1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517
|
# frozen_string_literal: true
# rubocop:todo all
# Copyright (C) 2014-2020 MongoDB Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
module Mongo
class Socket
# Wrapper for TLS sockets.
#
# @since 2.0.0
class SSL < Socket
include OpenSSL
include Loggable
# Initializes a new TLS socket.
#
# @example Create the TLS socket.
# SSL.new('::1', 27017, 30)
#
# @param [ String ] host The hostname or IP address.
# @param [ Integer ] port The port number.
# @param [ Float ] timeout The socket timeout value.
# @param [ Integer ] family The socket family.
# @param [ Hash ] options The options.
#
# @option options [ Float ] :connect_timeout Connect timeout.
# @option options [ Address ] :connection_address Address of the
# connection that created this socket.
# @option options [ Integer ] :connection_generation Generation of the
# connection (for non-monitoring connections) that created this socket.
# @option options [ true | false ] :monitor Whether this socket was
# created by a monitoring connection.
# @option options [ String ] :ssl_ca_cert The file containing concatenated
# certificate authority certificates used to validate certs passed from the
# other end of the connection. Intermediate certificates should NOT be
# specified in files referenced by this option. One of :ssl_ca_cert,
# :ssl_ca_cert_string or :ssl_ca_cert_object (in order of priority) is
# required when using :ssl_verify.
# @option options [ Array<OpenSSL::X509::Certificate> ] :ssl_ca_cert_object
# An array of OpenSSL::X509::Certificate objects representing the
# certificate authority certificates used to validate certs passed from
# the other end of the connection. Intermediate certificates should NOT
# be specified in files referenced by this option. One of :ssl_ca_cert,
# :ssl_ca_cert_string or :ssl_ca_cert_object (in order of priority)
# is required when using :ssl_verify.
# @option options [ String ] :ssl_ca_cert_string A string containing
# certificate authority certificate used to validate certs passed from the
# other end of the connection. This option allows passing only one CA
# certificate to the driver. Intermediate certificates should NOT
# be specified in files referenced by this option. One of :ssl_ca_cert,
# :ssl_ca_cert_string or :ssl_ca_cert_object (in order of priority) is
# required when using :ssl_verify.
# @option options [ String ] :ssl_cert The certificate file used to identify
# the connection against MongoDB. A certificate chain may be passed by
# specifying the client certificate first followed by any intermediate
# certificates up to the CA certificate. The file may also contain the
# certificate's private key, which will be ignored. This option, if present,
# takes precedence over the values of :ssl_cert_string and :ssl_cert_object
# @option options [ OpenSSL::X509::Certificate ] :ssl_cert_object The OpenSSL::X509::Certificate
# used to identify the connection against MongoDB. Only one certificate
# may be passed through this option.
# @option options [ String ] :ssl_cert_string A string containing the PEM-encoded
# certificate used to identify the connection against MongoDB. A certificate
# chain may be passed by specifying the client certificate first followed
# by any intermediate certificates up to the CA certificate. The string
# may also contain the certificate's private key, which will be ignored,
# This option, if present, takes precedence over the value of :ssl_cert_object
# @option options [ String ] :ssl_key The private keyfile used to identify the
# connection against MongoDB. Note that even if the key is stored in the same
# file as the certificate, both need to be explicitly specified. This option,
# if present, takes precedence over the values of :ssl_key_string and :ssl_key_object
# @option options [ OpenSSL::PKey ] :ssl_key_object The private key used to identify the
# connection against MongoDB
# @option options [ String ] :ssl_key_pass_phrase A passphrase for the private key.
# @option options [ String ] :ssl_key_string A string containing the PEM-encoded private key
# used to identify the connection against MongoDB. This parameter, if present,
# takes precedence over the value of option :ssl_key_object
# @option options [ true, false ] :ssl_verify Whether to perform peer certificate validation and
# hostname verification. Note that the decision of whether to validate certificates will be
# overridden if :ssl_verify_certificate is set, and the decision of whether to validate
# hostnames will be overridden if :ssl_verify_hostname is set.
# @option options [ true, false ] :ssl_verify_certificate Whether to perform peer certificate
# validation. This setting overrides :ssl_verify with respect to whether certificate
# validation is performed.
# @option options [ true, false ] :ssl_verify_hostname Whether to perform peer hostname
# validation. This setting overrides :ssl_verify with respect to whether hostname validation
# is performed.
#
# @since 2.0.0
# @api private
def initialize(host, port, host_name, timeout, family, options = {})
super(timeout, options)
@host, @port, @host_name = host, port, host_name
@context = create_context(options)
@family = family
@tcp_socket = ::Socket.new(family, SOCK_STREAM, 0)
begin
@tcp_socket.setsockopt(IPPROTO_TCP, TCP_NODELAY, 1)
set_socket_options(@tcp_socket)
run_tls_context_hooks
connect!
rescue
@tcp_socket.close
raise
end
end
# @return [ SSLContext ] context The TLS context.
attr_reader :context
# @return [ String ] host The host to connect to.
attr_reader :host
# @return [ String ] host_name The original host name.
attr_reader :host_name
# @return [ Integer ] port The port to connect to.
attr_reader :port
# Establishes a socket connection.
#
# @example Connect the socket.
# sock.connect!
#
# @note This method mutates the object by setting the socket
# internally.
#
# @return [ SSL ] The connected socket instance.
#
# @since 2.0.0
def connect!
sockaddr = ::Socket.pack_sockaddr_in(port, host)
connect_timeout = options[:connect_timeout]
map_exceptions do
if connect_timeout && connect_timeout != 0
deadline = Utils.monotonic_time + connect_timeout
if BSON::Environment.jruby?
# We encounter some strange problems with connect_nonblock for
# ssl sockets on JRuby. Therefore, we use the old +Timeout.timeout+
# solution, even though it is known to be not very reliable.
raise Error::SocketTimeoutError, 'connect_timeout expired' if connect_timeout < 0
Timeout.timeout(connect_timeout, Error::SocketTimeoutError, "The socket took over #{options[:connect_timeout]} seconds to connect") do
connect_without_timeout(sockaddr)
end
else
connect_with_timeout(sockaddr, connect_timeout)
end
remaining_timeout = deadline - Utils.monotonic_time
verify_certificate!(@socket)
verify_ocsp_endpoint!(@socket, remaining_timeout)
else
connect_without_timeout(sockaddr)
verify_certificate!(@socket)
verify_ocsp_endpoint!(@socket)
end
end
self
rescue
@socket&.close
@socket = nil
raise
end
private :connect!
# Read a single byte from the socket.
#
# @example Read a single byte.
# socket.readbyte
#
# @return [ Object ] The read byte.
#
# @since 2.0.0
def readbyte
map_exceptions do
byte = socket.read(1).bytes.to_a[0]
byte.nil? ? raise(EOFError) : byte
end
end
private
# Connects the socket without a timeout provided.
#
# @param [ String ] sockaddr Address to connect to.
def connect_without_timeout(sockaddr)
@tcp_socket.connect(sockaddr)
@socket = OpenSSL::SSL::SSLSocket.new(@tcp_socket, context)
@socket.hostname = @host_name
@socket.sync_close = true
@socket.connect
end
# Connects the socket with the connect timeout. The timeout applies to
# connecting both ssl socket and the underlying tcp socket.
#
# @param [ String ] sockaddr Address to connect to.
def connect_with_timeout(sockaddr, connect_timeout)
if connect_timeout <= 0
raise Error::SocketTimeoutError, "The socket took over #{connect_timeout} seconds to connect"
end
deadline = Utils.monotonic_time + connect_timeout
connect_tcp_socket_with_timeout(sockaddr, deadline, connect_timeout)
connnect_ssl_socket_with_timeout(deadline, connect_timeout)
end
def connect_tcp_socket_with_timeout(sockaddr, deadline, connect_timeout)
if deadline <= Utils.monotonic_time
raise Error::SocketTimeoutError, "The socket took over #{connect_timeout} seconds to connect"
end
begin
@tcp_socket.connect_nonblock(sockaddr)
rescue IO::WaitWritable
with_select_timeout(deadline, connect_timeout) do |select_timeout|
IO.select(nil, [@tcp_socket], nil, select_timeout)
end
retry
rescue Errno::EISCONN
# Socket is connected, nothing to do.
end
end
def connnect_ssl_socket_with_timeout(deadline, connect_timeout)
if deadline <= Utils.monotonic_time
raise Error::SocketTimeoutError, "The socket took over #{connect_timeout} seconds to connect"
end
@socket = OpenSSL::SSL::SSLSocket.new(@tcp_socket, context)
@socket.hostname = @host_name
@socket.sync_close = true
# We still have time, connecting ssl socket.
begin
@socket.connect_nonblock
rescue IO::WaitReadable, OpenSSL::SSL::SSLErrorWaitReadable
with_select_timeout(deadline, connect_timeout) do |select_timeout|
IO.select([@socket], nil, nil, select_timeout)
end
retry
rescue IO::WaitWritable, OpenSSL::SSL::SSLErrorWaitWritable
with_select_timeout(deadline, connect_timeout) do |select_timeout|
IO.select(nil, [@socket], nil, select_timeout)
end
retry
rescue Errno::EISCONN
# Socket is connected, nothing to do
end
end
# Raises +Error::SocketTimeoutError+ exception if deadline reached or the
# block returns nil. The block should call +IO.select+ with the
# +connect_timeout+ value. It returns nil if the +connect_timeout+ expires.
def with_select_timeout(deadline, connect_timeout, &block)
select_timeout = deadline - Utils.monotonic_time
if select_timeout <= 0
raise Error::SocketTimeoutError, "The socket took over #{connect_timeout} seconds to connect"
end
rv = block.call(select_timeout)
if rv.nil?
raise Error::SocketTimeoutError, "The socket took over #{connect_timeout} seconds to connect"
end
end
def verify_certificate?
# If ssl_verify_certificate is not present, disable only if
# ssl_verify is explicitly set to false.
if options[:ssl_verify_certificate].nil?
options[:ssl_verify] != false
# If ssl_verify_certificate is present, enable or disable based on its value.
else
!!options[:ssl_verify_certificate]
end
end
def verify_hostname?
# If ssl_verify_hostname is not present, disable only if ssl_verify is
# explicitly set to false.
if options[:ssl_verify_hostname].nil?
options[:ssl_verify] != false
# If ssl_verify_hostname is present, enable or disable based on its value.
else
!!options[:ssl_verify_hostname]
end
end
def verify_ocsp_endpoint?
if !options[:ssl_verify_ocsp_endpoint].nil?
options[:ssl_verify_ocsp_endpoint] != false
elsif !options[:ssl_verify_certificate].nil?
options[:ssl_verify_certificate] != false
else
options[:ssl_verify] != false
end
end
def create_context(options)
OpenSSL::SSL::SSLContext.new.tap do |context|
if OpenSSL::SSL.const_defined?(:OP_NO_RENEGOTIATION)
context.options = context.options | OpenSSL::SSL::OP_NO_RENEGOTIATION
end
if context.respond_to?(:renegotiation_cb=)
# Disable renegotiation for older Ruby versions per the sample code at
# https://rubydocs.org/d/ruby-2-6-0/classes/OpenSSL/SSL/SSLContext.html
# In JRuby we must allow one call as this callback is invoked for
# the initial connection also, not just for renegotiations -
# https://github.com/jruby/jruby-openssl/issues/180
if BSON::Environment.jruby?
allowed_calls = 1
else
allowed_calls = 0
end
context.renegotiation_cb = lambda do |ssl|
if allowed_calls <= 0
raise RuntimeError, 'Client renegotiation disabled'
end
allowed_calls -= 1
end
end
set_cert(context, options)
set_key(context, options)
if verify_certificate?
context.verify_mode = OpenSSL::SSL::VERIFY_PEER
set_cert_verification(context, options)
else
context.verify_mode = OpenSSL::SSL::VERIFY_NONE
end
if context.respond_to?(:verify_hostname=)
# We manually check the hostname after the connection is established if necessary, so
# we disable it here in order to give consistent errors across Ruby versions which
# don't support hostname verification at the time of the handshake.
context.verify_hostname = OpenSSL::SSL::VERIFY_NONE
end
end
end
def set_cert(context, options)
# Since we clear cert_text during processing, we need to examine
# ssl_cert_object here to avoid considering it if we have also
# processed the text.
if options[:ssl_cert]
cert_text = File.read(options[:ssl_cert])
cert_object = nil
elsif cert_text = options[:ssl_cert_string]
cert_object = nil
else
cert_object = options[:ssl_cert_object]
end
# The client certificate may be a single certificate or a bundle
# (client certificate followed by intermediate certificates).
# The text may also include private keys for the certificates.
# OpenSSL supports passing the entire bundle as a certificate chain
# to the context via SSL_CTX_use_certificate_chain_file, but the
# Ruby openssl extension does not currently expose this functionality
# per https://github.com/ruby/openssl/issues/254.
# Therefore, extract the individual certificates from the certificate
# text, and if there is more than one certificate provided, use
# extra_chain_cert option to add the intermediate ones. This
# implementation is modeled after
# https://github.com/venuenext/ruby-kafka/commit/9495f5daf254b43bc88062acad9359c5f32cb8b5.
# Note that the parsing here is not identical to what OpenSSL employs -
# for instance, if there is no newline between two certificates
# this code will extract them both but OpenSSL fails in this situation.
if cert_text
certs = extract_certs(cert_text)
if certs.length > 1
context.cert = OpenSSL::X509::Certificate.new(certs.shift)
context.extra_chain_cert = certs.map do |cert|
OpenSSL::X509::Certificate.new(cert)
end
# All certificates are already added to the context, skip adding
# them again below.
cert_text = nil
end
end
if cert_text
context.cert = OpenSSL::X509::Certificate.new(cert_text)
elsif cert_object
context.cert = cert_object
end
end
def set_key(context, options)
passphrase = options[:ssl_key_pass_phrase]
if options[:ssl_key]
context.key = load_private_key(File.read(options[:ssl_key]), passphrase)
elsif options[:ssl_key_string]
context.key = load_private_key(options[:ssl_key_string], passphrase)
elsif options[:ssl_key_object]
context.key = options[:ssl_key_object]
end
end
def load_private_key(text, passphrase)
args = if passphrase
[text, passphrase]
else
[text]
end
# On JRuby, PKey.read does not grok cert+key bundles.
# https://github.com/jruby/jruby-openssl/issues/176
if BSON::Environment.jruby?
[OpenSSL::PKey::RSA, OpenSSL::PKey::DSA].each do |cls|
begin
return cls.send(:new, *args)
rescue OpenSSL::PKey::PKeyError
# ignore
end
end
# Neither RSA nor DSA worked, fall through to trying PKey
end
OpenSSL::PKey.send(:read, *args)
end
def set_cert_verification(context, options)
context.verify_mode = OpenSSL::SSL::VERIFY_PEER
cert_store = OpenSSL::X509::Store.new
if options[:ssl_ca_cert]
cert_store.add_file(options[:ssl_ca_cert])
elsif options[:ssl_ca_cert_string]
cert_store.add_cert(OpenSSL::X509::Certificate.new(options[:ssl_ca_cert_string]))
elsif options[:ssl_ca_cert_object]
raise TypeError("Option :ssl_ca_cert_object should be an array of OpenSSL::X509:Certificate objects") unless options[:ssl_ca_cert_object].is_a? Array
options[:ssl_ca_cert_object].each {|cert| cert_store.add_cert(cert)}
else
cert_store.set_default_paths
end
context.cert_store = cert_store
end
def verify_certificate!(socket)
if verify_hostname?
unless OpenSSL::SSL.verify_certificate_identity(socket.peer_cert, host_name)
raise Error::SocketError, 'TLS handshake failed due to a hostname mismatch.'
end
end
end
def verify_ocsp_endpoint!(socket, timeout = nil)
return unless verify_ocsp_endpoint?
cert = socket.peer_cert
ca_cert = find_issuer(cert, socket.peer_cert_chain)
unless ca_cert
log_warn("TLS certificate of '#{host_name}' could not be definitively verified via OCSP: issuer certificate not found in the chain.")
return
end
verifier = OcspVerifier.new(@host_name, cert, ca_cert, context.cert_store,
**Utils.shallow_symbolize_keys(options).merge(timeout: timeout))
verifier.verify_with_cache
end
def read_buffer_size
# Buffer size for TLS reads.
# Capped at 16k due to https://linux.die.net/man/3/ssl_read
16384
end
def human_address
"#{host}:#{port} (#{host_name}:#{port}, TLS)"
end
def run_tls_context_hooks
Mongo.tls_context_hooks.each do |hook|
hook.call(@context)
end
end
BEGIN_CERT = "-----BEGIN CERTIFICATE-----"
END_CERT = "-----END CERTIFICATE-----"
# This was originally a scan + regex, but the regex was particularly
# inefficient and was flagged as a concern by static analysis.
def extract_certs(text)
[].tap do |list|
pos = 0
while (begin_idx = text.index(BEGIN_CERT, pos))
end_idx = text.index(END_CERT, begin_idx)
break unless end_idx
end_idx += END_CERT.length
list.push(text[begin_idx...end_idx])
pos = end_idx
end
end
end
# Find the issuer certificate in the chain.
def find_issuer(cert, cert_chain)
cert_chain.find { |c| c.subject == cert.issuer }
end
end
end
end
|