source: mod_gnutls/include/mod_gnutls.h.in @ 1c3853a

asyncioproxy-ticket
Last change on this file since 1c3853a was 1c3853a, checked in by Fiona Klute <fiona.klute@…>, 11 months ago

Minimal multi-staple implementation

Works, but has limitations:

  • Async OCSP updates are only done for the server (end entity) certificate.
  • The configuration requires there to be an OCSP URI in every certificate but the last one in the configured chain. If configuration for any certificate fails vhost configuration fails.
  • Property mode set to 100644
File size: 14.2 KB
Line 
1/*
2 *  Copyright 2004-2005 Paul Querna
3 *  Copyright 2014 Nikos Mavrogiannopoulos
4 *  Copyright 2015-2018 Fiona Klute
5 *
6 *  Licensed under the Apache License, Version 2.0 (the "License");
7 *  you may not use this file except in compliance with the License.
8 *  You may obtain a copy of the License at
9 *
10 *      http://www.apache.org/licenses/LICENSE-2.0
11 *
12 *  Unless required by applicable law or agreed to in writing, software
13 *  distributed under the License is distributed on an "AS IS" BASIS,
14 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 *  See the License for the specific language governing permissions and
16 *  limitations under the License.
17 */
18
19/* Apache Runtime Headers */
20#include "httpd.h"
21#include "http_config.h"
22#include "http_protocol.h"
23#include "http_connection.h"
24#include "http_request.h"
25#include "http_core.h"
26#include "http_log.h"
27#include "apr_buckets.h"
28#include "apr_tables.h"
29#include "ap_release.h"
30/* GnuTLS Library Headers */
31#include <gnutls/gnutls.h>
32#include <gnutls/abstract.h>
33#include <gnutls/x509.h>
34
35#ifndef __mod_gnutls_h_inc
36#define __mod_gnutls_h_inc
37
38extern module AP_MODULE_DECLARE_DATA gnutls_module;
39
40/* IO Filter names */
41#define GNUTLS_OUTPUT_FILTER_NAME "gnutls_output_filter"
42#define GNUTLS_INPUT_FILTER_NAME "gnutls_input_filter"
43/* GnuTLS Constants */
44#define GNUTLS_ENABLED_FALSE 0
45#define GNUTLS_ENABLED_TRUE  1
46#define GNUTLS_ENABLED_UNSET  2
47/* Current module version */
48#define MOD_GNUTLS_VERSION "@MOD_GNUTLS_VERSION@"
49
50/* Module Debug Mode */
51#define MOD_GNUTLS_DEBUG @OOO_MAINTAIN@
52
53/* Compile support for early SNI? */
54#if @ENABLE_EARLY_SNI@ == 1
55#define ENABLE_EARLY_SNI
56#endif
57
58/** Name of the module-wide singleton watchdog */
59#define MGS_SINGLETON_WATCHDOG "_mod_gnutls_singleton_"
60
61
62/* Internal cache data, defined in gnutls_cache.h */
63typedef struct mgs_cache* mgs_cache_t;
64
65typedef enum {
66    mgs_cvm_unset,
67    mgs_cvm_cartel,
68    mgs_cvm_msva
69} mgs_client_verification_method_e;
70
71
72/* Directory Configuration Record */
73typedef struct {
74    int client_verify_mode;
75} mgs_dirconf_rec;
76
77
78/* Internal per-vhost config for OCSP, defined in gnutls_ocsp.h */
79typedef struct mgs_ocsp_data* mgs_ocsp_data_t;
80
81
82/* The maximum number of certificates to send in a chain */
83#define MAX_CHAIN_SIZE 8
84
85/** Server Configuration Record */
86typedef struct {
87    /** Server this mod_gnutls configuration is for */
88    server_rec* s;
89
90    /* --- Configuration values --- */
91        /* Is the module enabled? */
92    int enabled;
93        /* Is mod_proxy enabled? */
94    int proxy_enabled;
95
96    /* List of PKCS #11 provider modules to load, only valid in the
97     * base config, ignored in virtual hosts */
98    apr_array_header_t *p11_modules;
99
100    /* PIN used for PKCS #11 operations */
101    char *pin;
102
103    /* the SRK PIN used in TPM operations */
104    char *srk_pin;
105
106    char *x509_cert_file;
107    char *x509_key_file;
108    char *x509_ca_file;
109
110    char *dh_file;
111
112    char *priorities_str;
113    char *proxy_priorities_str;
114
115    const char* srp_tpasswd_file;
116    const char* srp_tpasswd_conf_file;
117
118        /* Cache timeout value */
119    int cache_timeout;
120    /* Enable cache */
121    unsigned char cache_enable : 2;
122    /* Internal cache data */
123    mgs_cache_t cache;
124
125        /* GnuTLS uses Session Tickets */
126    int tickets;
127
128    /* x509 Certificate Structure */
129    gnutls_certificate_credentials_t certs;
130    /* x509 credentials for proxy connections */
131    gnutls_certificate_credentials_t proxy_x509_creds;
132    /* trust list for proxy_x509_creds */
133    gnutls_x509_trust_list_t proxy_x509_tl;
134    const char* proxy_x509_key_file;
135    const char* proxy_x509_cert_file;
136    const char* proxy_x509_ca_file;
137    const char* proxy_x509_crl_file;
138    /* GnuTLS priorities for proxy connections */
139    gnutls_priority_t proxy_priorities;
140    /* SRP Certificate Structure*/
141    gnutls_srp_server_credentials_t srp_creds;
142    /* Anonymous Certificate Structure */
143    gnutls_anon_server_credentials_t anon_creds;
144    /* Anonymous Client Certificate Structure, used for proxy
145     * connections */
146    gnutls_anon_client_credentials_t anon_client_creds;
147        /* An x509 Certificate Chain */
148    gnutls_pcert_st *certs_x509_chain;
149    gnutls_x509_crt_t *certs_x509_crt_chain;
150        /* Number of Certificates in Chain */
151    unsigned int certs_x509_chain_num;
152
153        /* Current x509 Certificate Private Key */
154    gnutls_privkey_t privkey_x509;
155
156    /* Export full certificates to CGI environment: */
157    int export_certificates_size;
158        /* GnuTLS Priorities */
159    gnutls_priority_t priorities;
160        /* GnuTLS DH Parameters */
161    gnutls_dh_params_t dh_params;
162        /* A list of CA Certificates */
163    gnutls_x509_crt_t *ca_list;
164        /* CA Certificate list size */
165    unsigned int ca_list_size;
166        /* Client Certificate Verification Mode */
167    int client_verify_mode;
168        /* Client Certificate Verification Method */
169    mgs_client_verification_method_e client_verify_method;
170
171    /* Enable OCSP stapling */
172    unsigned char ocsp_staple;
173    /* Automatically refresh cached OCSP response? */
174    unsigned char ocsp_auto_refresh;
175    /* Check nonce in OCSP responses? */
176    unsigned char ocsp_check_nonce;
177    /* Read OCSP response for stapling from this file instead of
178     * sending a request over HTTP */
179    char *ocsp_response_file;
180    /* Internal OCSP data for this server */
181    mgs_ocsp_data_t *ocsp;
182    /* Number of successfully configured OCSP data sets */
183    unsigned int ocsp_num;
184    /* Mutex to prevent parallel OCSP requests */
185    apr_global_mutex_t *ocsp_mutex;
186    /* Internal OCSP cache data */
187    mgs_cache_t ocsp_cache;
188    /* Cache timeout for OCSP responses. Note that the nextUpdate
189     * field of the response takes precedence if shorter. */
190    apr_interval_time_t ocsp_cache_time;
191    /* If an OCSP request fails wait this long before trying again. */
192    apr_interval_time_t ocsp_failure_timeout;
193    /** How long before a cached OCSP response expires should it be
194     * updated? During configuration parsing this is set to the
195     * maximum, during post configuration the value will be set to
196     * half that. After each update the interval to for the next one
197     * is choosen randomly as `ocsp_fuzz_time + ocsp_fuzz_time *
198     * RANDOM` with `0 <= RANDOM <= 1`. */
199    apr_interval_time_t ocsp_fuzz_time;
200    /* Socket timeout for OCSP requests */
201    apr_interval_time_t ocsp_socket_timeout;
202
203    /** This module's singleton watchdog, used for async OCSP cache
204     * updates. */
205    struct mgs_watchdog *singleton_wd;
206} mgs_srvconf_rec;
207
208/* Character Buffer */
209typedef struct {
210    int length;
211    char *value;
212} mgs_char_buffer_t;
213
214/** GnuTLS connection handle */
215typedef struct {
216        /* Server configuration record */
217    mgs_srvconf_rec *sc;
218        /* Connection record */
219    conn_rec* c;
220        /* Is TLS enabled for this connection? */
221    int enabled;
222    /* Is this a proxy connection? */
223    int is_proxy;
224        /* GnuTLS Session handle */
225    gnutls_session_t session;
226    /** Server name requested via SNI if any, or NULL. */
227    const char *sni_name;
228        /* module input status */
229    apr_status_t input_rc;
230        /* Input filter */
231    ap_filter_t *input_filter;
232        /* Input Bucket Brigade */
233    apr_bucket_brigade *input_bb;
234        /* Input Read Type */
235    apr_read_type_e input_block;
236        /* Input Mode */
237    ap_input_mode_t input_mode;
238        /* Input Character Buffer */
239    mgs_char_buffer_t input_cbuf;
240        /* Input Character Array */
241    char input_buffer[AP_IOBUFSIZE];
242        /* module Output status */
243    apr_status_t output_rc;
244        /* Output filter */
245    ap_filter_t *output_filter;
246        /* Output Bucket Brigade */
247    apr_bucket_brigade *output_bb;
248        /* Output character array */
249    char output_buffer[AP_IOBUFSIZE];
250        /* Output buffer length */
251    apr_size_t output_blen;
252        /* Output length */
253    apr_size_t output_length;
254    /** Connection status: 0 before (re-)handshake, 1 when up, -1 on
255     * error (checks use status < 0 or status > 0) */
256    int status;
257} mgs_handle_t;
258
259
260
261/** Functions in gnutls_io.c **/
262
263/* apr_signal_block() for blocking SIGPIPE */
264apr_status_t apr_signal_block(int signum);
265
266/* Proxy Support */
267/* An optional function which returns non-zero if the given connection
268is using SSL/TLS. */
269APR_DECLARE_OPTIONAL_FN(int, ssl_is_https, (conn_rec *));
270/* The ssl_var_lookup() optional function retrieves SSL environment
271 * variables. */
272APR_DECLARE_OPTIONAL_FN(char *, ssl_var_lookup,
273                        (apr_pool_t *, server_rec *,
274                         conn_rec *, request_rec *,
275                         char *));
276/* The ssl_proxy_enable() and ssl_engine_disable() optional functions
277 * are used by mod_proxy to enable use of SSL for outgoing
278 * connections. */
279APR_DECLARE_OPTIONAL_FN(int, ssl_proxy_enable, (conn_rec *));
280APR_DECLARE_OPTIONAL_FN(int, ssl_engine_disable, (conn_rec *));
281APR_DECLARE_OPTIONAL_FN(int, ssl_engine_set, (conn_rec *,
282                                              ap_conf_vector_t *,
283                                              int proxy, int enable));
284mgs_handle_t* get_effective_gnutls_ctxt(conn_rec *c);
285int ssl_is_https(conn_rec *c);
286char* ssl_var_lookup(apr_pool_t *p, server_rec *s, conn_rec *c,
287                     request_rec *r, char *var);
288int ssl_proxy_enable(conn_rec *c);
289int ssl_engine_disable(conn_rec *c);
290const char *mgs_set_proxy_engine(cmd_parms * parms, void *dummy,
291                                 const int arg);
292apr_status_t mgs_cleanup_pre_config(void *data);
293
294/**
295 * mgs_filter_input will filter the input data
296 * by decrypting it using GnuTLS and passes it cleartext.
297 *
298 * @param f     the filter info record
299 * @param bb    the bucket brigade, where to store the result to
300 * @param mode  what shall we read?
301 * @param block a block index we shall read from?
302 * @return result status
303 */
304apr_status_t mgs_filter_input(ap_filter_t * f,
305                                     apr_bucket_brigade * bb,
306                                     ap_input_mode_t mode,
307                                     apr_read_type_e block,
308                                     apr_off_t readbytes);
309
310/**
311 * mgs_filter_output will filter the encrypt
312 * the incoming bucket using GnuTLS and passes it onto the next filter.
313 *
314 * @param f     the filter info record
315 * @param bb    the bucket brigade, where to store the result to
316 * @return result status
317 */
318apr_status_t mgs_filter_output(ap_filter_t * f,
319                                      apr_bucket_brigade * bb);
320
321
322/**
323 * mgs_transport_read is called from GnuTLS to provide encrypted
324 * data from the client.
325 *
326 * @param ptr     pointer to the filter context
327 * @param buffer  place to put data
328 * @param len     maximum size
329 * @return size   length of the data stored in buffer
330 */
331ssize_t mgs_transport_read(gnutls_transport_ptr_t ptr,
332                                  void *buffer, size_t len);
333
334/**
335 * mgs_transport_write is called from GnuTLS to
336 * write data to the client.
337 *
338 * @param ptr     pointer to the filter context
339 * @param buffer  buffer to write to the client
340 * @param len     size of the buffer
341 * @return size   length of the data written
342 */
343ssize_t mgs_transport_write(gnutls_transport_ptr_t ptr,
344                                   const void *buffer, size_t len);
345
346
347int mgs_rehandshake(mgs_handle_t * ctxt);
348
349
350
351/**
352 * Perform any reinitialization required in PKCS #11
353 */
354int mgs_pkcs11_reinit(server_rec * s);
355
356
357
358/* Configuration Functions */
359
360/* Loads all files set in the configuration */
361int mgs_load_files(apr_pool_t *pconf, apr_pool_t *ptemp, server_rec *s)
362    __attribute__((nonnull));
363
364const char *mgs_set_srp_tpasswd_conf_file(cmd_parms * parms, void *dummy,
365                                        const char *arg);
366const char *mgs_set_srp_tpasswd_file(cmd_parms * parms, void *dummy,
367                                        const char *arg);
368const char *mgs_set_dh_file(cmd_parms * parms, void *dummy,
369                                        const char *arg);
370const char *mgs_set_cert_file(cmd_parms * parms, void *dummy,
371                                        const char *arg);
372
373const char *mgs_set_key_file(cmd_parms * parms, void *dummy,
374                             const char *arg);
375
376const char *mgs_set_timeout(cmd_parms *parms, void *dummy, const char *arg);
377
378const char *mgs_set_client_verify(cmd_parms * parms, void *dummy,
379                                  const char *arg);
380
381const char *mgs_set_client_verify_method(cmd_parms * parms, void *dummy,
382                                         const char *arg);
383
384const char *mgs_set_client_ca_file(cmd_parms * parms, void *dummy,
385                                   const char *arg);
386
387const char *mgs_set_p11_module(cmd_parms * parms, void *dummy,
388                               const char *arg);
389
390const char *mgs_set_pin(cmd_parms * parms, void *dummy,
391                                   const char *arg);
392
393const char *mgs_set_srk_pin(cmd_parms * parms, void *dummy,
394                                   const char *arg);
395
396const char *mgs_set_enabled(cmd_parms * parms, void *dummy,
397                            const int arg);
398const char *mgs_set_export_certificates_size(cmd_parms * parms, void *dummy,
399                            const char *arg);
400const char *mgs_set_priorities(cmd_parms * parms, void *dummy,
401                            const char *arg);
402const char *mgs_set_tickets(cmd_parms * parms, void *dummy,
403                            const int arg);
404
405void *mgs_config_server_create(apr_pool_t * p, server_rec * s);
406void *mgs_config_server_merge(apr_pool_t *p, void *BASE, void *ADD);
407
408void *mgs_config_dir_merge(apr_pool_t *p, void *basev, void *addv);
409
410void *mgs_config_dir_create(apr_pool_t *p, char *dir);
411
412const char *mgs_store_cred_path(cmd_parms * parms,
413                                void *dummy __attribute__((unused)),
414                                const char *arg);
415
416/* mod_gnutls Hooks. */
417
418int mgs_hook_pre_config(apr_pool_t * pconf,
419                        apr_pool_t * plog, apr_pool_t * ptemp);
420
421int mgs_hook_post_config(apr_pool_t *pconf,
422                         apr_pool_t *plog,
423                         apr_pool_t *ptemp,
424                         server_rec *base_server);
425
426void mgs_hook_child_init(apr_pool_t *p, server_rec *s);
427
428const char *mgs_hook_http_scheme(const request_rec * r);
429
430apr_port_t mgs_hook_default_port(const request_rec * r);
431
432int mgs_hook_pre_connection(conn_rec * c, void *csd);
433
434int mgs_hook_process_connection(conn_rec* c);
435
436int mgs_hook_fixups(request_rec *r);
437
438/** Post request hook, checks if TLS connection and vhost match */
439int mgs_req_vhost_check(request_rec *r);
440
441int mgs_hook_authz(request_rec *r);
442
443#endif /*  __mod_gnutls_h_inc */
Note: See TracBrowser for help on using the repository browser.