Enforce max_early_data_size on the server.
BUG=76
Change-Id: I8b754ba17b3e0beee425929e4b53785b2e95f0ae
Reviewed-on: https://boringssl-review.googlesource.com/15164
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/crypto/err/ssl.errordata b/crypto/err/ssl.errordata
index 9ac015c..641d873 100644
--- a/crypto/err/ssl.errordata
+++ b/crypto/err/ssl.errordata
@@ -210,3 +210,4 @@
SSL,278,WRONG_VERSION_ON_EARLY_DATA
SSL,248,X509_LIB
SSL,249,X509_VERIFICATION_SETUP_PROBLEMS
+SSL,1117,TOO_MUCH_READ_EARLY_DATA
diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index b52d80c..1ee7e5c 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -4664,5 +4664,6 @@
#define SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE 1114
#define SSL_R_TLSV1_UNKNOWN_PSK_IDENTITY 1115
#define SSL_R_TLSV1_CERTIFICATE_REQUIRED 1116
+#define SSL_R_TOO_MUCH_READ_EARLY_DATA 1117
#endif /* OPENSSL_HEADER_SSL_H */
diff --git a/ssl/internal.h b/ssl/internal.h
index 4d148c6..1ed7e15 100644
--- a/ssl/internal.h
+++ b/ssl/internal.h
@@ -1121,6 +1121,10 @@
/* client_version is the value sent or received in the ClientHello version. */
uint16_t client_version;
+
+ /* early_data_read is the amount of early data that has been read by the
+ * record layer. */
+ uint16_t early_data_read;
} /* SSL_HANDSHAKE */;
SSL_HANDSHAKE *ssl_handshake_new(SSL *ssl);
@@ -1964,6 +1968,11 @@
#define SSL_KEY_UPDATE_NOT_REQUESTED 0
#define SSL_KEY_UPDATE_REQUESTED 1
+/* kMaxEarlyDataAccepted is the advertised number of plaintext bytes of early
+ * data that will be accepted. This value should be slightly below
+ * kMaxEarlyDataSkipped in tls_record.c, which is measured in ciphertext. */
+static const size_t kMaxEarlyDataAccepted = 14336;
+
CERT *ssl_cert_new(const SSL_X509_METHOD *x509_method);
CERT *ssl_cert_dup(CERT *cert);
void ssl_cert_clear_certs(CERT *c);
diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
index 8e3613a..23b39f2 100644
--- a/ssl/s3_pkt.c
+++ b/ssl/s3_pkt.c
@@ -395,15 +395,17 @@
return -1;
}
+ const int is_early_data_read = ssl->server &&
+ ssl->s3->hs != NULL &&
+ ssl->s3->hs->can_early_read &&
+ ssl3_protocol_version(ssl) >= TLS1_3_VERSION;
+
/* Handle the end_of_early_data alert. */
if (rr->type == SSL3_RT_ALERT &&
rr->length == 2 &&
rr->data[0] == SSL3_AL_WARNING &&
rr->data[1] == TLS1_AD_END_OF_EARLY_DATA &&
- ssl->server &&
- ssl->s3->hs != NULL &&
- ssl->s3->hs->can_early_read &&
- ssl3_protocol_version(ssl) >= TLS1_3_VERSION) {
+ is_early_data_read) {
/* Consume the record. */
rr->length = 0;
ssl_read_buffer_discard(ssl);
@@ -419,6 +421,16 @@
return -1;
}
+ if (is_early_data_read) {
+ if (rr->length > kMaxEarlyDataAccepted - ssl->s3->hs->early_data_read) {
+ OPENSSL_PUT_ERROR(SSL, SSL_R_TOO_MUCH_READ_EARLY_DATA);
+ ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL3_AD_UNEXPECTED_MESSAGE);
+ return -1;
+ }
+
+ ssl->s3->hs->early_data_read += rr->length;
+ }
+
if (rr->length != 0) {
return consume_record(ssl, buf, len, peek);
}
diff --git a/ssl/test/runner/runner.go b/ssl/test/runner/runner.go
index b795d0a..cdef60c 100644
--- a/ssl/test/runner/runner.go
+++ b/ssl/test/runner/runner.go
@@ -3633,6 +3633,28 @@
"-expect-accept-early-data",
},
})
+
+ tests = append(tests, testCase{
+ testType: serverTest,
+ name: "TLS13-MaxEarlyData-Server",
+ config: Config{
+ MaxVersion: VersionTLS13,
+ MinVersion: VersionTLS13,
+ Bugs: ProtocolBugs{
+ SendEarlyData: [][]byte{bytes.Repeat([]byte{1},
+ 14336 + 1)},
+ ExpectEarlyDataAccepted: true,
+ },
+ },
+ messageCount: 2,
+ resumeSession: true,
+ flags: []string{
+ "-enable-early-data",
+ "-expect-accept-early-data",
+ },
+ shouldFail: true,
+ expectedError: ":TOO_MUCH_READ_EARLY_DATA:",
+ })
}
// TLS client auth.
diff --git a/ssl/tls13_server.c b/ssl/tls13_server.c
index af33458..9e8513c 100644
--- a/ssl/tls13_server.c
+++ b/ssl/tls13_server.c
@@ -29,11 +29,6 @@
#include "internal.h"
-/* kMaxEarlyDataAccepted is the advertised number of plaintext bytes of early
- * data that will be accepted. This value should be slightly below
- * kMaxEarlyDataSkipped in tls_record.c, which is measured in ciphertext. */
-static const size_t kMaxEarlyDataAccepted = 14336;
-
enum server_hs_state_t {
state_select_parameters = 0,
state_select_session,
diff --git a/ssl/tls_record.c b/ssl/tls_record.c
index 0f9720c..e67e0b4 100644
--- a/ssl/tls_record.c
+++ b/ssl/tls_record.c
@@ -128,8 +128,8 @@
/* kMaxEarlyDataSkipped is the maximum number of rejected early data bytes that
* will be skipped. Without this limit an attacker could send records at a
* faster rate than we can process and cause trial decryption to loop forever.
- * This value should be slightly above kMaxEarlyDataAccepted in tls13_server.c,
- * which is measured in plaintext. */
+ * This value should be slightly above kMaxEarlyDataAccepted, which is measured
+ * in plaintext. */
static const size_t kMaxEarlyDataSkipped = 16384;
/* kMaxWarningAlerts is the number of consecutive warning alerts that will be