The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
pairs.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 98a9b2c74954ced9fb4ffed45d3237ff55bfba8e $
19 *
20 * @file tls/pairs.c
21 * @brief Functions to convert certificate OIDs to attribute pairs
22 *
23 * @copyright 2021 Arran Cudbard-Bell (a.cudbardb@freeradius.org)
24 */
25RCSID("$Id: 98a9b2c74954ced9fb4ffed45d3237ff55bfba8e $")
26USES_APPLE_DEPRECATED_API /* OpenSSL API has been deprecated by Apple */
27
28#ifdef WITH_TLS
29#define LOG_PREFIX "tls"
30
31#include <freeradius-devel/tls/openssl_user_macros.h>
32#include <freeradius-devel/util/pair.h>
33#include <freeradius-devel/server/request.h>
34#include <freeradius-devel/server/pair.h>
35#include <freeradius-devel/der/der.h>
36
37#include "attrs.h"
38#include "bio.h"
39#include "log.h"
40#include "session.h"
41#include "utils.h"
42
43#include <openssl/x509v3.h>
44#include <openssl/ssl.h>
45
47DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
48/** Extract session pairs from the Subject Alternate Name extension
49 *
50 */
51static bool tls_session_pairs_from_san(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509_EXTENSION *ext)
52{
53 GENERAL_NAMES *names = NULL;
54 int i;
56
57 if (!(names = X509V3_EXT_d2i(ext))) return false;
58
59 for (i = 0; i < sk_GENERAL_NAME_num(names); i++) {
60 GENERAL_NAME *name = sk_GENERAL_NAME_value(names, i);
61
62 switch (name->type) {
63#ifdef GEN_EMAIL
64 case GEN_EMAIL:
68 (char const *)ASN1_STRING_get0_data(name->d.rfc822Name),
69 ASN1_STRING_length(name->d.rfc822Name), true) == 0);
70 break;
71#endif /* GEN_EMAIL */
72#ifdef GEN_DNS
73 case GEN_DNS:
77 (char const *)ASN1_STRING_get0_data(name->d.dNSName),
78 ASN1_STRING_length(name->d.dNSName), true) == 0);
79 break;
80#endif /* GEN_DNS */
81#ifdef GEN_OTHERNAME
82 case GEN_OTHERNAME:
83 /* look for a MS UPN */
84 if (NID_ms_upn != OBJ_obj2nid(name->d.otherName->type_id)) break;
85
86 /* we've got a UPN - Must be ASN1-encoded UTF8 string */
87 if (name->d.otherName->value->type == V_ASN1_UTF8STRING) {
91 (char const *)ASN1_STRING_get0_data(name->d.otherName->value->value.utf8string),
92 ASN1_STRING_length(name->d.otherName->value->value.utf8string),
93 true) == 0);
94 break;
95 }
96 RWARN("Invalid UPN in Subject Alt Name (should be UTF-8)");
97 break;
98#endif /* GEN_OTHERNAME */
99 default:
100 /* XXX TODO handle other SAN types */
101 break;
102 }
103 }
104 if (names != NULL) GENERAL_NAMES_free(names);
105
106 return true;
107}
108
109/** Extract session pairs from the X509v3-CRL-Distribution-Points extension
110 *
111 */
112static bool tls_session_pairs_from_crl(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, UNUSED request_t *request, X509_EXTENSION *ext)
113{
114 ASN1_STRING *s = X509_EXTENSION_get_data(ext);
115 char unsigned const *data = ASN1_STRING_get0_data(s);
116 STACK_OF(DIST_POINT) *dps;
117 DIST_POINT *dp;
118 STACK_OF(GENERAL_NAME) *names;
119 GENERAL_NAME *name;
120 fr_pair_t *vp;
121 int i, j;
122
123 if (!(dps = d2i_CRL_DIST_POINTS(NULL, &data, ASN1_STRING_length(s)))) return false;
124
125 for (i = 0; i < sk_DIST_POINT_num(dps); i++) {
126 dp = sk_DIST_POINT_value(dps, i);
127 names = dp->distpoint->name.fullname;
128
129 /*
130 * We only want CRL distribution points that cover all reasons,
131 * so ignore any where reasons are set.
132 */
133 if (dp->reasons) continue;
134
135 for (j = 0; j < sk_GENERAL_NAME_num(names); j++) {
136 name = sk_GENERAL_NAME_value(names, j);
137
138 if (name->type != GEN_URI) continue;
142 (char const *)ASN1_STRING_get0_data(name->d.uniformResourceIdentifier),
143 true) == 0);
144 }
145 }
146
147 CRL_DIST_POINTS_free(dps);
148
149 return true;
150}
151
152/** Extract attributes from an X509 certificate
153 *
154 * @param[out] pair_list to copy attributes to.
155 * @param[in] ctx to allocate attributes in.
156 * @param[in] request the current request.
157 * @param[in] cert to validate.
158 * @param[in] der_decode should the certificate be parsed with the DER decoder.
159 * @return
160 * - 1 already exists.
161 * - 0 on success.
162 * - < 0 on failure.
163 */
164int fr_tls_session_pairs_from_x509_cert(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509 *cert,
165#if OPENSSL_VERSION_NUMBER >= 0x30400000L
166 bool der_decode
167#else
168 UNUSED bool der_decode
169#endif
170 )
171{
172 int loc;
173 char buff[1024];
174
175 ASN1_TIME const *asn_time;
176 time_t time;
177
178 STACK_OF(X509_EXTENSION) const *ext_list = NULL;
179
180 fr_pair_t *vp = NULL;
181 ssize_t slen;
182 bool san_found = false, crl_found = false;
183
184 /*
185 * We require OpenSSL >= 3.4 to call the DER decoder due to the stack size
186 * needed to handle the recursive calls involved in certificate decoding.
187 */
188#if OPENSSL_VERSION_NUMBER >= 0x30400000L
189 if (der_decode) {
190 uint8_t *cert_der;
191 uint8_t *cd;
192 int der_len;
193 fr_der_decode_ctx_t der_ctx;
194
195 der_len = i2d_X509(cert, NULL);
196 if (der_len < 0) {
197 fr_tls_log(request, "Failed retrieving certificate");
198 return -1;
199 }
200 der_ctx.tmp_ctx = talloc_new(ctx);
201 cert_der = cd = talloc_array(der_ctx.tmp_ctx, uint8_t, der_len);
202 i2d_X509(cert, &cd);
203 slen = fr_der_decode_pair_dbuff(request->session_state_ctx, &request->session_state_pairs,
204 attr_der_certificate, &FR_DBUFF_TMP(cert_der, (size_t)der_len), &der_ctx);
205 talloc_free(der_ctx.tmp_ctx);
206 if (slen < 0) {
207 fr_tls_log(request, "Failed decoding certificate");
208 return -1;
209 }
210 }
211#endif
212
213 /*
214 * Subject
215 */
217 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
218 X509_get_subject_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
219 fr_tls_bio_dbuff_thread_local_clear();
220 fr_tls_log(request, "Failed retrieving certificate subject");
221 error:
223 return -1;
224 }
225 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
226
227 RDEBUG3("Creating attributes for \"%pV\":", fr_box_strvalue_buffer(vp->vp_strvalue));
228
229 /*
230 * Common name
231 */
232 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert),
233 NID_commonName, NULL, 0);
234 if (slen > 0) {
235 char *cn;
236
238 MEM(fr_pair_value_bstr_alloc(vp, &cn, (size_t)slen, true) == 0); /* Allocs \0 byte in addition to len */
239
240 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, cn, (size_t)slen + 1);
241 if (slen < 0) {
242 fr_tls_log(request, "Failed retrieving certificate common name");
243 goto error;
244 }
245 }
246
247 /*
248 * Signature
249 */
250 {
251 ASN1_BIT_STRING const *sig;
252 X509_ALGOR const *alg;
253
254 X509_get0_signature(&sig, &alg, cert);
255
258 (uint8_t const *)ASN1_STRING_get0_data(sig),
259 ASN1_STRING_length(sig), true) == 0);
260
261 OBJ_obj2txt(buff, sizeof(buff), alg->algorithm, 0);
264 }
265
266 /*
267 * Issuer
268 */
270 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
271 X509_get_issuer_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
272 fr_tls_bio_dbuff_thread_local_clear();
273 fr_tls_log(request, "Failed retrieving certificate issuer");
274 goto error;
275 }
276 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
277
278 /*
279 * Serial number
280 */
281 {
282 ASN1_INTEGER const *serial = NULL;
283 unsigned char *der;
284 int len;
285
286 serial = X509_get0_serialNumber(cert);
287 if (!serial) {
288 fr_tls_log(request, "Failed retrieving certificate serial");
289 goto error;
290 }
291
292 len = i2d_ASN1_INTEGER(serial, NULL); /* get length */
294 MEM(fr_pair_value_mem_alloc(vp, &der, len, false) == 0);
295 i2d_ASN1_INTEGER(serial, &der);
296 }
297
298 /*
299 * Not valid before
300 */
301 asn_time = X509_get0_notBefore(cert);
302
303 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
304 RPWDEBUG("Failed parsing certificate not-before");
305 goto error;
306 }
307
309 vp->vp_date = fr_unix_time_from_time(time);
310
311 /*
312 * Not valid after
313 */
314 asn_time = X509_get0_notAfter(cert);
315
316 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
317 RPWDEBUG("Failed parsing certificate not-after");
318 goto error;
319 }
320
322 vp->vp_date = fr_unix_time_from_time(time);
323
324 /*
325 * Get the RFC822 Subject Alternative Name
326 */
327 loc = X509_get_ext_by_NID(cert, NID_subject_alt_name, 0);
328 if (loc >= 0) {
329 X509_EXTENSION *ext = X509_get_ext(cert, loc);
330 if (ext) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
331 }
332
333 loc = X509_get_ext_by_NID(cert, NID_crl_distribution_points, 0);
334 if (loc >= 0) {
335 X509_EXTENSION *ext = X509_get_ext(cert, loc);
336 if (ext) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
337 }
338
339 /*
340 * Only add extensions for the actual client certificate
341 */
342 ext_list = X509_get0_extensions(cert);
343 if (unlikely(!ext_list)) {
344 RWDEBUG("Failed retrieving extensions");
345 goto done;
346 }
347
348 /*
349 * Grab the X509 extensions, and create attributes out of them.
350 * For laziness, we reuse the OpenSSL names
351 */
352 if (sk_X509_EXTENSION_num(ext_list) > 0) {
353 int i;
354 BIO *bio;
355 fr_tls_bio_dbuff_t *bd;
356 fr_dbuff_t *in, *out;
357
358 bio = fr_tls_bio_dbuff_alloc(&bd, NULL, NULL, 257, 4097, true);
359 in = fr_tls_bio_dbuff_in(bd);
360 out = fr_tls_bio_dbuff_out(bd);
361
362 for (i = 0; i < sk_X509_EXTENSION_num(ext_list); i++) {
363 ASN1_OBJECT *obj;
364 X509_EXTENSION *ext;
365 fr_dict_attr_t const *da;
366 char *p;
367
368 ext = sk_X509_EXTENSION_value(ext_list, i);
369
370 obj = X509_EXTENSION_get_object(ext);
371
372 /*
373 * If this is extension is Subject Alternate Name have we already
374 * handled it? If not, do that now.
375 *
376 * Some certificate encodings have been observed where the SAN extension
377 * was not found by X509_get_ext_by_NID() but then seen when the list
378 * of extensions is handled here.
379 */
380 if (OBJ_obj2nid(obj) == NID_subject_alt_name) {
381 if (!san_found) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
382 goto again;
383 }
384
385 if (OBJ_obj2nid(obj) == NID_crl_distribution_points) {
386 if (!crl_found) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
387 goto again;
388 }
389
390 if (i2a_ASN1_OBJECT(bio, obj) <= 0) {
391 RPWDEBUG("Skipping X509 Extension (%i) conversion to attribute. "
392 "Conversion from ASN1 failed...", i);
393 again:
394 fr_tls_bio_dbuff_reset(bd);
395 continue;
396 }
397
398 if (fr_dbuff_remaining(out) == 0) goto again; /* Nothing written ? */
399
400 /*
401 * All disallowed chars get mashed to '-'
402 */
403 for (p = (char *)fr_dbuff_current(out);
404 p < (char *)fr_dbuff_end(out);
405 p++) if (!fr_dict_attr_allowed_chars[(uint8_t)*p]) *p = '-';
406
407 /*
408 * Terminate the buffer (after char replacement,
409 * so we do don't replace the \0)
410 */
411 if (unlikely(fr_dbuff_in_bytes(in, (uint8_t)'\0') <= 0)) {
412 RWDEBUG("Attribute name too long");
413 goto again;
414 }
415
417
418 fr_dbuff_set(in, fr_dbuff_current(in) - 1); /* Ensure the \0 isn't counted in remaining */
419
420 if (!da) {
421 RWDEBUG3("Skipping attribute \"%pV\": "
422 "Add a dictionary definition if you want to access it",
425 fr_strerror_clear(); /* Don't leave spurious errors from failed resolution */
426 goto again;
427 }
428
429 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
430
431 if (X509V3_EXT_print(bio, ext, X509V3_EXT_PARSE_UNKNOWN, 0) != 1) {
432 REDEBUG("Failed extracting data for \"%s\"", da->name);
433 goto again;
434 }
435
436 MEM(vp = fr_pair_afrom_da(ctx, da));
438 NULL, true) < 0) {
439 RPWDEBUG3("Skipping: %s += \"%pV\"",
440 da->name, fr_box_strvalue_len((char *)fr_dbuff_current(out),
443 goto again;
444 }
445 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
446
448 }
449 talloc_free(bd);
450 }
451
452done:
453 return 0;
454}
455DIAG_ON(used-but-marked-unused)
457#endif
#define USES_APPLE_DEPRECATED_API
Definition build.h:472
#define RCSID(id)
Definition build.h:485
#define DIAG_UNKNOWN_PRAGMAS
Definition build.h:458
#define DIAG_ON(_x)
Definition build.h:460
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define DIAG_OFF(_x)
Definition build.h:459
#define fr_dbuff_current(_dbuff_or_marker)
Return the 'current' position of a dbuff or marker.
Definition dbuff.h:911
#define fr_dbuff_set(_dst, _src)
Set the 'current' position in a dbuff or marker using another dbuff or marker, a char pointer,...
Definition dbuff.h:1004
#define fr_dbuff_end(_dbuff_or_marker)
Return the current 'end' position of a dbuff or marker.
Definition dbuff.h:938
#define fr_dbuff_remaining(_dbuff_or_marker)
Return the number of bytes remaining between the dbuff or marker and the end of the buffer.
Definition dbuff.h:743
#define fr_dbuff_in_bytes(_dbuff_or_marker,...)
Copy a byte sequence into a dbuff or marker.
Definition dbuff.h:1465
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:514
#define MEM(x)
Definition debug.h:36
TALLOC_CTX * tmp_ctx
ctx under which temporary data will be allocated
Definition der.h:117
bool const fr_dict_attr_allowed_chars[UINT8_MAX+1]
Characters allowed in a single dictionary attribute name.
Definition dict_util.c:64
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3359
static fr_slen_t in
Definition dict.h:861
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition base.c:36
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RWARN(fmt,...)
Definition log.h:297
#define RPWDEBUG3(fmt,...)
Definition log.h:368
#define RPWDEBUG(fmt,...)
Definition log.h:366
#define RWDEBUG3(fmt,...)
Definition log.h:363
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject
HIDDEN fr_dict_attr_t const * attr_tls_certificate_serial
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_dns
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_after
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_before
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature_algorithm
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_upn
HIDDEN fr_dict_attr_t const * attr_tls_certificate_common_name
HIDDEN fr_dict_attr_t const * attr_tls_certificate_issuer
HIDDEN fr_dict_attr_t const * attr_tls_certificate_x509v3_crl_distribution_points
HIDDEN fr_dict_attr_t const * attr_der_certificate
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_email
talloc_free(reap)
long int ssize_t
unsigned char uint8_t
static size_t used
int fr_pair_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Alloc a new fr_pair_t (and append)
Definition pair.c:1464
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2940
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
Definition pair.c:2640
int fr_pair_value_bstrdup_buffer_shallow(fr_pair_t *vp, char const *src, bool tainted)
Assign a string to a "string" type value pair.
Definition pair.c:2861
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
Definition pair.c:2594
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1345
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:287
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
Definition pair.c:2790
int fr_pair_value_bstr_alloc(fr_pair_t *vp, char **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "string" type value pair.
Definition pair.c:2736
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
Definition pair.c:2889
ssize_t fr_der_decode_pair_dbuff(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *parent, fr_dbuff_t *in, fr_der_decode_ctx_t *decode_ctx)
Definition decode.c:2363
static bool done
Definition radclient.c:81
#define REDEBUG(fmt,...)
Definition radclient.h:52
static char const * name
static char buff[sizeof("18446744073709551615")+3]
Definition size_tests.c:41
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
static const char * names[8]
Definition time.c:584
static fr_unix_time_t fr_unix_time_from_time(time_t time)
Convert a time_t into out internal fr_unix_time_t.
Definition time.h:536
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
Definition strerror.c:576
int fr_tls_utils_asn1time_to_epoch(time_t *out, ASN1_TIME const *asn1)
Convert OpenSSL's ASN1_TIME to an epoch time.
Definition utils.c:115
#define fr_box_strvalue_buffer(_val)
Definition value.h:311
static fr_slen_t data
Definition value.h:1291
#define fr_box_strvalue_len(_val, _len)
Definition value.h:308
static size_t char ** out
Definition value.h:1023