Comparison

plugins/mod_saslauth.lua @ 13289:38c95544b7ee

mod_saslauth, mod_c2s: Disable tls-server-end-point channel binding by default This channel binding method is now enabled when a hash is manually set in the config, or it attempts to discover the hash automatically if the value is the special string "auto". A related change to mod_c2s prevents complicated certificate lookups in the client connection hot path - this work now happens only when this channel binding method is used. I'm not aware of anything else that uses ssl_cfg (vs ssl_ctx). Rationale for disabling by default: - Minor performance impact in automatic cert detection - This method is weak against a leaked/stolen private key (other methods such as 'tls-exporter' would not be compromised in such a case) Rationale for keeping the implementation: - For some deployments, this may be the only method available (e.g. due to TLS offloading in another process/server).
author Matthew Wild <mwild1@gmail.com>
date Thu, 26 Oct 2023 15:14:39 +0100
parent 13288:9a371b046e58
child 13290:c5767b7528ac
comparison
equal deleted inserted replaced
13288:9a371b046e58 13289:38c95544b7ee
17 local hex = require "prosody.util.hex"; 17 local hex = require "prosody.util.hex";
18 local pem2der = require"util.x509".pem2der; 18 local pem2der = require"util.x509".pem2der;
19 local hashes = require"util.hashes"; 19 local hashes = require"util.hashes";
20 local ssl = require "ssl"; -- FIXME Isolate LuaSec from the rest of the code 20 local ssl = require "ssl"; -- FIXME Isolate LuaSec from the rest of the code
21 21
22 local certmanager = require "core.certmanager";
23 local pm_get_tls_config_at = require "prosody.core.portmanager".get_tls_config_at;
22 local usermanager_get_sasl_handler = require "prosody.core.usermanager".get_sasl_handler; 24 local usermanager_get_sasl_handler = require "prosody.core.usermanager".get_sasl_handler;
23 25
24 local secure_auth_only = module:get_option_boolean("c2s_require_encryption", module:get_option_boolean("require_encryption", true)); 26 local secure_auth_only = module:get_option_boolean("c2s_require_encryption", module:get_option_boolean("require_encryption", true));
25 local allow_unencrypted_plain_auth = module:get_option_boolean("allow_unencrypted_plain_auth", false) 27 local allow_unencrypted_plain_auth = module:get_option_boolean("allow_unencrypted_plain_auth", false)
26 local insecure_mechanisms = module:get_option_set("insecure_sasl_mechanisms", allow_unencrypted_plain_auth and {} or {"PLAIN", "LOGIN"}); 28 local insecure_mechanisms = module:get_option_set("insecure_sasl_mechanisms", allow_unencrypted_plain_auth and {} or {"PLAIN", "LOGIN"});
328 sasl_handler:add_cb_handler("tls-unique", tls_unique); 330 sasl_handler:add_cb_handler("tls-unique", tls_unique);
329 channel_bindings:add("tls-unique"); 331 channel_bindings:add("tls-unique");
330 else 332 else
331 log("debug", "Channel binding 'tls-unique' not supported (by LuaSec?)"); 333 log("debug", "Channel binding 'tls-unique' not supported (by LuaSec?)");
332 end 334 end
333 local certfile = origin.ssl_cfg and origin.ssl_cfg.certificate; 335
334 -- FIXME .ssl_cfg is set by mod_tls and thus only available with starttls 336 local certfile;
335 if tls_server_end_point_hash then 337 if tls_server_end_point_hash == "auto" then
338 local ssl_cfg = origin.ssl_cfg;
339 if not ssl_cfg then
340 local server = origin.conn:server();
341 local tls_config = pm_get_tls_config_at(server:ip(), server:serverport());
342 local autocert = certmanager.find_host_cert(origin.conn:socket():getsniname());
343 ssl_cfg = autocert or tls_config;
344 end
345
346 certfile = ssl_cfg and ssl_cfg.certificate;
347 if certfile then
348 log("debug", "Channel binding 'tls-server-end-point' can be offered based on the certificate used");
349 sasl_handler:add_cb_handler("tls-server-end-point", tls_server_end_point);
350 channel_bindings:add("tls-server-end-point");
351 else
352 log("debug", "Channel binding 'tls-server-end-point' set to 'auto' but cannot determine cert");
353 end
354 elseif tls_server_end_point_hash then
336 log("debug", "Channel binding 'tls-server-end-point' can be offered with the configured certificate hash"); 355 log("debug", "Channel binding 'tls-server-end-point' can be offered with the configured certificate hash");
337 sasl_handler:add_cb_handler("tls-server-end-point", tls_server_end_point); 356 sasl_handler:add_cb_handler("tls-server-end-point", tls_server_end_point);
338 channel_bindings:add("tls-server-end-point"); 357 channel_bindings:add("tls-server-end-point");
339 elseif certfile then
340 log("debug", "Channel binding 'tls-server-end-point' can be offered based on the certificate used");
341 sasl_handler:add_cb_handler("tls-server-end-point", tls_server_end_point);
342 channel_bindings:add("tls-server-end-point");
343 end 358 end
359
344 sasl_handler["userdata"] = { 360 sasl_handler["userdata"] = {
345 ["tls-unique"] = origin.conn; 361 ["tls-unique"] = origin.conn;
346 ["tls-exporter"] = origin.conn; 362 ["tls-exporter"] = origin.conn;
347 ["tls-server-end-point-cert"] = certfile; 363 ["tls-server-end-point-cert"] = certfile;
348 ["tls-server-end-point-conn"] = origin.conn; 364 ["tls-server-end-point-conn"] = origin.conn;