Page MenuHomeFreeBSD

ktls: Fix non-inplace TLS 1.3 encryption.
ClosedPublic

Authored by jhb on Mar 10 2021, 12:33 AM.
Tags
None
Referenced Files
F103428754: D29177.diff
Sun, Nov 24, 10:01 PM
F103371135: D29177.diff
Sun, Nov 24, 4:16 AM
Unknown Object (File)
Thu, Nov 21, 4:55 PM
Unknown Object (File)
Tue, Nov 19, 9:22 PM
Unknown Object (File)
Tue, Nov 19, 3:57 AM
Unknown Object (File)
Tue, Nov 12, 3:54 PM
Unknown Object (File)
Tue, Nov 12, 3:51 PM
Unknown Object (File)
Tue, Nov 12, 3:15 PM
Subscribers

Details

Summary

Copy the iovec for the trailer from the proper place. This is the same
fix for CBC encryption from ff6a7e4ba6bf.

Reported by: gallatin
Fixes: 49f6925ca

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

jhb requested review of this revision.Mar 10 2021, 12:33 AM

Sample commands to test TLS 1.3 on a client against an nginx server:

# AES-GCM with TLS 1.2
openssl s_time -connect <host>:443 -www "/bigfile" -tls1_2
# CHACHA20 with TLS 1.2
openssl s_time -connect <host>:443 -www "/bigfile" -tls1_2 -cipher CHACHA20

# AES-GCM with TLS 1.3
openssl s_time -connect <host>:443 -www "/bigfile" -tls1_3
# CHACHA20 with TLS 1.3
openssl s_time -connect <host>:443 -www "/bigfile" -tls1_3 -ciphersuites TLS_CHACHA20_POLY1305_SHA256

For AES-CBC you need a noetm.conf file:

openssl_conf = openssl_init

[openssl_init]

ssl_conf = ssl_sect

[ssl_sect]

system_default = system_default_sect

[system_default_sect]

Options = -EncryptThenMac

and then you can test that this way:

env OPENSSL_CONF=noetm.cnf openssl s_time -connect <host>:443 -www "/bigfile" -tls1_2 -cipher AES256-SHA

Other ciphers you can use for AES-CBC are AES-SHA, AES-SHA256, and AES256-SHA256.

In my case "bigfile" is a 1GB file of junk in /usr/local/www/nginx.

This revision is now accepted and ready to land.Mar 10 2021, 12:38 AM
This revision was automatically updated to reflect the committed changes.