tunnelkit/Sources/TunnelKitOpenVPNProtocol/ControlChannelSerializer.swift

305 lines
11 KiB
Swift
Raw Normal View History

//
// ControlChannelSerializer.swift
// TunnelKit
//
// Created by Davide De Rosa on 9/10/18.
2023-03-17 15:58:36 +00:00
// Copyright (c) 2023 Davide De Rosa. All rights reserved.
//
// https://github.com/passepartoutvpn
//
// This file is part of TunnelKit.
//
// TunnelKit is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// TunnelKit is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>.
//
import Foundation
import SwiftyBeaver
2021-10-25 14:27:27 +00:00
import TunnelKitCore
import TunnelKitOpenVPNCore
import CTunnelKitCore
import CTunnelKitOpenVPNProtocol
private let log = SwiftyBeaver.self
protocol ControlChannelSerializer {
func reset()
2023-04-20 19:52:45 +00:00
func serialize(packet: ControlPacket) throws -> Data
func deserialize(data: Data, start: Int, end: Int?) throws -> ControlPacket
}
extension OpenVPN.ControlChannel {
class PlainSerializer: ControlChannelSerializer {
func reset() {
}
2023-04-20 19:52:45 +00:00
func serialize(packet: ControlPacket) throws -> Data {
return packet.serialized()
}
2023-04-20 19:52:45 +00:00
func deserialize(data packet: Data, start: Int, end: Int?) throws -> ControlPacket {
var offset = start
let end = end ?? packet.count
2023-04-20 19:52:45 +00:00
guard end >= offset + PacketOpcodeLength else {
throw OpenVPNError.controlChannel(message: "Missing opcode")
}
let codeValue = packet[offset] >> 3
guard let code = PacketCode(rawValue: codeValue) else {
throw OpenVPNError.controlChannel(message: "Unknown code: \(codeValue))")
}
let key = packet[offset] & 0b111
offset += PacketOpcodeLength
log.debug("Control: Try read packet with code \(code) and key \(key)")
2023-04-20 19:52:45 +00:00
guard end >= offset + PacketSessionIdLength else {
throw OpenVPNError.controlChannel(message: "Missing sessionId")
}
let sessionId = packet.subdata(offset: offset, count: PacketSessionIdLength)
offset += PacketSessionIdLength
guard end >= offset + 1 else {
throw OpenVPNError.controlChannel(message: "Missing ackSize")
}
let ackSize = packet[offset]
offset += 1
var ackIds: [UInt32]?
var ackRemoteSessionId: Data?
if ackSize > 0 {
guard end >= (offset + Int(ackSize) * PacketIdLength) else {
throw OpenVPNError.controlChannel(message: "Missing acks")
}
var ids: [UInt32] = []
for _ in 0..<ackSize {
let id = packet.networkUInt32Value(from: offset)
ids.append(id)
offset += PacketIdLength
}
guard end >= offset + PacketSessionIdLength else {
throw OpenVPNError.controlChannel(message: "Missing remoteSessionId")
}
let remoteSessionId = packet.subdata(offset: offset, count: PacketSessionIdLength)
offset += PacketSessionIdLength
ackIds = ids
ackRemoteSessionId = remoteSessionId
}
if code == .ackV1 {
guard let ackIds = ackIds else {
throw OpenVPNError.controlChannel(message: "Ack packet without ids")
}
guard let ackRemoteSessionId = ackRemoteSessionId else {
throw OpenVPNError.controlChannel(message: "Ack packet without remoteSessionId")
}
return ControlPacket(key: key, sessionId: sessionId, ackIds: ackIds as [NSNumber], ackRemoteSessionId: ackRemoteSessionId)
}
guard end >= offset + PacketIdLength else {
throw OpenVPNError.controlChannel(message: "Missing packetId")
}
let packetId = packet.networkUInt32Value(from: offset)
offset += PacketIdLength
var payload: Data?
if offset < end {
payload = packet.subdata(in: offset..<end)
}
let controlPacket = ControlPacket(code: code, key: key, sessionId: sessionId, packetId: packetId, payload: payload)
if let ackIds = ackIds {
controlPacket.ackIds = ackIds as [NSNumber]
controlPacket.ackRemoteSessionId = ackRemoteSessionId
}
return controlPacket
}
}
}
2018-09-19 20:15:16 +00:00
extension OpenVPN.ControlChannel {
2018-09-19 20:15:16 +00:00
class AuthSerializer: ControlChannelSerializer {
private let encrypter: Encrypter
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let decrypter: Decrypter
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let prefixLength: Int
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let hmacLength: Int
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let authLength: Int
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let preambleLength: Int
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private var currentReplayId: BidirectionalState<UInt32>
2023-04-20 19:52:45 +00:00
private let timestamp: UInt32
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
private let plain: PlainSerializer
2023-04-20 19:52:45 +00:00
init(withKey key: OpenVPN.StaticKey, digest: OpenVPN.Digest) throws {
2018-09-19 20:15:16 +00:00
let crypto = CryptoBox(cipherAlgorithm: nil, digestAlgorithm: digest.rawValue)
try crypto.configure(
withCipherEncKey: nil,
cipherDecKey: nil,
hmacEncKey: key.hmacSendKey,
hmacDecKey: key.hmacReceiveKey
)
encrypter = crypto.encrypter()
decrypter = crypto.decrypter()
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
prefixLength = PacketOpcodeLength + PacketSessionIdLength
hmacLength = crypto.digestLength()
authLength = hmacLength + PacketReplayIdLength + PacketReplayTimestampLength
preambleLength = prefixLength + authLength
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
currentReplayId = BidirectionalState(withResetValue: 1)
timestamp = UInt32(Date().timeIntervalSince1970)
2018-09-19 20:15:16 +00:00
plain = PlainSerializer()
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
func reset() {
currentReplayId.reset()
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
func serialize(packet: ControlPacket) throws -> Data {
return try serialize(packet: packet, timestamp: timestamp)
2018-09-19 20:15:16 +00:00
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
func serialize(packet: ControlPacket, timestamp: UInt32) throws -> Data {
let data = try packet.serialized(withAuthenticator: encrypter, replayId: currentReplayId.outbound, timestamp: timestamp)
currentReplayId.outbound += 1
return data
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
// XXX: start/end are ignored, parses whole packet
func deserialize(data packet: Data, start: Int, end: Int?) throws -> ControlPacket {
let end = packet.count
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
// data starts with (prefix=(header + sessionId) + auth=(hmac + replayId))
guard end >= preambleLength else {
throw OpenVPNError.controlChannel(message: "Missing HMAC")
2018-09-19 20:15:16 +00:00
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
// needs a copy for swapping
var authPacket = packet
let authCount = authPacket.count
2019-03-30 19:30:29 +00:00
try authPacket.withUnsafeMutableBytes {
let ptr = $0.bytePointer
2018-09-19 20:15:16 +00:00
PacketSwapCopy(ptr, packet, prefixLength, authLength)
try decrypter.verifyBytes(ptr, length: authCount, flags: nil)
}
2023-04-20 19:52:45 +00:00
2018-09-19 20:15:16 +00:00
// TODO: validate replay packet id
2023-04-20 19:52:45 +00:00
do {
return try plain.deserialize(data: authPacket, start: authLength, end: nil)
} catch {
log.error("Control: Channel failure \(error)")
throw error
}
2018-09-19 20:15:16 +00:00
}
}
}
2018-10-19 14:52:37 +00:00
extension OpenVPN.ControlChannel {
2018-10-19 14:52:37 +00:00
class CryptSerializer: ControlChannelSerializer {
private let encrypter: Encrypter
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private let decrypter: Decrypter
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private let headerLength: Int
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private var adLength: Int
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private let tagLength: Int
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private var currentReplayId: BidirectionalState<UInt32>
2023-04-20 19:52:45 +00:00
private let timestamp: UInt32
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
private let plain: PlainSerializer
init(withKey key: OpenVPN.StaticKey) throws {
2018-10-19 14:52:37 +00:00
let crypto = CryptoBox(cipherAlgorithm: "AES-256-CTR", digestAlgorithm: "SHA256")
try crypto.configure(
withCipherEncKey: key.cipherEncryptKey,
cipherDecKey: key.cipherDecryptKey,
hmacEncKey: key.hmacSendKey,
hmacDecKey: key.hmacReceiveKey
)
encrypter = crypto.encrypter()
decrypter = crypto.decrypter()
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
headerLength = PacketOpcodeLength + PacketSessionIdLength
adLength = headerLength + PacketReplayIdLength + PacketReplayTimestampLength
tagLength = crypto.tagLength()
2018-10-19 14:52:37 +00:00
currentReplayId = BidirectionalState(withResetValue: 1)
timestamp = UInt32(Date().timeIntervalSince1970)
2018-10-19 14:52:37 +00:00
plain = PlainSerializer()
}
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
func reset() {
currentReplayId.reset()
}
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
func serialize(packet: ControlPacket) throws -> Data {
return try serialize(packet: packet, timestamp: timestamp)
2018-10-19 14:52:37 +00:00
}
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
func serialize(packet: ControlPacket, timestamp: UInt32) throws -> Data {
let data = try packet.serialized(with: encrypter, replayId: currentReplayId.outbound, timestamp: timestamp, adLength: adLength)
currentReplayId.outbound += 1
return data
}
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
// XXX: start/end are ignored, parses whole packet
func deserialize(data packet: Data, start: Int, end: Int?) throws -> ControlPacket {
let end = end ?? packet.count
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
// data starts with (ad=(header + sessionId + replayId) + tag)
guard end >= start + adLength + tagLength else {
throw OpenVPNError.controlChannel(message: "Missing AD+TAG")
2018-10-19 14:52:37 +00:00
}
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
let encryptedCount = packet.count - adLength
var decryptedPacket = Data(count: decrypter.encryptionCapacity(withLength: encryptedCount))
var decryptedCount = 0
2019-03-30 19:30:29 +00:00
try packet.withUnsafeBytes {
let src = $0.bytePointer
2018-10-19 14:52:37 +00:00
var flags = CryptoFlags(iv: nil, ivLength: 0, ad: src, adLength: adLength)
2019-03-30 19:30:29 +00:00
try decryptedPacket.withUnsafeMutableBytes {
let dest = $0.bytePointer
2018-10-19 14:52:37 +00:00
try decrypter.decryptBytes(src + flags.adLength, length: encryptedCount, dest: dest + headerLength, destLength: &decryptedCount, flags: &flags)
memcpy(dest, src, headerLength)
}
}
decryptedPacket.count = headerLength + decryptedCount
2023-04-20 19:52:45 +00:00
2018-10-19 14:52:37 +00:00
// TODO: validate replay packet id
2023-04-20 19:52:45 +00:00
do {
return try plain.deserialize(data: decryptedPacket, start: 0, end: nil)
} catch {
log.error("Control: Channel failure \(error)")
throw error
}
2018-10-19 14:52:37 +00:00
}
}
}