wolfSSL / wolfssl

The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3 and DTLS 1.3!

Home Page:https://www.wolfssl.com

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

[Bug]: ClientHello's status_request extension handling issue

SmallTown123 opened this issue · comments

Contact Details

small_town_123@163.com

Version

5.5.1

Description

The wolfssl server appears to be having some issues with the status_request extension of the Clienthello message, specifically:

When the length of this extension is shorter than normal, specifically 1, and the CertificateStatusType value is 0x01, i.e. OSCP, a normal response still exists from the server.

The structure of the status_request extension item as normalized in the RFC6066 document is as follows:

struct {
CertificateStatusType status_type.
select (status_type) {
case ocsp: OCSPStatusRequest.
} request;
} CertificateStatusRequest;

enum { ocsp(1), (255) } CertificateStatusType;

struct {
ResponderID responder_id_list<0..2^16-1>;
Extensions request_extensions;
} OCSPStatusRequest;

opaque ResponderID<1..2^16-1>;
opaque Extensions<0..2^16-1>;

If the CertificateStatusType is OSCP, the length of the extension must be greater than 1.
Therefore, when the above situation occurs, the server should return an Alert response instead of a normal response.

Reproduction steps

No response

Relevant log output

No response

Hi @SmallTown123 ,

This is Anthony Hu again. I helped you on your previous ticket. For this one, I will need some more time to confer with my colleagues. Please stay tuned.

Warm regards, Anthony

Hi @SmallTown123 , I've assigned @ejohnstown to have a look at this issue. Please stay tuned.

@SmallTown123:

Can you send a Wireshark capture of this happening?

The code is expecting there to be a length of the responder_id_list right after the CertificateStatusType value.

I modified the client side code to put only the CertificateStatusType value in the extension, and I'm getting the error I expect.

@ejohnstown:

status_request

This is a wireshark screenshot of our test data. status_request is supposed to be 5, but when its length is changed to 1, the last 4 bytes 00 00 00 00 are parsed as server_name without affecting the normal parsing of subsequent extensions.

But should the server respond with an Alert in this case?

But should the server respond with an Alert in this case?

It should and as far as I can tell it does.

First, I tested this running TLSv1.2 and I get the alert. I modified the function TLSX_CSR_Write() to return early only putting the Cert Stats Type value into the extension. My decoded Client Hello looks like your capture. I get the Decode Error Alert. I added some marker prints to TLSX_CSR_Parse() and we are checking the length of the extension and are not reading beyond the end of it into the next extension, we return an error and alert.

Today I'm running with TLSv1.3 with the master branch of our repository. I use the same modification to TLSX_CSR_Write(), and it is modifying the extension for only the single type value. The server is also returning an alert.

I switched back to v5.5.1, and I'm getting the same result. The server is sending an alert.

I configured wolfSSL with the option --enable-all. And I also tried --enable-ocsp --enable-ocspstapling. Same result. We appear to be testing something different. How are you configuring wolfSSL?

Hi, @ejohnstown:

I configured wolfSSL with the option --enable-ecc --enable-dsa --enable-aesccm --enable-curve25519 --enable-tls13.
The wolfSSL version is 5.5.1.

In fact, the content of the status_request extension should have been 00 05 00 05 01 00 00 00 00.
However, during testing, we artificially changed the extension length from 00 05 to 00 01.
At this point, the first 5 bytes 00 05 00 01 01 are parsed according to the status_request extension structure, the last four bytes 00 00 00 00 are parsed as server_name extension.

Not sure if your test data is consistent with that situation?

I should have asked for your configuration first. Given your configuration, that extension isn't supported and it is skipped, not even looked at. Add --enable-ocspstapling to your configuration.

And I'm actually shortening the extension rather than lying about the length in my test. I see the difference now. I'll take another look at this.

I recreated your failure mode. Looking at a solution.

Thanks for your reply, I was wondering if it would be possible to parse the extension while considering a safety check on the extension length.