Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 | .. _kernel_tls: ========== Kernel TLS ========== Overview ======== Transport Layer Security (TLS) is a Upper Layer Protocol (ULP) that runs over TCP. TLS provides end-to-end data integrity and confidentiality. User interface ============== Creating a TLS connection ------------------------- First create a new TCP socket and set the TLS ULP. .. code-block:: c sock = socket(AF_INET, SOCK_STREAM, 0); setsockopt(sock, SOL_TCP, TCP_ULP, "tls", sizeof("tls")); Setting the TLS ULP allows us to set/get TLS socket options. Currently only the symmetric encryption is handled in the kernel. After the TLS handshake is complete, we have all the parameters required to move the data-path to the kernel. There is a separate socket option for moving the transmit and the receive into the kernel. .. code-block:: c /* From linux/tls.h */ struct tls_crypto_info { unsigned short version; unsigned short cipher_type; }; struct tls12_crypto_info_aes_gcm_128 { struct tls_crypto_info info; unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; unsigned char key[TLS_CIPHER_AES_GCM_128_KEY_SIZE]; unsigned char salt[TLS_CIPHER_AES_GCM_128_SALT_SIZE]; unsigned char rec_seq[TLS_CIPHER_AES_GCM_128_REC_SEQ_SIZE]; }; struct tls12_crypto_info_aes_gcm_128 crypto_info; crypto_info.info.version = TLS_1_2_VERSION; crypto_info.info.cipher_type = TLS_CIPHER_AES_GCM_128; memcpy(crypto_info.iv, iv_write, TLS_CIPHER_AES_GCM_128_IV_SIZE); memcpy(crypto_info.rec_seq, seq_number_write, TLS_CIPHER_AES_GCM_128_REC_SEQ_SIZE); memcpy(crypto_info.key, cipher_key_write, TLS_CIPHER_AES_GCM_128_KEY_SIZE); memcpy(crypto_info.salt, implicit_iv_write, TLS_CIPHER_AES_GCM_128_SALT_SIZE); setsockopt(sock, SOL_TLS, TLS_TX, &crypto_info, sizeof(crypto_info)); Transmit and receive are set separately, but the setup is the same, using either TLS_TX or TLS_RX. Sending TLS application data ---------------------------- After setting the TLS_TX socket option all application data sent over this socket is encrypted using TLS and the parameters provided in the socket option. For example, we can send an encrypted hello world record as follows: .. code-block:: c const char *msg = "hello world\n"; send(sock, msg, strlen(msg)); send() data is directly encrypted from the userspace buffer provided to the encrypted kernel send buffer if possible. The sendfile system call will send the file's data over TLS records of maximum length (2^14). .. code-block:: c file = open(filename, O_RDONLY); fstat(file, &stat); sendfile(sock, file, &offset, stat.st_size); TLS records are created and sent after each send() call, unless MSG_MORE is passed. MSG_MORE will delay creation of a record until MSG_MORE is not passed, or the maximum record size is reached. The kernel will need to allocate a buffer for the encrypted data. This buffer is allocated at the time send() is called, such that either the entire send() call will return -ENOMEM (or block waiting for memory), or the encryption will always succeed. If send() returns -ENOMEM and some data was left on the socket buffer from a previous call using MSG_MORE, the MSG_MORE data is left on the socket buffer. Receiving TLS application data ------------------------------ After setting the TLS_RX socket option, all recv family socket calls are decrypted using TLS parameters provided. A full TLS record must be received before decryption can happen. .. code-block:: c char buffer[16384]; recv(sock, buffer, 16384); Received data is decrypted directly in to the user buffer if it is large enough, and no additional allocations occur. If the userspace buffer is too small, data is decrypted in the kernel and copied to userspace. ``EINVAL`` is returned if the TLS version in the received message does not match the version passed in setsockopt. ``EMSGSIZE`` is returned if the received message is too big. ``EBADMSG`` is returned if decryption failed for any other reason. Send TLS control messages ------------------------- Other than application data, TLS has control messages such as alert messages (record type 21) and handshake messages (record type 22), etc. These messages can be sent over the socket by providing the TLS record type via a CMSG. For example the following function sends @data of @length bytes using a record of type @record_type. .. code-block:: c /* send TLS control message using record_type */ static int klts_send_ctrl_message(int sock, unsigned char record_type, void *data, size_t length) { struct msghdr msg = {0}; int cmsg_len = sizeof(record_type); struct cmsghdr *cmsg; char buf[CMSG_SPACE(cmsg_len)]; struct iovec msg_iov; /* Vector of data to send/receive into. */ msg.msg_control = buf; msg.msg_controllen = sizeof(buf); cmsg = CMSG_FIRSTHDR(&msg); cmsg->cmsg_level = SOL_TLS; cmsg->cmsg_type = TLS_SET_RECORD_TYPE; cmsg->cmsg_len = CMSG_LEN(cmsg_len); *CMSG_DATA(cmsg) = record_type; msg.msg_controllen = cmsg->cmsg_len; msg_iov.iov_base = data; msg_iov.iov_len = length; msg.msg_iov = &msg_iov; msg.msg_iovlen = 1; return sendmsg(sock, &msg, 0); } Control message data should be provided unencrypted, and will be encrypted by the kernel. Receiving TLS control messages ------------------------------ TLS control messages are passed in the userspace buffer, with message type passed via cmsg. If no cmsg buffer is provided, an error is returned if a control message is received. Data messages may be received without a cmsg buffer set. .. code-block:: c char buffer[16384]; char cmsg[CMSG_SPACE(sizeof(unsigned char))]; struct msghdr msg = {0}; msg.msg_control = cmsg; msg.msg_controllen = sizeof(cmsg); struct iovec msg_iov; msg_iov.iov_base = buffer; msg_iov.iov_len = 16384; msg.msg_iov = &msg_iov; msg.msg_iovlen = 1; int ret = recvmsg(sock, &msg, 0 /* flags */); struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msg); if (cmsg->cmsg_level == SOL_TLS && cmsg->cmsg_type == TLS_GET_RECORD_TYPE) { int record_type = *((unsigned char *)CMSG_DATA(cmsg)); // Do something with record_type, and control message data in // buffer. // // Note that record_type may be == to application data (23). } else { // Buffer contains application data. } recv will never return data from mixed types of TLS records. Integrating in to userspace TLS library --------------------------------------- At a high level, the kernel TLS ULP is a replacement for the record layer of a userspace TLS library. A patchset to OpenSSL to use ktls as the record layer is `here <https://github.com/Mellanox/openssl/commits/tls_rx2>`_. `An example <https://github.com/ktls/af_ktls-tool/commits/RX>`_ of calling send directly after a handshake using gnutls. Since it doesn't implement a full record layer, control messages are not supported. Optional optimizations ---------------------- There are certain condition-specific optimizations the TLS ULP can make, if requested. Those optimizations are either not universally beneficial or may impact correctness, hence they require an opt-in. All options are set per-socket using setsockopt(), and their state can be checked using getsockopt() and via socket diag (``ss``). TLS_TX_ZEROCOPY_RO ~~~~~~~~~~~~~~~~~~ For device offload only. Allow sendfile() data to be transmitted directly to the NIC without making an in-kernel copy. This allows true zero-copy behavior when device offload is enabled. The application must make sure that the data is not modified between being submitted and transmission completing. In other words this is mostly applicable if the data sent on a socket via sendfile() is read-only. Modifying the data may result in different versions of the data being used for the original TCP transmission and TCP retransmissions. To the receiver this will look like TLS records had been tampered with and will result in record authentication failures. TLS_RX_EXPECT_NO_PAD ~~~~~~~~~~~~~~~~~~~~ TLS 1.3 only. Expect the sender to not pad records. This allows the data to be decrypted directly into user space buffers with TLS 1.3. This optimization is safe to enable only if the remote end is trusted, otherwise it is an attack vector to doubling the TLS processing cost. If the record decrypted turns out to had been padded or is not a data record it will be decrypted again into a kernel buffer without zero copy. Such events are counted in the ``TlsDecryptRetry`` statistic. Statistics ========== TLS implementation exposes the following per-namespace statistics (``/proc/net/tls_stat``): - ``TlsCurrTxSw``, ``TlsCurrRxSw`` - number of TX and RX sessions currently installed where host handles cryptography - ``TlsCurrTxDevice``, ``TlsCurrRxDevice`` - number of TX and RX sessions currently installed where NIC handles cryptography - ``TlsTxSw``, ``TlsRxSw`` - number of TX and RX sessions opened with host cryptography - ``TlsTxDevice``, ``TlsRxDevice`` - number of TX and RX sessions opened with NIC cryptography - ``TlsDecryptError`` - record decryption failed (e.g. due to incorrect authentication tag) - ``TlsDeviceRxResync`` - number of RX resyncs sent to NICs handling cryptography - ``TlsDecryptRetry`` - number of RX records which had to be re-decrypted due to ``TLS_RX_EXPECT_NO_PAD`` mis-prediction. Note that this counter will also increment for non-data records. - ``TlsRxNoPadViolation`` - number of data RX records which had to be re-decrypted due to ``TLS_RX_EXPECT_NO_PAD`` mis-prediction. |