSL context
53565431
*/
53575432

5358-
void mbedtls_ssl_reset_in_out_pointers(mbedtls_ssl_context *ssl)
5433+
void mbedtls_ssl_reset_in_pointers(mbedtls_ssl_context *ssl)
5434+
{
5435+
#if defined(MBEDTLS_SSL_PROTO_DTLS)
5436+
if (ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) {
5437+
ssl->in_hdr = ssl->in_buf;
5438+
} else
5439+
#endif /* MBEDTLS_SSL_PROTO_DTLS */
5440+
{
5441+
ssl->in_hdr = ssl->in_buf + MBEDTLS_SSL_SEQUENCE_NUMBER_LEN;
5442+
}
5443+
5444+
/* Derive other internal pointers. */
5445+
mbedtls_ssl_update_in_pointers(ssl);
5446+
}
5447+
5448+
void mbedtls_ssl_reset_out_pointers(mbedtls_ssl_context *ssl)
53595449
{
53605450
/* Set the incoming and outgoing record pointers. */
53615451
#if defined(MBEDTLS_SSL_PROTO_DTLS)
53625452
if (ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) {
53635453
ssl->out_hdr = ssl->out_buf;
5364-
ssl->in_hdr = ssl->in_buf;
53655454
} else
53665455
#endif /* MBEDTLS_SSL_PROTO_DTLS */
53675456
{
53685457
ssl->out_ctr = ssl->out_buf;
5369-
ssl->out_hdr = ssl->out_buf + 8;
5370-
ssl->in_hdr = ssl->in_buf + 8;
5458+
ssl->out_hdr = ssl->out_buf + MBEDTLS_SSL_SEQUENCE_NUMBER_LEN;
53715459
}
5372-
53735460
/* Derive other internal pointers. */
53745461
mbedtls_ssl_update_out_pointers(ssl, NULL /* no transform enabled */);
5375-
mbedtls_ssl_update_in_pointers(ssl);
53765462
}
53775463

53785464
/*

library/ssl_tls.c

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -344,12 +344,13 @@ static void handle_buffer_resizing(mbedtls_ssl_context *ssl, int downsizing,
344344
size_t out_buf_new_len)
345345
{
346346
int modified = 0;
347-
size_t written_in = 0, iv_offset_in = 0, len_offset_in = 0;
347+
size_t written_in = 0, iv_offset_in = 0, len_offset_in = 0, hdr_in = 0;
348348
size_t written_out = 0, iv_offset_out = 0, len_offset_out = 0;
349349
if (ssl->in_buf != NULL) {
350350
written_in = ssl->in_msg - ssl->in_buf;
351351
iv_offset_in = ssl->in_iv - ssl->in_buf;
352352
len_offset_in = ssl->in_len - ssl->in_buf;
353+
hdr_in = ssl->in_hdr - ssl->in_buf;
353354
if (downsizing ?
354355
ssl->in_buf_len > in_buf_new_len && ssl->in_left < in_buf_new_len :
355356
ssl->in_buf_len < in_buf_new_len) {
@@ -381,7 +382,10 @@ static void handle_buffer_resizing(mbedtls_ssl_context *ssl, int downsizing,
381382
}
382383
if (modified) {
383384
/* Update pointers here to avoid doing it twice. */
384-
mbedtls_ssl_reset_in_out_pointers(ssl);
385+
ssl->in_hdr = ssl->in_buf + hdr_in;
386+
mbedtls_ssl_update_in_pointers(ssl);
387+
mbedtls_ssl_reset_out_pointers(ssl);
388+
385389
/* Fields below might not be properly updated with record
386390
* splitting or with CID, so they are manually updated here. */
387391
ssl->out_msg = ssl->out_buf + written_out;
@@ -1409,7 +1413,8 @@ int mbedtls_ssl_setup(mbedtls_ssl_context *ssl,
14091413
goto error;
14101414
}
14111415

1412-
mbedtls_ssl_reset_in_out_pointers(ssl);
1416+
mbedtls_ssl_reset_in_pointers(ssl);
1417+
mbedtls_ssl_reset_out_pointers(ssl);
14131418

14141419
#if defined(MBEDTLS_SSL_DTLS_SRTP)
14151420
memset(&ssl->dtls_srtp_info, 0, sizeof(ssl->dtls_srtp_info));
@@ -1474,7 +1479,8 @@ void mbedtls_ssl_session_reset_msg_layer(mbedtls_ssl_context *ssl,
14741479
/* Cancel any possibly running timer */
14751480
mbedtls_ssl_set_timer(ssl, 0);
14761481

1477-
mbedtls_ssl_reset_in_out_pointers(ssl);
1482+
mbedtls_ssl_reset_in_pointers(ssl);
1483+
mbedtls_ssl_reset_out_pointers(ssl);
14781484

14791485
/* Reset incoming message parsing */
14801486
ssl->in_offt = NULL;
@@ -1485,6 +1491,12 @@ void mbedtls_ssl_session_reset_msg_layer(mbedtls_ssl_context *ssl,
14851491
ssl->keep_current_message = 0;
14861492
ssl->transform_in = NULL;
14871493

1494+
/* TLS: reset in_hsfraglen, which is part of message parsing.
1495+
* DTLS: on a client reconnect, don't reset badmac_seen. */
1496+
if (!partial) {
1497+
ssl->badmac_seen_or_in_hsfraglen = 0;
1498+
}
1499+
14881500
#if defined(MBEDTLS_SSL_PROTO_DTLS)
14891501
ssl->next_record_offset = 0;
14901502
ssl->in_epoch = 0;
@@ -5014,7 +5026,7 @@ static const unsigned char ssl_serialized_context_header[] = {
50145026
* uint8 in_cid<0..2^8-1> // Connection ID: expected incoming value
50155027
* uint8 out_cid<0..2^8-1> // Connection ID: outgoing value to use
50165028
* // fields from ssl_context
5017-
* uint32 badmac_seen; // DTLS: number of records with failing MAC
5029+
* uint32 badmac_seen_or_in_hsfraglen; // DTLS: number of records with failing MAC
50185030
* uint64 in_window_top; // DTLS: last validated record seq_num
50195031
* uint64 in_window; // DTLS: bitmask for replay protection
50205032
* uint8 disable_datagram_packing; // DTLS: only one record per datagram
@@ -5156,7 +5168,7 @@ int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl,
51565168
*/
51575169
used += 4;
51585170
if (used <= buf_len) {
5159-
MBEDTLS_PUT_UINT32_BE(ssl->badmac_seen, p, 0);
5171+
MBEDTLS_PUT_UINT32_BE(ssl->badmac_seen_or_in_hsfraglen, p, 0);
51605172
p += 4;
51615173
}
51625174

@@ -5386,7 +5398,7 @@ static int ssl_context_load(mbedtls_ssl_context *ssl,
53865398
return MBEDTLS_ERR_SSL_BAD_INPUT_DATA;
53875399
}
53885400

5389-
ssl->badmac_seen = MBEDTLS_GET_UINT32_BE(p, 0);
5401+
ssl->badmac_seen_or_in_hsfraglen = MBEDTLS_GET_UINT32_BE(p, 0);
53905402
p += 4;
53915403

53925404
#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)

library/ssl_tls12_server.c

Lines changed: 0 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1057,28 +1057,6 @@ static int ssl_parse_client_hello(mbedtls_ssl_context *ssl)
10571057
MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message"));
10581058
return MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE;
10591059
}
1060-
{
1061-
size_t handshake_len = MBEDTLS_GET_UINT24_BE(buf, 1);
1062-
MBEDTLS_SSL_DEBUG_MSG(3, ("client hello v3, handshake len.: %u",
1063-
(unsigned) handshake_len));
1064-
1065-
/* The record layer has a record size limit of 2^14 - 1 and
1066-
* fragmentation is not supported, so buf[1] should be zero. */
1067-
if (buf[1] != 0) {
1068-
MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message: %u != 0",
1069-
(unsigned) buf[1]));
1070-
return MBEDTLS_ERR_SSL_DECODE_ERROR;
1071-
}
1072-
1073-
/* We don't support fragmentation of ClientHello (yet?) */
1074-
if (msg_len != mbedtls_ssl_hs_hdr_len(ssl) + handshake_len) {
1075-
MBEDTLS_SSL_DEBUG_MSG(1, ("bad client hello message: %u != %u + %u",
1076-
(unsigned) msg_len,
1077-
(unsigned) mbedtls_ssl_hs_hdr_len(ssl),
1078-
(unsigned) handshake_len));
1079-
return MBEDTLS_ERR_SSL_DECODE_ERROR;
1080-
}
1081-
}
10821060

10831061
#if defined(MBEDTLS_SSL_PROTO_DTLS)
10841062
if (ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) {

programs/ssl/ssl_context_info.c

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -743,6 +743,13 @@ static void print_deserialized_ssl_session(const uint8_t *ssl, uint32_t len,
743743
* uint8 alpn_chosen_len;
744744
* uint8 alpn_chosen<0..2^8-1> // ALPN: negotiated application protocol
745745
*
746+
* Note: In the mbedtls_ssl_context structure, badmac_seen is called
747+
* badmac_seen_or_in_hsfraglen since Mbed TLS 3.6.2. The field contains
748+
* the badmac_seen value in DTLS, and a handshake parsing intermediate
749+
* value in non-DTLS TLS. The value is only meaningful for DTLS and should
750+
* not be saved in non-DTLS TLS, so in this program, the context info file
751+
* filed remains badmac_seen.
752+
*
746753
* /p ssl pointer to serialized session
747754
* /p len number of bytes in the buffer
748755
*/

0 commit comments

Comments
 (0)