Botan 3.12.0
Crypto and TLS for C&
tls_text_policy.cpp
Go to the documentation of this file.
1/*
2* Text-Based TLS Policy
3* (C) 2016,2017 Jack Lloyd
4* 2017 Harry Reimann, Rohde & Schwarz Cybersecurity
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/tls_policy.h>
10
11#include <botan/assert.h>
12#include <botan/exceptn.h>
13#include <botan/internal/parsing.h>
14#include <optional>
15#include <sstream>
16
17namespace Botan::TLS {
18
20 return get_bool("allow_ssl_key_log_file", Policy::allow_ssl_key_log_file());
21}
22
23std::vector<std::string> Text_Policy::allowed_ciphers() const {
24 return get_list("ciphers", Policy::allowed_ciphers());
25}
26
27std::vector<std::string> Text_Policy::allowed_signature_hashes() const {
28 return get_list("signature_hashes", Policy::allowed_signature_hashes());
29}
30
31std::vector<std::string> Text_Policy::allowed_macs() const {
32 return get_list("macs", Policy::allowed_macs());
33}
34
35std::vector<std::string> Text_Policy::allowed_key_exchange_methods() const {
36 return get_list("key_exchange_methods", Policy::allowed_key_exchange_methods());
37}
38
39std::vector<std::string> Text_Policy::allowed_signature_methods() const {
40 return get_list("signature_methods", Policy::allowed_signature_methods());
41}
42
44 return get_bool("use_ecc_point_compression", Policy::use_ecc_point_compression());
45}
46
48 return get_bool("allow_tls12", Policy::allow_tls12());
49}
50
52 return get_bool("allow_tls13", Policy::allow_tls13());
53}
54
56 return get_bool("allow_dtls12", Policy::allow_dtls12());
57}
58
60 return get_bool("allow_insecure_renegotiation", Policy::allow_insecure_renegotiation());
61}
62
64 return get_bool("include_time_in_hello_random", Policy::include_time_in_hello_random());
65}
66
68 return get_bool("require_client_certificate_authentication", Policy::require_client_certificate_authentication());
69}
70
72 return get_bool("allow_client_initiated_renegotiation", Policy::allow_client_initiated_renegotiation());
73}
74
75std::vector<Certificate_Type> Text_Policy::accepted_client_certificate_types() const {
76 const auto cert_types = get_str("accepted_client_certificate_types");
77 return (cert_types.empty()) ? Policy::accepted_client_certificate_types() : read_cert_type_list(cert_types);
78}
79
80std::vector<Certificate_Type> Text_Policy::accepted_server_certificate_types() const {
81 const auto cert_types = get_str("accepted_server_certificate_types");
82 return (cert_types.empty()) ? Policy::accepted_server_certificate_types() : read_cert_type_list(cert_types);
83}
84
86 return get_bool("allow_server_initiated_renegotiation", Policy::allow_server_initiated_renegotiation());
87}
88
90 return get_bool("server_uses_own_ciphersuite_preferences", Policy::server_uses_own_ciphersuite_preferences());
91}
92
94 return get_bool("negotiate_encrypt_then_mac", Policy::negotiate_encrypt_then_mac());
95}
96
98 return get_bool("require_extended_master_secret", Policy::require_extended_master_secret());
99}
100
101std::optional<uint16_t> Text_Policy::record_size_limit() const {
102 const auto limit = get_len("record_size_limit", 0);
103 // RFC 8449 4.
104 // TLS 1.3 uses a limit of 2^14+1 octets.
105 BOTAN_ARG_CHECK(limit <= 16385, "record size limit too large");
106 return (limit > 0) ? std::make_optional(static_cast<uint16_t>(limit)) : std::nullopt;
107}
108
110 return get_bool("support_cert_status_message", Policy::support_cert_status_message());
111}
112
113std::vector<Group_Params> Text_Policy::key_exchange_groups() const {
114 std::string group_str = get_str("key_exchange_groups");
115
116 if(group_str.empty()) {
117 // fall back to previously used name
118 group_str = get_str("groups");
119 }
120
121 if(group_str.empty()) {
123 }
124
125 return read_group_list(group_str);
126}
127
128std::vector<Group_Params> Text_Policy::key_exchange_groups_to_offer() const {
129 const std::string group_str = get_str("key_exchange_groups_to_offer", "notset");
130
131 if(group_str.empty() || group_str == "notset") {
132 // policy was not set, fall back to default behaviour
134 }
135
136 if(group_str == "none") {
137 return {};
138 }
139
140 return read_group_list(group_str);
141}
142
144 return get_len("minimum_ecdh_group_size", Policy::minimum_ecdh_group_size());
145}
146
148 return get_len("minimum_ecdsa_group_size", Policy::minimum_ecdsa_group_size());
149}
150
152 return get_len("minimum_dh_group_size", Policy::minimum_dh_group_size());
153}
154
156 return get_len("minimum_rsa_bits", Policy::minimum_rsa_bits());
157}
158
160 return get_len("minimum_signature_strength", Policy::minimum_signature_strength());
161}
162
164 return get_len("dtls_default_mtu", Policy::dtls_default_mtu());
165}
166
168 return get_len("dtls_initial_timeout", Policy::dtls_initial_timeout());
169}
170
172 return get_len("dtls_maximum_timeout", Policy::dtls_maximum_timeout());
173}
174
176 return get_bool("require_cert_revocation_info", Policy::require_cert_revocation_info());
177}
178
180 return get_bool("hide_unknown_users", Policy::hide_unknown_users());
181}
182
184 return get_len("maximum_session_tickets_per_client_hello", Policy::maximum_session_tickets_per_client_hello());
185}
186
187std::chrono::seconds Text_Policy::session_ticket_lifetime() const {
188 return get_duration("session_ticket_lifetime", Policy::session_ticket_lifetime());
189}
190
192 return get_bool("reuse_session_tickets", Policy::reuse_session_tickets());
193}
194
196 return get_len("new_session_tickets_upon_handshake_success", Policy::new_session_tickets_upon_handshake_success());
197}
198
199std::vector<uint16_t> Text_Policy::srtp_profiles() const {
200 std::vector<uint16_t> r;
201 for(const auto& p : get_list("srtp_profiles", std::vector<std::string>())) {
202 r.push_back(to_uint16(p));
203 }
204 return r;
205}
206
208 return get_bool("tls_13_middlebox_compatibility_mode", Policy::tls_13_middlebox_compatibility_mode());
209}
210
212 return get_bool("hash_hello_random", Policy::hash_hello_random());
213}
214
215void Text_Policy::set(const std::string& key, const std::string& value) {
216 m_kv[key] = value;
217}
218
219Text_Policy::Text_Policy(std::string_view s) {
220 std::istringstream iss{std::string(s)}; // FIXME C++23 avoid copy
221 m_kv = read_cfg(iss);
222}
223
224Text_Policy::Text_Policy(std::istream& in) : m_kv(read_cfg(in)) {}
225
226std::vector<std::string> Text_Policy::get_list(const std::string& key, const std::vector<std::string>& def) const {
227 const std::string v = get_str(key);
228
229 if(v.empty()) {
230 return def;
231 }
232
233 return split_on(v, ' ');
234}
235
236std::vector<Group_Params> Text_Policy::read_group_list(std::string_view group_str) const {
237 std::vector<Group_Params> groups;
238 for(const auto& group_name : split_on(group_str, ' ')) {
239 Group_Params group_id = Group_Params::from_string(group_name).value_or(Group_Params::NONE);
240
241 if(!group_id.is_available()) {
242 continue;
243 }
244
245 if(group_id == Group_Params::NONE) {
246 try {
247 size_t consumed = 0;
248 const unsigned long ll_id = std::stoul(group_name, &consumed, 0);
249 if(consumed != group_name.size()) {
250 continue; // some other cruft
251 }
252
253 const uint16_t id = static_cast<uint16_t>(ll_id);
254
255 if(id != ll_id) {
256 continue; // integer too large
257 }
258
259 group_id = static_cast<Group_Params>(id);
260 } catch(...) {
261 continue;
262 }
263 }
264
265 if(group_id != Group_Params::NONE) {
266 groups.push_back(group_id);
267 }
268 }
269
270 return groups;
271}
272
273std::vector<Certificate_Type> Text_Policy::read_cert_type_list(const std::string& cert_type_names) const {
274 std::vector<Certificate_Type> cert_types;
275 for(const std::string& cert_type_name : split_on(cert_type_names, ' ')) {
276 cert_types.push_back(certificate_type_from_string(cert_type_name));
277 }
278
279 return cert_types;
280}
281
282size_t Text_Policy::get_len(const std::string& key, size_t def) const {
283 const std::string v = get_str(key);
284
285 if(v.empty()) {
286 return def;
287 }
288
289 return to_u32bit(v);
290}
291
292std::chrono::seconds Text_Policy::get_duration(const std::string& key, std::chrono::seconds def) const {
293 using rep_t = std::chrono::seconds::rep;
294 constexpr rep_t max_seconds = std::chrono::seconds::max().count();
295 constexpr auto max_sizet = std::numeric_limits<size_t>::max();
296 using ull = unsigned long long;
297
298 // The concrete type of `rep` is not specified exactly. Let's play it extra safe...
299 // e.g. on 32-bit platforms size_t is 32 bits but rep_t is "at least 35 bits"
300
301 // at least zero and certainly fitting into rep_t
302 const rep_t positive_default = std::max(def.count(), rep_t(0));
303 // at least zero but capped to whatever size_t can handle
304 const size_t positive_capped_default = static_cast<size_t>(std::min<ull>(positive_default, max_sizet));
305 // at least zero but capped to whatever rep_t can handle
306 const rep_t result = static_cast<rep_t>(std::min<ull>(get_len(key, positive_capped_default), max_seconds));
307
308 return std::chrono::seconds(result);
309}
310
311bool Text_Policy::get_bool(const std::string& key, bool def) const {
312 const std::string v = get_str(key);
313
314 if(v.empty()) {
315 return def;
316 }
317
318 if(v == "true" || v == "True") {
319 return true;
320 } else if(v == "false" || v == "False") {
321 return false;
322 } else {
323 throw Decoding_Error("Invalid boolean '" + v + "'");
324 }
325}
326
327std::string Text_Policy::get_str(const std::string& key, const std::string& def) const {
328 auto i = m_kv.find(key);
329 if(i == m_kv.end()) {
330 return def;
331 }
332
333 return i->second;
334}
335
336bool Text_Policy::set_value(const std::string& key, std::string_view val, bool overwrite) {
337 auto i = m_kv.find(key);
338
339 if(overwrite == false && i != m_kv.end()) {
340 return false;
341 }
342
343 m_kv.insert(i, std::make_pair(key, val));
344 return true;
345}
346
347} // namespace Botan::TLS
#define BOTAN_ARG_CHECK(expr, msg)
Definition assert.h:33
static std::optional< Group_Params > from_string(std::string_view group_name)
virtual bool include_time_in_hello_random() const
virtual size_t dtls_maximum_timeout() const
virtual size_t minimum_ecdh_group_size() const
virtual size_t dtls_default_mtu() const
virtual bool allow_tls12() const
virtual bool reuse_session_tickets() const
virtual std::vector< Certificate_Type > accepted_server_certificate_types() const
virtual std::vector< Certificate_Type > accepted_client_certificate_types() const
virtual bool require_client_certificate_authentication() const
virtual std::vector< Group_Params > key_exchange_groups() const
virtual size_t new_session_tickets_upon_handshake_success() const
virtual std::vector< Group_Params > key_exchange_groups_to_offer() const
virtual size_t minimum_rsa_bits() const
virtual bool tls_13_middlebox_compatibility_mode() const
virtual bool allow_client_initiated_renegotiation() const
virtual bool allow_ssl_key_log_file() const
virtual bool require_cert_revocation_info() const
virtual bool negotiate_encrypt_then_mac() const
virtual bool require_extended_master_secret() const
virtual bool server_uses_own_ciphersuite_preferences() const
virtual bool support_cert_status_message() const
virtual std::vector< std::string > allowed_macs() const
virtual bool hide_unknown_users() const
virtual bool hash_hello_random() const
virtual bool allow_tls13() const
virtual std::vector< std::string > allowed_key_exchange_methods() const
virtual size_t dtls_initial_timeout() const
virtual size_t maximum_session_tickets_per_client_hello() const
virtual bool use_ecc_point_compression() const
virtual bool allow_dtls12() const
virtual size_t minimum_dh_group_size() const
virtual bool allow_insecure_renegotiation() const
virtual std::vector< std::string > allowed_ciphers() const
virtual std::chrono::seconds session_ticket_lifetime() const
virtual size_t minimum_signature_strength() const
virtual std::vector< std::string > allowed_signature_methods() const
virtual size_t minimum_ecdsa_group_size() const
virtual std::vector< std::string > allowed_signature_hashes() const
virtual bool allow_server_initiated_renegotiation() const
size_t dtls_initial_timeout() const override
bool allow_dtls12() const override
bool server_uses_own_ciphersuite_preferences() const override
bool hash_hello_random() const override
std::chrono::seconds session_ticket_lifetime() const override
std::optional< uint16_t > record_size_limit() const override
bool allow_ssl_key_log_file() const override
bool include_time_in_hello_random() const override
bool allow_client_initiated_renegotiation() const override
std::string get_str(const std::string &key, const std::string &def="") const
bool support_cert_status_message() const override
std::vector< std::string > allowed_signature_methods() const override
std::vector< Group_Params > key_exchange_groups() const override
bool require_cert_revocation_info() const override
std::vector< std::string > allowed_key_exchange_methods() const override
size_t minimum_ecdsa_group_size() const override
bool set_value(const std::string &key, std::string_view val, bool overwrite)
bool allow_tls13() const override
size_t maximum_session_tickets_per_client_hello() const override
std::vector< Certificate_Type > accepted_server_certificate_types() const override
std::vector< Group_Params > key_exchange_groups_to_offer() const override
std::chrono::seconds get_duration(const std::string &key, std::chrono::seconds def) const
size_t new_session_tickets_upon_handshake_success() const override
bool require_extended_master_secret() const override
std::vector< std::string > allowed_signature_hashes() const override
std::vector< uint16_t > srtp_profiles() const override
bool hide_unknown_users() const override
std::vector< std::string > allowed_ciphers() const override
Text_Policy(std::string_view s)
size_t minimum_ecdh_group_size() const override
void set(const std::string &key, const std::string &value)
bool allow_server_initiated_renegotiation() const override
bool get_bool(const std::string &key, bool def) const
size_t minimum_signature_strength() const override
std::vector< Certificate_Type > accepted_client_certificate_types() const override
bool negotiate_encrypt_then_mac() const override
bool require_client_certificate_authentication() const override
bool tls_13_middlebox_compatibility_mode() const override
size_t dtls_maximum_timeout() const override
bool reuse_session_tickets() const override
size_t get_len(const std::string &key, size_t def) const
bool allow_insecure_renegotiation() const override
bool allow_tls12() const override
bool use_ecc_point_compression() const override
std::vector< Certificate_Type > read_cert_type_list(const std::string &cert_type_str) const
size_t dtls_default_mtu() const override
std::vector< Group_Params > read_group_list(std::string_view group_str) const
size_t minimum_rsa_bits() const override
std::vector< std::string > allowed_macs() const override
size_t minimum_dh_group_size() const override
std::vector< std::string > get_list(const std::string &key, const std::vector< std::string > &def) const
Certificate_Type certificate_type_from_string(const std::string &type_str)
uint32_t to_u32bit(std::string_view str_view)
Definition parsing.cpp:31
uint16_t to_uint16(std::string_view str)
Definition parsing.cpp:21
std::map< std::string, std::string > read_cfg(std::istream &is)
Definition read_cfg.cpp:35
std::vector< std::string > split_on(std::string_view str, char delim)
Definition parsing.cpp:110