Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid downgrading keys in libssl #11898

Closed

Conversation

mattcaswell
Copy link
Member

We were downgrading to legacy keys at various points in libssl in order to get or set an encoded point. This PR adds provider support for getting or setting the encoded point, and therefore the deliberate downgrading can be removed. This also fixes a few additional bugs that came to light with using provider only keys.

Finally I have to add a downgrade in EVP_PKEY_id() because provider only keys don't otherwise set the pkey->type field. One of the tests was checking this and hence failing. Applications that do the same might also fail so we should automatically downgrade where possible. To balance that I've removed all usage of EVP_PKEY_id() from libssl so that we don't inadvertently downgrade keys.

There are a few spots left in libssl where keys will be downgraded indirectly - but this PR gets most instances.

@mattcaswell mattcaswell added branch: master Merge to master branch approval: review pending This pull request needs review by a committer labels May 21, 2020
@levitte
Copy link
Member

levitte commented May 22, 2020

Regarding EVP_PKEY_id(), I have a branch that refactors how EVP_PKEYs are treated with regards to EVP identities

@mattcaswell
Copy link
Member Author

Regarding EVP_PKEY_id(), I have a branch that refactors how EVP_PKEYs are treated with regards to EVP identities

So should I be backing out the EVP_PKEY_id() changes in this PR then?

@levitte
Copy link
Member

levitte commented May 22, 2020

So should I be backing out the EVP_PKEY_id() changes in this PR then?

Dunno. Are you in a rush to get this in, or can you wait 'til I'm done with mine? (mine is a fix of #11823, which complains about exactly that issue, that EVP_PKEY_id() and friends return surprising results)

@mattcaswell
Copy link
Member Author

Dunno. Are you in a rush to get this in, or can you wait 'til I'm done with mine?

This PR is a dependency on an upcoming PR of mine that I'm currently working on - so I'd like to get it in. I don't actually need the EVP_PKEY_id() changes in this PR, except to say that I had one test failure without them because the test itself was getting surprising results from EVP_PKEY_id(). I could just fix the test without attempting to fix EVP_PKEY_id() itself and that would be good enough for now.

@levitte
Copy link
Member

levitte commented May 22, 2020

I could just fix the test without attempting to fix EVP_PKEY_id() itself and that would be good enough for now.

That works for me... and I can make sure to modify that test accordingly in my branch.

@levitte
Copy link
Member

levitte commented May 22, 2020

@mattcaswell, the work I was talking about here is now available, see #11913

@mattcaswell mattcaswell force-pushed the avoid-libssl-downgrade branch from ccefd0a to f4dcb49 Compare May 22, 2020 14:51
@mattcaswell mattcaswell changed the title Avoid downgrading keys in libssl [WIP: pending 11913] Avoid downgrading keys in libssl May 22, 2020
@mattcaswell
Copy link
Member Author

All comments addressed. I've moved this to WIP because the tests will now fail until #11913 is merged.

@levitte
Copy link
Member

levitte commented May 22, 2020

All comments addressed. I've moved this to WIP because the tests will now fail until #11913 is merged.

That was a surprising turn of events. Does that mean I was fast enough? 😉

@mattcaswell
Copy link
Member Author

That was a surprising turn of events. Does that mean I was fast enough?

It meant there were complications, so I decided just to wait for your PR.

@levitte
Copy link
Member

levitte commented May 22, 2020

It meant there were complications

Okie

EVP_PKEY_[get1|set1]_tls_encodedpoint() only worked if an ameth was present
which isn't the case for provided keys. Support has been added to dh,
ec and ecx keys.
Even if there is no data to import we should still create an empty key.
An ECX key doesn't have any parameters associated with it. Therefore it
always has all the parameters it needs, and the "has" function should
return 1 if asked about parameters. Without this
EVP_PKEY_missing_parameters() fails for ECX keys.
We were downgrading to legacy keys at various points in libssl in
order to get or set an encoded point. Now that the encoded point
functions work with provided keys this is no longer necessary.
@mattcaswell mattcaswell force-pushed the avoid-libssl-downgrade branch from 14e79a2 to 83ecb62 Compare June 2, 2020 08:23
@mattcaswell mattcaswell changed the title [WIP: pending 11913] Avoid downgrading keys in libssl Avoid downgrading keys in libssl Jun 2, 2020
@mattcaswell
Copy link
Member Author

#11913 has now been merged, so this has been rebased and taken out of WIP.

Please take a look.

@slontis
Copy link
Member

slontis commented Jun 3, 2020

Travis got an error:
Parse errors: Tests out of sequence. Found (1) but expected (2)
Is this just an glitch?

@@ -39,6 +39,11 @@ The public key value in EC point format.

The private key value.

=item "tls-encoded-pt" (B<OSSL_PKEY_PARAM_TLS_ENCODED_PT>) <octet string>

Used for getting and setting the encoding of the EC public key as in key
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here..
Also extra space before key

@mattcaswell
Copy link
Member Author

Is this just an glitch?

I'm fairly sure this is just a glitch.

@mattcaswell
Copy link
Member Author

Feedback addressed. Please take another look.

@@ -41,7 +41,7 @@ The private key value.

=item "tls-encoded-pt" (B<OSSL_PKEY_PARAM_TLS_ENCODED_PT>) <octet string>

Used for getting and setting the encoding of the EC public key as in key
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

NIT extra space before key.

Copy link
Member

@slontis slontis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That weird travis error also happened on this run.
Only a small space NIT which I wont block on.

@slontis slontis added approval: done This pull request has the required number of approvals and removed approval: review pending This pull request needs review by a committer labels Jun 4, 2020
@openssl-machine
Copy link
Collaborator

24 hours has passed since 'approval: done' was set, but this PR has failing CI tests. Once the tests pass it will get moved to 'approval: ready to merge' automatically, alternatively please review and set the label manually.

@mattcaswell
Copy link
Member Author

That weird travis error also happened on this run.

Its not related to this PR. It happens when the test dumps PEM files to stdout and they happen to have a line that starts with the text "ok". It confuses the test harness. I raised an issue for it:

#12054

@mattcaswell mattcaswell added approval: ready to merge The 24 hour grace period has passed, ready to merge and removed approval: done This pull request has the required number of approvals labels Jun 5, 2020
openssl-machine pushed a commit that referenced this pull request Jun 5, 2020
EVP_PKEY_[get1|set1]_tls_encodedpoint() only worked if an ameth was present
which isn't the case for provided keys. Support has been added to dh,
ec and ecx keys.

Reviewed-by: Shane Lontis <[email protected]>
(Merged from #11898)
openssl-machine pushed a commit that referenced this pull request Jun 5, 2020
Even if there is no data to import we should still create an empty key.

Reviewed-by: Shane Lontis <[email protected]>
(Merged from #11898)
openssl-machine pushed a commit that referenced this pull request Jun 5, 2020
An ECX key doesn't have any parameters associated with it. Therefore it
always has all the parameters it needs, and the "has" function should
return 1 if asked about parameters. Without this
EVP_PKEY_missing_parameters() fails for ECX keys.

Reviewed-by: Shane Lontis <[email protected]>
(Merged from #11898)
openssl-machine pushed a commit that referenced this pull request Jun 5, 2020
We were downgrading to legacy keys at various points in libssl in
order to get or set an encoded point. Now that the encoded point
functions work with provided keys this is no longer necessary.

Reviewed-by: Shane Lontis <[email protected]>
(Merged from #11898)
@mattcaswell
Copy link
Member Author

Nit fixed. Pushed to master. Thanks!

@mattcaswell mattcaswell closed this Jun 5, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approval: ready to merge The 24 hour grace period has passed, ready to merge branch: master Merge to master branch
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants