/
keyexchange_tls13.py
286 lines (239 loc) · 11.1 KB
/
keyexchange_tls13.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
# SPDX-License-Identifier: GPL-2.0-only
# This file is part of Scapy
# See https://scapy.net/ for more information
# Copyright (C) 2017 Maxence Tury
# 2019 Romain Perez
"""
TLS 1.3 key exchange logic.
"""
import struct
from scapy.config import conf, crypto_validator
from scapy.error import log_runtime
from scapy.fields import (
FieldLenField,
IntField,
PacketField,
PacketLenField,
PacketListField,
ShortEnumField,
ShortField,
StrFixedLenField,
StrLenField,
XStrLenField,
)
from scapy.packet import Packet
from scapy.layers.tls.extensions import TLS_Ext_Unknown, _tls_ext
from scapy.layers.tls.crypto.groups import (
_tls_named_curves,
_tls_named_ffdh_groups,
_tls_named_groups,
_tls_named_groups_generate,
_tls_named_groups_import,
_tls_named_groups_pubbytes,
)
if conf.crypto_valid:
from cryptography.hazmat.primitives.asymmetric import ec
class KeyShareEntry(Packet):
"""
When building from scratch, we create a DH private key, and when
dissecting, we create a DH public key. Default group is secp256r1.
"""
__slots__ = ["privkey", "pubkey"]
name = "Key Share Entry"
fields_desc = [ShortEnumField("group", None, _tls_named_groups),
FieldLenField("kxlen", None, length_of="key_exchange"),
XStrLenField("key_exchange", "",
length_from=lambda pkt: pkt.kxlen)]
def __init__(self, *args, **kargs):
self.privkey = None
self.pubkey = None
super(KeyShareEntry, self).__init__(*args, **kargs)
def do_build(self):
"""
We need this hack, else 'self' would be replaced by __iter__.next().
"""
tmp = self.explicit
self.explicit = True
b = super(KeyShareEntry, self).do_build()
self.explicit = tmp
return b
@crypto_validator
def create_privkey(self):
"""
This is called by post_build() for key creation.
"""
self.privkey = _tls_named_groups_generate(self.group)
self.key_exchange = _tls_named_groups_pubbytes(self.privkey)
def post_build(self, pkt, pay):
if self.group is None:
self.group = 23 # secp256r1
if not self.key_exchange:
try:
self.create_privkey()
except ImportError:
pass
if self.kxlen is None:
self.kxlen = len(self.key_exchange)
group = struct.pack("!H", self.group)
kxlen = struct.pack("!H", self.kxlen)
return group + kxlen + self.key_exchange + pay
@crypto_validator
def register_pubkey(self):
self.pubkey = _tls_named_groups_import(
self.group,
self.key_exchange
)
def post_dissection(self, r):
try:
self.register_pubkey()
except ImportError:
pass
def extract_padding(self, s):
return "", s
class TLS_Ext_KeyShare_CH(TLS_Ext_Unknown):
name = "TLS Extension - Key Share (for ClientHello)"
fields_desc = [ShortEnumField("type", 0x33, _tls_ext),
ShortField("len", None),
FieldLenField("client_shares_len", None,
length_of="client_shares"),
PacketListField("client_shares", [], KeyShareEntry,
length_from=lambda pkt: pkt.client_shares_len)] # noqa: E501
def post_build(self, pkt, pay):
if not self.tls_session.frozen:
privshares = self.tls_session.tls13_client_privshares
for kse in self.client_shares:
if kse.privkey:
if _tls_named_groups[kse.group] in privshares:
pkt_info = pkt.firstlayer().summary()
log_runtime.info("TLS: group %s used twice in the same ClientHello [%s]", kse.group, pkt_info) # noqa: E501
break
privshares[_tls_named_groups[kse.group]] = kse.privkey
return super(TLS_Ext_KeyShare_CH, self).post_build(pkt, pay)
def post_dissection(self, r):
if not self.tls_session.frozen:
for kse in self.client_shares:
if kse.pubkey:
pubshares = self.tls_session.tls13_client_pubshares
if _tls_named_groups[kse.group] in pubshares:
pkt_info = r.firstlayer().summary()
log_runtime.info("TLS: group %s used twice in the same ClientHello [%s]", kse.group, pkt_info) # noqa: E501
break
pubshares[_tls_named_groups[kse.group]] = kse.pubkey
return super(TLS_Ext_KeyShare_CH, self).post_dissection(r)
class TLS_Ext_KeyShare_HRR(TLS_Ext_Unknown):
name = "TLS Extension - Key Share (for HelloRetryRequest)"
fields_desc = [ShortEnumField("type", 0x33, _tls_ext),
ShortField("len", None),
ShortEnumField("selected_group", None, _tls_named_groups)]
class TLS_Ext_KeyShare_SH(TLS_Ext_Unknown):
name = "TLS Extension - Key Share (for ServerHello)"
fields_desc = [ShortEnumField("type", 0x33, _tls_ext),
ShortField("len", None),
PacketField("server_share", None, KeyShareEntry)]
def post_build(self, pkt, pay):
if not self.tls_session.frozen and self.server_share.privkey:
# if there is a privkey, we assume the crypto library is ok
privshare = self.tls_session.tls13_server_privshare
if len(privshare) > 0:
pkt_info = pkt.firstlayer().summary()
log_runtime.info("TLS: overwriting previous server key share [%s]", pkt_info) # noqa: E501
group_name = _tls_named_groups[self.server_share.group]
privshare[group_name] = self.server_share.privkey
if group_name in self.tls_session.tls13_client_pubshares:
privkey = self.server_share.privkey
pubkey = self.tls_session.tls13_client_pubshares[group_name]
if group_name in _tls_named_ffdh_groups.values():
pms = privkey.exchange(pubkey)
elif group_name in _tls_named_curves.values():
if group_name in ["x25519", "x448"]:
pms = privkey.exchange(pubkey)
else:
pms = privkey.exchange(ec.ECDH(), pubkey)
self.tls_session.tls13_dhe_secret = pms
return super(TLS_Ext_KeyShare_SH, self).post_build(pkt, pay)
def post_dissection(self, r):
if not self.tls_session.frozen and self.server_share.pubkey:
# if there is a pubkey, we assume the crypto library is ok
pubshare = self.tls_session.tls13_server_pubshare
if pubshare:
pkt_info = r.firstlayer().summary()
log_runtime.info("TLS: overwriting previous server key share [%s]", pkt_info) # noqa: E501
group_name = _tls_named_groups[self.server_share.group]
pubshare[group_name] = self.server_share.pubkey
if group_name in self.tls_session.tls13_client_privshares:
pubkey = self.server_share.pubkey
privkey = self.tls_session.tls13_client_privshares[group_name]
if group_name in _tls_named_ffdh_groups.values():
pms = privkey.exchange(pubkey)
elif group_name in _tls_named_curves.values():
if group_name in ["x25519", "x448"]:
pms = privkey.exchange(pubkey)
else:
pms = privkey.exchange(ec.ECDH(), pubkey)
self.tls_session.tls13_dhe_secret = pms
elif group_name in self.tls_session.tls13_server_privshare:
pubkey = self.tls_session.tls13_client_pubshares[group_name]
privkey = self.tls_session.tls13_server_privshare[group_name]
if group_name in _tls_named_ffdh_groups.values():
pms = privkey.exchange(pubkey)
elif group_name in _tls_named_curves.values():
if group_name in ["x25519", "x448"]:
pms = privkey.exchange(pubkey)
else:
pms = privkey.exchange(ec.ECDH(), pubkey)
self.tls_session.tls13_dhe_secret = pms
return super(TLS_Ext_KeyShare_SH, self).post_dissection(r)
_tls_ext_keyshare_cls = {1: TLS_Ext_KeyShare_CH,
2: TLS_Ext_KeyShare_SH}
_tls_ext_keyshare_hrr_cls = {2: TLS_Ext_KeyShare_HRR}
class Ticket(Packet):
name = "Recommended Ticket Construction (from RFC 5077)"
fields_desc = [StrFixedLenField("key_name", None, 16),
StrFixedLenField("iv", None, 16),
FieldLenField("encstatelen", None, length_of="encstate"),
StrLenField("encstate", "",
length_from=lambda pkt: pkt.encstatelen),
StrFixedLenField("mac", None, 32)]
class TicketField(PacketLenField):
def m2i(self, pkt, m):
if len(m) < 64:
# Minimum ticket size is 64 bytes
return conf.raw_layer(m)
return self.cls(m)
class PSKIdentity(Packet):
name = "PSK Identity"
fields_desc = [FieldLenField("identity_len", None,
length_of="identity"),
TicketField("identity", "", Ticket,
length_from=lambda pkt: pkt.identity_len),
IntField("obfuscated_ticket_age", 0)]
def default_payload_class(self, payload):
return conf.padding_layer
class PSKBinderEntry(Packet):
name = "PSK Binder Entry"
fields_desc = [FieldLenField("binder_len", None, fmt="B",
length_of="binder"),
StrLenField("binder", "",
length_from=lambda pkt: pkt.binder_len)]
def default_payload_class(self, payload):
return conf.padding_layer
class TLS_Ext_PreSharedKey_CH(TLS_Ext_Unknown):
# XXX define post_build and post_dissection methods
name = "TLS Extension - Pre Shared Key (for ClientHello)"
fields_desc = [ShortEnumField("type", 0x29, _tls_ext),
ShortField("len", None),
FieldLenField("identities_len", None,
length_of="identities"),
PacketListField("identities", [], PSKIdentity,
length_from=lambda pkt: pkt.identities_len),
FieldLenField("binders_len", None,
length_of="binders"),
PacketListField("binders", [], PSKBinderEntry,
length_from=lambda pkt: pkt.binders_len)]
class TLS_Ext_PreSharedKey_SH(TLS_Ext_Unknown):
name = "TLS Extension - Pre Shared Key (for ServerHello)"
fields_desc = [ShortEnumField("type", 0x29, _tls_ext),
ShortField("len", None),
ShortField("selected_identity", None)]
_tls_ext_presharedkey_cls = {1: TLS_Ext_PreSharedKey_CH,
2: TLS_Ext_PreSharedKey_SH}