/* $OpenBSD: tak.c,v 1.21 2024/11/13 12:51:04 tb Exp $ */ /* * Copyright (c) 2022 Job Snijders * Copyright (c) 2022 Theo Buehler * Copyright (c) 2019 Kristaps Dzonsons * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include "extern.h" extern ASN1_OBJECT *tak_oid; /* * ASN.1 templates for Trust Anchor Keys (draft-ietf-sidrops-signed-tal-12) */ ASN1_ITEM_EXP TAKey_it; ASN1_ITEM_EXP TAK_it; DECLARE_STACK_OF(ASN1_IA5STRING); #ifndef DEFINE_STACK_OF #define sk_ASN1_IA5STRING_num(st) SKM_sk_num(ASN1_IA5STRING, (st)) #define sk_ASN1_IA5STRING_value(st, i) SKM_sk_value(ASN1_IA5STRING, (st), (i)) #endif typedef struct { STACK_OF(ASN1_UTF8STRING) *comments; STACK_OF(ASN1_IA5STRING) *certificateURIs; X509_PUBKEY *subjectPublicKeyInfo; } TAKey; typedef struct { ASN1_INTEGER *version; TAKey *current; TAKey *predecessor; TAKey *successor; } TAK; ASN1_SEQUENCE(TAKey) = { ASN1_SEQUENCE_OF(TAKey, comments, ASN1_UTF8STRING), ASN1_SEQUENCE_OF(TAKey, certificateURIs, ASN1_IA5STRING), ASN1_SIMPLE(TAKey, subjectPublicKeyInfo, X509_PUBKEY), } ASN1_SEQUENCE_END(TAKey); ASN1_SEQUENCE(TAK) = { ASN1_EXP_OPT(TAK, version, ASN1_INTEGER, 0), ASN1_SIMPLE(TAK, current, TAKey), ASN1_EXP_OPT(TAK, predecessor, TAKey, 0), ASN1_EXP_OPT(TAK, successor, TAKey, 1), } ASN1_SEQUENCE_END(TAK); DECLARE_ASN1_FUNCTIONS(TAK); IMPLEMENT_ASN1_FUNCTIONS(TAK); /* * On success return pointer to allocated & valid takey structure, * on failure return NULL. */ static struct takey * parse_takey(const char *fn, const TAKey *takey) { const ASN1_UTF8STRING *comment; const ASN1_IA5STRING *certURI; X509_PUBKEY *pubkey; struct takey *res = NULL; unsigned char *der = NULL; size_t i; int der_len; if ((res = calloc(1, sizeof(struct takey))) == NULL) err(1, NULL); res->num_comments = sk_ASN1_UTF8STRING_num(takey->comments); if (res->num_comments > 0) { res->comments = calloc(res->num_comments, sizeof(char *)); if (res->comments == NULL) err(1, NULL); for (i = 0; i < res->num_comments; i++) { comment = sk_ASN1_UTF8STRING_value(takey->comments, i); res->comments[i] = strndup(comment->data, comment->length); if (res->comments[i] == NULL) err(1, NULL); } } res->num_uris = sk_ASN1_IA5STRING_num(takey->certificateURIs); if (res->num_uris == 0) { warnx("%s: Signed TAL requires at least 1 CertificateURI", fn); goto err; } if ((res->uris = calloc(res->num_uris, sizeof(char *))) == NULL) err(1, NULL); for (i = 0; i < res->num_uris; i++) { certURI = sk_ASN1_IA5STRING_value(takey->certificateURIs, i); if (!valid_uri(certURI->data, certURI->length, NULL)) { warnx("%s: invalid TA URI", fn); goto err; } /* XXX: enforce that protocol is rsync or https. */ res->uris[i] = strndup(certURI->data, certURI->length); if (res->uris[i] == NULL) err(1, NULL); } pubkey = takey->subjectPublicKeyInfo; if ((res->ski = x509_pubkey_get_ski(pubkey, fn)) == NULL) goto err; if ((der_len = i2d_X509_PUBKEY(pubkey, &der)) <= 0) { warnx("%s: i2d_X509_PUBKEY failed", fn); goto err; } res->pubkey = der; res->pubkeysz = der_len; return res; err: takey_free(res); return NULL; } /* * Parses the eContent segment of an TAK file * Returns zero on failure, non-zero on success. */ static int tak_parse_econtent(const char *fn, struct tak *tak, const unsigned char *d, size_t dsz) { const unsigned char *oder; TAK *tak_asn1; int rc = 0; oder = d; if ((tak_asn1 = d2i_TAK(NULL, &d, dsz)) == NULL) { warnx("%s: failed to parse Trust Anchor Key", fn); goto out; } if (d != oder + dsz) { warnx("%s: %td bytes trailing garbage in eContent", fn, oder + dsz - d); goto out; } if (!valid_econtent_version(fn, tak_asn1->version, 0)) goto out; tak->current = parse_takey(fn, tak_asn1->current); if (tak->current == NULL) goto out; if (tak_asn1->predecessor != NULL) { tak->predecessor = parse_takey(fn, tak_asn1->predecessor); if (tak->predecessor == NULL) goto out; } if (tak_asn1->successor != NULL) { tak->successor = parse_takey(fn, tak_asn1->successor); if (tak->successor == NULL) goto out; } rc = 1; out: TAK_free(tak_asn1); return rc; } /* * Parse a full draft-ietf-sidrops-signed-tal file. * Returns the TAK or NULL if the object was malformed. */ struct tak * tak_parse(X509 **x509, const char *fn, int talid, const unsigned char *der, size_t len) { struct tak *tak; struct cert *cert = NULL; unsigned char *cms; size_t cmsz; time_t signtime = 0; int rc = 0; cms = cms_parse_validate(x509, fn, der, len, tak_oid, &cmsz, &signtime); if (cms == NULL) return NULL; if ((tak = calloc(1, sizeof(struct tak))) == NULL) err(1, NULL); tak->signtime = signtime; if (!x509_get_aia(*x509, fn, &tak->aia)) goto out; if (!x509_get_aki(*x509, fn, &tak->aki)) goto out; if (!x509_get_sia(*x509, fn, &tak->sia)) goto out; if (!x509_get_ski(*x509, fn, &tak->ski)) goto out; if (tak->aia == NULL || tak->aki == NULL || tak->sia == NULL || tak->ski == NULL) { warnx("%s: RFC 6487 section 4.8: " "missing AIA, AKI, SIA, or SKI X509 extension", fn); goto out; } if (!x509_get_notbefore(*x509, fn, &tak->notbefore)) goto out; if (!x509_get_notafter(*x509, fn, &tak->notafter)) goto out; if (!x509_inherits(*x509)) { warnx("%s: RFC 3779 extension not set to inherit", fn); goto out; } if (!tak_parse_econtent(fn, tak, cms, cmsz)) goto out; if ((cert = cert_parse_ee_cert(fn, talid, *x509)) == NULL) goto out; if (strcmp(tak->aki, tak->current->ski) != 0) { warnx("%s: current TAKey's SKI does not match EE AKI", fn); goto out; } rc = 1; out: if (rc == 0) { tak_free(tak); tak = NULL; X509_free(*x509); *x509 = NULL; } cert_free(cert); free(cms); return tak; } /* * Free TAKey pointer. */ void takey_free(struct takey *t) { size_t i; if (t == NULL) return; for (i = 0; i < t->num_comments; i++) free(t->comments[i]); for (i = 0; i < t->num_uris; i++) free(t->uris[i]); free(t->comments); free(t->uris); free(t->ski); free(t->pubkey); free(t); } /* * Free an TAK pointer. * Safe to call with NULL. */ void tak_free(struct tak *t) { if (t == NULL) return; takey_free(t->current); takey_free(t->predecessor); takey_free(t->successor); free(t->aia); free(t->aki); free(t->sia); free(t->ski); free(t); }