blob: d71924f0721eedde458298bee2c5a018e70068a2 [file] [log] [blame]
Emeric Brunfc0421f2012-09-07 17:30:07 +02001/*
2 * include/types/ssl_sock.h
3 * SSL settings for listeners and servers
4 *
5 * Copyright (C) 2012 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
6 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _TYPES_SSL_SOCK_H
23#define _TYPES_SSL_SOCK_H
Willy Tarreauc125cef2019-05-10 09:58:43 +020024#ifdef USE_OPENSSL
Emeric Brunfc0421f2012-09-07 17:30:07 +020025
William Lallemand2954c472020-03-06 21:54:13 +010026#include <ebpttree.h>
Emeric Brunfc0421f2012-09-07 17:30:07 +020027#include <ebmbtree.h>
William Lallemande0f3fd52020-02-25 14:53:06 +010028#include <eb64tree.h>
Emeric Brunfc0421f2012-09-07 17:30:07 +020029
Christopher Faulet16f45c82018-02-16 11:23:49 +010030#include <common/hathreads.h>
Willy Tarreau8dd0d552020-03-06 18:43:08 +010031#include <common/mini-clist.h>
Willy Tarreau55994562019-05-09 14:52:44 +020032#include <common/openssl-compat.h>
Christopher Faulet16f45c82018-02-16 11:23:49 +010033
Dragan Dosen1e7ed042020-05-08 18:30:00 +020034struct connection;
35
Emmanuel Hocdetddc090b2017-10-27 18:43:29 +020036struct pkey_info {
37 uint8_t sig; /* TLSEXT_signature_[rsa,ecdsa,...] */
38 uint16_t bits; /* key size in bits */
39};
40
Emeric Brunfc0421f2012-09-07 17:30:07 +020041struct sni_ctx {
42 SSL_CTX *ctx; /* context associated to the certificate */
43 int order; /* load order for the certificate */
Tim Duesterhus6a0dd732020-01-18 01:32:49 +010044 unsigned int neg:1; /* reject if match */
45 unsigned int wild:1; /* wildcard sni */
Emmanuel Hocdetddc090b2017-10-27 18:43:29 +020046 struct pkey_info kinfo; /* pkey info */
Emmanuel Hocdet98263292016-12-29 18:26:15 +010047 struct ssl_bind_conf *conf; /* ssl "bind" conf for the certificate */
William Lallemand9117de92019-10-04 00:29:42 +020048 struct list by_ckch_inst; /* chained in ckch_inst's list of sni_ctx */
William Lallemandcfca1422020-03-05 10:17:47 +010049 struct ckch_inst *ckch_inst; /* instance used to create this sni_ctx */
Emeric Brunfc0421f2012-09-07 17:30:07 +020050 struct ebmb_node name; /* node holding the servername value */
51};
52
Emmanuel Hocdet5db33cb2017-03-30 19:19:37 +020053struct tls_version_filter {
54 uint16_t flags; /* ssl options */
55 uint8_t min; /* min TLS version */
56 uint8_t max; /* max TLS version */
57};
58
Nenad Merdanovic200b0fa2015-05-09 08:46:01 +020059extern struct list tlskeys_reference;
60
Emeric Brun9e754772019-01-10 17:51:55 +010061struct tls_sess_key_128 {
Nenad Merdanovic05552d42015-02-27 19:56:49 +010062 unsigned char name[16];
63 unsigned char aes_key[16];
64 unsigned char hmac_key[16];
65} __attribute__((packed));
66
Emeric Brun9e754772019-01-10 17:51:55 +010067struct tls_sess_key_256 {
68 unsigned char name[16];
69 unsigned char aes_key[32];
70 unsigned char hmac_key[32];
71} __attribute__((packed));
72
73union tls_sess_key{
74 unsigned char name[16];
Nenad Merdanovic8ef70652019-04-14 16:06:46 +020075 struct tls_sess_key_128 key_128;
Emeric Brun9e754772019-01-10 17:51:55 +010076 struct tls_sess_key_256 key_256;
77} __attribute__((packed));
78
Nenad Merdanovic146defa2015-05-09 08:46:00 +020079struct tls_keys_ref {
80 struct list list; /* Used to chain refs. */
81 char *filename;
82 int unique_id; /* Each pattern reference have unique id. */
Willy Tarreau17b4aa12018-07-17 10:05:32 +020083 int refcount; /* number of users of this tls_keys_ref. */
Emeric Brun9e754772019-01-10 17:51:55 +010084 union tls_sess_key *tlskeys;
Nenad Merdanovic146defa2015-05-09 08:46:00 +020085 int tls_ticket_enc_index;
Emeric Brun9e754772019-01-10 17:51:55 +010086 int key_size_bits;
Christopher Faulet16f45c82018-02-16 11:23:49 +010087 __decl_hathreads(HA_RWLOCK_T lock); /* lock used to protect the ref */
Nenad Merdanovic146defa2015-05-09 08:46:00 +020088};
89
William Lallemand4f45bb92017-10-30 20:08:51 +010090/* shared ssl session */
91struct sh_ssl_sess_hdr {
92 struct ebmb_node key;
93 unsigned char key_data[SSL_MAX_SSL_SESSION_ID_LENGTH];
94};
95
William Lallemandad3c37b2020-03-25 20:20:26 +010096/* states of the CLI IO handler for 'set ssl cert' */
97enum {
98 SETCERT_ST_INIT = 0,
99 SETCERT_ST_GEN,
100 SETCERT_ST_INSERT,
101 SETCERT_ST_FIN,
102};
103
Ilya Shipitsin856aabc2020-04-16 23:51:34 +0500104/* This is used to preload the certificate, private key
William Lallemandf6adbe92019-09-11 16:33:52 +0200105 * and Cert Chain of a file passed in via the crt
106 * argument
107 *
108 * This way, we do not have to read the file multiple times
109 */
110struct cert_key_and_chain {
111 X509 *cert;
112 EVP_PKEY *key;
113 STACK_OF(X509) *chain;
114 DH *dh;
William Lallemanda17f4112019-10-10 15:16:44 +0200115 struct buffer *sctl;
William Lallemand246c0242019-10-11 08:59:13 +0200116 struct buffer *ocsp_response;
117 X509 *ocsp_issuer;
William Lallemandf6adbe92019-09-11 16:33:52 +0200118};
119
120/*
121 * this is used to store 1 to SSL_SOCK_NUM_KEYTYPES cert_key_and_chain and
122 * metadata.
123 */
124struct ckch_store {
125 struct cert_key_and_chain *ckch;
Tim Duesterhus6a0dd732020-01-18 01:32:49 +0100126 unsigned int multi:1; /* is it a multi-cert bundle ? */
William Lallemand9117de92019-10-04 00:29:42 +0200127 struct list ckch_inst; /* list of ckch_inst which uses this ckch_node */
William Lallemand23d61c02020-03-30 18:27:58 +0200128 struct list crtlist_entry; /* list of entries which use this store */
William Lallemandf6adbe92019-09-11 16:33:52 +0200129 struct ebmb_node node;
130 char path[0];
131};
132
William Lallemand9117de92019-10-04 00:29:42 +0200133/*
134 * This structure describe a ckch instance. An instance is generated for each
135 * bind_conf. The instance contains a linked list of the sni ctx which uses
136 * the ckch in this bind_conf.
William Lallemand9117de92019-10-04 00:29:42 +0200137 */
138struct ckch_inst {
139 struct bind_conf *bind_conf; /* pointer to the bind_conf that uses this ckch_inst */
William Lallemand150bfa82019-09-19 17:12:49 +0200140 struct ssl_bind_conf *ssl_conf; /* pointer to the ssl_conf which is used by every sni_ctx of this inst */
William Lallemandcfca1422020-03-05 10:17:47 +0100141 struct ckch_store *ckch_store; /* pointer to the store used to generate this inst */
William Lallemandcaa16192020-04-08 16:29:15 +0200142 struct crtlist_entry *crtlist_entry; /* pointer to the crtlist_entry used, or NULL */
William Lallemand0a528462020-03-09 16:53:42 +0100143 unsigned int is_default:1; /* This instance is used as the default ctx for this bind_conf */
144 /* space for more flag there */
William Lallemand9117de92019-10-04 00:29:42 +0200145 struct list sni_ctx; /* list of sni_ctx using this ckch_inst */
146 struct list by_ckchs; /* chained in ckch_store's list of ckch_inst */
William Lallemand2954c472020-03-06 21:54:13 +0100147 struct list by_crtlist_entry; /* chained in crtlist_entry list of inst */
148};
149
William Lallemand79d31ec2020-03-25 15:10:49 +0100150/* list of bind conf used by struct crtlist */
151struct bind_conf_list {
152 struct bind_conf *bind_conf;
153 struct bind_conf_list *next;
154};
155
William Lallemand2954c472020-03-06 21:54:13 +0100156/* This structure is basically a crt-list or a directory */
157struct crtlist {
William Lallemand79d31ec2020-03-25 15:10:49 +0100158 struct bind_conf_list *bind_conf; /* list of bind_conf which use this crtlist */
William Lallemandc69f02d2020-04-06 19:07:03 +0200159 unsigned int linecount; /* number of lines */
William Lallemand2954c472020-03-06 21:54:13 +0100160 struct eb_root entries;
161 struct list ord_entries; /* list to keep the line order of the crt-list file */
162 struct ebmb_node node; /* key is the filename or directory */
163};
164
165/* a file in a directory or a line in a crt-list */
166struct crtlist_entry {
167 struct ssl_bind_conf *ssl_conf; /* SSL conf in crt-list */
168 unsigned int linenum;
169 unsigned int fcount; /* filters count */
170 char **filters;
William Lallemandfa8cf0c2020-03-30 19:59:57 +0200171 struct crtlist *crtlist; /* ptr to the parent crtlist */
William Lallemand49398312020-03-30 17:01:33 +0200172 struct list ckch_inst; /* list of instances of this entry, there is 1 ckch_inst per instance of the crt-list */
William Lallemand2954c472020-03-06 21:54:13 +0100173 struct list by_crtlist; /* ordered entries */
William Lallemand23d61c02020-03-30 18:27:58 +0200174 struct list by_ckch_store; /* linked in ckch_store list of crtlist_entries */
William Lallemand2954c472020-03-06 21:54:13 +0100175 struct ebpt_node node; /* key is a ptr to a ckch_store */
William Lallemand9117de92019-10-04 00:29:42 +0200176};
William Lallemandf6adbe92019-09-11 16:33:52 +0200177
178#if HA_OPENSSL_VERSION_NUMBER >= 0x1000200fL
179
180#define SSL_SOCK_POSSIBLE_KT_COMBOS (1<<(SSL_SOCK_NUM_KEYTYPES))
181
182struct key_combo_ctx {
183 SSL_CTX *ctx;
184 int order;
185};
186
187/* Map used for processing multiple keypairs for a single purpose
188 *
189 * This maps CN/SNI name to certificate type
190 */
191struct sni_keytype {
192 int keytypes; /* BITMASK for keytypes */
193 struct ebmb_node name; /* node holding the servername value */
194};
195
196#endif
197
William Lallemande0f3fd52020-02-25 14:53:06 +0100198/* issuer chain store with hash of Subject Key Identifier
199 certificate/issuer matching is verify with X509_check_issued
200*/
201struct issuer_chain {
202 struct eb64_node node;
203 STACK_OF(X509) *chain;
204 char *path;
205};
206
Dragan Dosen1e7ed042020-05-08 18:30:00 +0200207typedef void (*ssl_sock_msg_callback_func)(struct connection *conn,
208 int write_p, int version, int content_type,
209 const void *buf, size_t len, SSL *ssl);
210
211/* This structure contains a function pointer <func> that is called
212 * when observing received or sent SSL/TLS protocol messages, such as
213 * handshake messages or other events that can occur during processing.
214 */
215struct ssl_sock_msg_callback {
216 ssl_sock_msg_callback_func func;
217 struct list list; /* list of registered callbacks */
218};
William Lallemande0f3fd52020-02-25 14:53:06 +0100219
Willy Tarreauc125cef2019-05-10 09:58:43 +0200220#endif /* USE_OPENSSL */
Emeric Brunfc0421f2012-09-07 17:30:07 +0200221#endif /* _TYPES_SSL_SOCK_H */