{-# OPTIONS_HADDOCK hide #-} {-# LANGUAGE OverloadedStrings, ScopedTypeVariables, BangPatterns #-} -- | -- Module : Network.TLS.Core -- License : BSD-style -- Maintainer : Vincent Hanquez -- Stability : experimental -- Portability : unknown -- module Network.TLS.Core ( -- * Internal packet sending and receiving sendPacket , recvPacket -- * Initialisation and Termination of context , bye , handshake -- * Application Layer Protocol Negotiation , getNegotiatedProtocol -- * Server Name Indication , getClientSNI -- * High level API , sendData , recvData , recvData' , updateKey , KeyUpdateRequest(..) , requestCertificate ) where import Network.TLS.Cipher import Network.TLS.Context import Network.TLS.Crypto import Network.TLS.Struct import Network.TLS.Struct13 import Network.TLS.State (getSession) import Network.TLS.Parameters import Network.TLS.IO import Network.TLS.Session import Network.TLS.Handshake import Network.TLS.Handshake.Common import Network.TLS.Handshake.Common13 import Network.TLS.Handshake.Process import Network.TLS.Handshake.State import Network.TLS.Handshake.State13 import Network.TLS.PostHandshake import Network.TLS.KeySchedule import Network.TLS.Types (Role(..), HostName, AnyTrafficSecret(..), ApplicationSecret) import Network.TLS.Util (catchException, mapChunks_) import Network.TLS.Extension import qualified Network.TLS.State as S import qualified Data.ByteString as B import qualified Data.ByteString.Char8 as C8 import qualified Data.ByteString.Lazy as L import qualified Control.Exception as E import Control.Monad.State.Strict -- | notify the context that this side wants to close connection. -- this is important that it is called before closing the handle, otherwise -- the session might not be resumable (for version < TLS1.2). -- -- this doesn't actually close the handle bye :: MonadIO m => Context -> m () bye ctx = liftIO $ do -- Although setEOF is always protected by the read lock, here we don't try -- to wrap ctxEOF with it, so that function bye can still be called -- concurrently to a blocked recvData. eof <- ctxEOF ctx tls13 <- tls13orLater ctx unless eof $ withWriteLock ctx $ if tls13 then sendPacket13 ctx $ Alert13 [(AlertLevel_Warning, CloseNotify)] else sendPacket ctx $ Alert [(AlertLevel_Warning, CloseNotify)] -- | If the ALPN extensions have been used, this will -- return get the protocol agreed upon. getNegotiatedProtocol :: MonadIO m => Context -> m (Maybe B.ByteString) getNegotiatedProtocol ctx = liftIO $ usingState_ ctx S.getNegotiatedProtocol -- | If the Server Name Indication extension has been used, return the -- hostname specified by the client. getClientSNI :: MonadIO m => Context -> m (Maybe HostName) getClientSNI ctx = liftIO $ usingState_ ctx S.getClientSNI -- | sendData sends a bunch of data. -- It will automatically chunk data to acceptable packet size sendData :: MonadIO m => Context -> L.ByteString -> m () sendData ctx dataToSend = liftIO $ do tls13 <- tls13orLater ctx let sendP | tls13 = sendPacket13 ctx . AppData13 | otherwise = sendPacket ctx . AppData withWriteLock ctx $ do checkValid ctx -- All chunks are protected with the same write lock because we don't -- want to interleave writes from other threads in the middle of our -- possibly large write. let len = ctxFragmentSize ctx mapM_ (mapChunks_ len sendP) (L.toChunks dataToSend) -- | Get data out of Data packet, and automatically renegotiate if a Handshake -- ClientHello is received. An empty result means EOF. recvData :: MonadIO m => Context -> m B.ByteString recvData ctx = liftIO $ do tls13 <- tls13orLater ctx withReadLock ctx $ do checkValid ctx -- We protect with a read lock both reception and processing of the -- packet, because don't want another thread to receive a new packet -- before this one has been fully processed. -- -- Even when recvData1/recvData13 loops, we only need to call function -- checkValid once. Since we hold the read lock, no concurrent call -- will impact the validity of the context. if tls13 then recvData13 ctx else recvData1 ctx recvData1 :: Context -> IO B.ByteString recvData1 ctx = do pkt <- recvPacket ctx either (onError terminate) process pkt where process (Handshake [ch@ClientHello{}]) = handshakeWith ctx ch >> recvData1 ctx process (Handshake [hr@HelloRequest]) = handshakeWith ctx hr >> recvData1 ctx process (Alert [(AlertLevel_Warning, CloseNotify)]) = tryBye ctx >> setEOF ctx >> return B.empty process (Alert [(AlertLevel_Fatal, desc)]) = do setEOF ctx E.throwIO (Terminated True ("received fatal error: " ++ show desc) (Error_Protocol ("remote side fatal error", True, desc))) -- when receiving empty appdata, we just retry to get some data. process (AppData "") = recvData1 ctx process (AppData x) = return x process p = let reason = "unexpected message " ++ show p in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason terminate = terminateWithWriteLock ctx (sendPacket ctx . Alert) recvData13 :: Context -> IO B.ByteString recvData13 ctx = do pkt <- recvPacket13 ctx either (onError terminate) process pkt where process (Alert13 [(AlertLevel_Warning, CloseNotify)]) = tryBye ctx >> setEOF ctx >> return B.empty process (Alert13 [(AlertLevel_Fatal, desc)]) = do setEOF ctx E.throwIO (Terminated True ("received fatal error: " ++ show desc) (Error_Protocol ("remote side fatal error", True, desc))) process (Handshake13 hs) = do loopHandshake13 hs recvData13 ctx -- when receiving empty appdata, we just retry to get some data. process (AppData13 "") = recvData13 ctx process (AppData13 x) = do let chunkLen = C8.length x established <- ctxEstablished ctx case established of EarlyDataAllowed maxSize | chunkLen <= maxSize -> do setEstablished ctx $ EarlyDataAllowed (maxSize - chunkLen) return x | otherwise -> let reason = "early data overflow" in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason EarlyDataNotAllowed n | n > 0 -> do setEstablished ctx $ EarlyDataNotAllowed (n - 1) recvData13 ctx -- ignore "x" | otherwise -> let reason = "early data deprotect overflow" in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason Established -> return x NotEstablished -> throwCore $ Error_Protocol ("data at not-established", True, UnexpectedMessage) process ChangeCipherSpec13 = recvData13 ctx process p = let reason = "unexpected message " ++ show p in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason loopHandshake13 [] = return () loopHandshake13 (ClientHello13{}:_) = do let reason = "Client hello is not allowed" terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason -- fixme: some implementations send multiple NST at the same time. -- Only the first one is used at this moment. loopHandshake13 (NewSessionTicket13 life add nonce label exts:hs) = do role <- usingState_ ctx S.isClientContext unless (role == ClientRole) $ let reason = "Session ticket is allowed for client only" in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason -- This part is similar to handshake code, so protected with -- read+write locks (which is also what we use for all calls to the -- session manager). withWriteLock ctx $ do Just resumptionMasterSecret <- usingHState ctx getTLS13ResumptionSecret (_, usedCipher, _, _) <- getTxState ctx let choice = makeCipherChoice TLS13 usedCipher psk = derivePSK choice resumptionMasterSecret nonce maxSize = case extensionLookup extensionID_EarlyData exts >>= extensionDecode MsgTNewSessionTicket of Just (EarlyDataIndication (Just ms)) -> fromIntegral $ safeNonNegative32 ms _ -> 0 life7d = min life 604800 -- 7 days max tinfo <- createTLS13TicketInfo life7d (Right add) Nothing sdata <- getSessionData13 ctx usedCipher tinfo maxSize psk let !label' = B.copy label sessionEstablish (sharedSessionManager $ ctxShared ctx) label' sdata -- putStrLn $ "NewSessionTicket received: lifetime = " ++ show life ++ " sec" loopHandshake13 hs loopHandshake13 (KeyUpdate13 mode:hs) = do when (ctxQUICMode ctx) $ do let reason = "KeyUpdate is not allowed for QUIC" terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason checkAlignment hs established <- ctxEstablished ctx -- Though RFC 8446 Sec 4.6.3 does not clearly says, -- unidirectional key update is legal. -- So, we don't have to check if this key update is corresponding -- to key update (update_requested) which we sent. if established == Established then do keyUpdate ctx getRxState setRxState -- Write lock wraps both actions because we don't want another -- packet to be sent by another thread before the Tx state is -- updated. when (mode == UpdateRequested) $ withWriteLock ctx $ do sendPacket13 ctx $ Handshake13 [KeyUpdate13 UpdateNotRequested] keyUpdate ctx getTxState setTxState loopHandshake13 hs else do let reason = "received key update before established" terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason loopHandshake13 (h@CertRequest13{}:hs) = postHandshakeAuthWith ctx h >> loopHandshake13 hs loopHandshake13 (h@Certificate13{}:hs) = postHandshakeAuthWith ctx h >> loopHandshake13 hs loopHandshake13 (h:hs) = do mPendingAction <- popPendingAction ctx case mPendingAction of Nothing -> let reason = "unexpected handshake message " ++ show h in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason Just action -> do -- Pending actions are executed with read+write locks, just -- like regular handshake code. withWriteLock ctx $ handleException ctx $ case action of PendingAction needAligned pa -> do when needAligned $ checkAlignment hs processHandshake13 ctx h >> pa h PendingActionHash needAligned pa -> do when needAligned $ checkAlignment hs d <- transcriptHash ctx processHandshake13 ctx h pa d h loopHandshake13 hs terminate = terminateWithWriteLock ctx (sendPacket13 ctx . Alert13) checkAlignment hs = do complete <- isRecvComplete ctx unless (complete && null hs) $ let reason = "received message not aligned with record boundary" in terminate (Error_Misc reason) AlertLevel_Fatal UnexpectedMessage reason -- the other side could have close the connection already, so wrap -- this in a try and ignore all exceptions tryBye :: Context -> IO () tryBye ctx = catchException (bye ctx) (\_ -> return ()) onError :: Monad m => (TLSError -> AlertLevel -> AlertDescription -> String -> m B.ByteString) -> TLSError -> m B.ByteString onError _ Error_EOF = -- Not really an error. return B.empty onError terminate err@(Error_Protocol (reason,fatal,desc)) = terminate err (if fatal then AlertLevel_Fatal else AlertLevel_Warning) desc reason onError terminate err = terminate err AlertLevel_Fatal InternalError (show err) terminateWithWriteLock :: Context -> ([(AlertLevel, AlertDescription)] -> IO ()) -> TLSError -> AlertLevel -> AlertDescription -> String -> IO a terminateWithWriteLock ctx send err level desc reason = do session <- usingState_ ctx getSession -- Session manager is always invoked with read+write locks, so we merge this -- with the alert packet being emitted. withWriteLock ctx $ do case session of Session Nothing -> return () Session (Just sid) -> sessionInvalidate (sharedSessionManager $ ctxShared ctx) sid catchException (send [(level, desc)]) (\_ -> return ()) setEOF ctx E.throwIO (Terminated False reason err) {-# DEPRECATED recvData' "use recvData that returns strict bytestring" #-} -- | same as recvData but returns a lazy bytestring. recvData' :: MonadIO m => Context -> m L.ByteString recvData' ctx = L.fromChunks . (:[]) <$> recvData ctx keyUpdate :: Context -> (Context -> IO (Hash,Cipher,CryptLevel,C8.ByteString)) -> (Context -> Hash -> Cipher -> AnyTrafficSecret ApplicationSecret -> IO ()) -> IO () keyUpdate ctx getState setState = do (usedHash, usedCipher, level, applicationSecretN) <- getState ctx unless (level == CryptApplicationSecret) $ throwCore $ Error_Protocol ("tried key update without application traffic secret", True, InternalError) let applicationSecretN1 = hkdfExpandLabel usedHash applicationSecretN "traffic upd" "" $ hashDigestSize usedHash setState ctx usedHash usedCipher (AnyTrafficSecret applicationSecretN1) -- | How to update keys in TLS 1.3 data KeyUpdateRequest = OneWay -- ^ Unidirectional key update | TwoWay -- ^ Bidirectional key update (normal case) deriving (Eq, Show) -- | Updating appication traffic secrets for TLS 1.3. -- If this API is called for TLS 1.3, 'True' is returned. -- Otherwise, 'False' is returned. updateKey :: MonadIO m => Context -> KeyUpdateRequest -> m Bool updateKey ctx way = liftIO $ do tls13 <- tls13orLater ctx when tls13 $ do let req = case way of OneWay -> UpdateNotRequested TwoWay -> UpdateRequested -- Write lock wraps both actions because we don't want another packet to -- be sent by another thread before the Tx state is updated. withWriteLock ctx $ do sendPacket13 ctx $ Handshake13 [KeyUpdate13 req] keyUpdate ctx getTxState setTxState return tls13