/* * This file and its contents are supplied under the terms of the * Common Development and Distribution License ("CDDL"), version 1.0. * You may only use this file in accordance with the terms of version * 1.0 of the CDDL. * * A full copy of the text of the CDDL should have accompanied this * source. A copy of the CDDL is also available via the Internet at * http://www.illumos.org/license/CDDL. */ /* * Copyright 2024 Oxide Computer Company */ /* * RFC 2385 TCP MD5 Signature Option * * A security option commonly used to enhance security for BGP sessions. When a * TCP socket has its TCP_MD5SIG option enabled, an additional TCP option is * added to the header containing an MD5 digest calculated across the pseudo IP * header, part of the TCP header, the data in the segment and a shared secret. * The option is large (18 bytes plus 2 more for padding to a word boundary), * and often /just/ fits in the TCP header -- particularly with SYN packets due * to their additional options such as MSS. * * The socket option is boolean, and it is also necessary to have configured a * security association (SA) to match the traffic that should be signed, and to * provide the signing key. These SAs are configured from userland via * tcpkey(8), use source and destination addresses and ports as criteria, and * are maintained in a per-netstack linked list. The SAs pertaining to a * particular TCP connection, one for each direction, are cached in the * connection's TCP state after the first packet has been processed, and so * using a single list is not a significant overhead, particularly as it is * expected to be short. * * Enabling the socket option has a number of side effects: * * - TCP fast path is disabled; * - TCP Fusion is disabled; * - Outbound packets for which a matching SA cannot be found are silently * discarded. * - Inbound packets that DO NOT contain an MD5 option in their TCP header are * silently discarded. * - Inbound packets that DO contain an MD5 option but for which the digest * does not match the locally calculated one are silently discarded. * * An SA is bound to a TCP stream once the first packet is sent or received * following the TCP_MD5SIG socket option being enabled. Typically an * application will enable the socket option immediately after creating the * socket, and before moving on to calling connect() or bind() but it is * necessary to wait for the first packet as that is the point at which the * source and destination addresses and ports are all known, and we need these * to find the SA. Note that if no matching SA is present in the database when * the first packet is sent or received, it will be silently dropped. Due to * the reference counting and tombstone logic, an SA that has been bound to one * or more streams will persist until all of those streams have been torn down. * It is not possible to change the SA for an active connection. * * ------------- * Lock Ordering * ------------- * * In order to ensure that we don't deadlock, if both are required, the RW lock * across the SADB must be taken before acquiring an individual SA's lock. That * is, locks must be taken in the following order (and released in the opposite * order): * * 0) ->tcps_sigdb->td_lock * 1) ->tcps_sigdb->td_sa.list->->ts_lock * * The lock at ->tcps_sigdb_lock is independent and used to * synchronize lazy initialization of the database. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static void tcpsig_sa_free(tcpsig_sa_t *); void tcpsig_init(tcp_stack_t *tcps) { mutex_init(&tcps->tcps_sigdb_lock, NULL, MUTEX_DEFAULT, NULL); } void tcpsig_fini(tcp_stack_t *tcps) { tcpsig_db_t *db; if ((db = tcps->tcps_sigdb) != NULL) { tcpsig_sa_t *sa; rw_destroy(&db->td_lock); while ((sa = list_remove_head(&db->td_salist)) != NULL) tcpsig_sa_free(sa); list_destroy(&db->td_salist); kmem_free(tcps->tcps_sigdb, sizeof (tcpsig_db_t)); tcps->tcps_sigdb = NULL; } mutex_destroy(&tcps->tcps_sigdb_lock); } static tcpsig_db_t * tcpsig_db(tcp_stack_t *tcps) { mutex_enter(&tcps->tcps_sigdb_lock); if (tcps->tcps_sigdb == NULL) { tcpsig_db_t *db = kmem_alloc(sizeof (tcpsig_db_t), KM_SLEEP); rw_init(&db->td_lock, NULL, RW_DEFAULT, 0); list_create(&db->td_salist, sizeof (tcpsig_sa_t), offsetof(tcpsig_sa_t, ts_link)); tcps->tcps_sigdb = db; } mutex_exit(&tcps->tcps_sigdb_lock); return ((tcpsig_db_t *)tcps->tcps_sigdb); } static void tcpsig_sa_free(tcpsig_sa_t *sa) { ASSERT0(sa->ts_refcnt); mutex_destroy(&sa->ts_lock); kmem_free(sa->ts_key.sak_key, sa->ts_key.sak_keylen); kmem_free(sa, sizeof (*sa)); } void tcpsig_sa_rele(tcpsig_sa_t *sa) { mutex_enter(&sa->ts_lock); VERIFY3U(sa->ts_refcnt, >, 0); sa->ts_refcnt--; /* * If we are tombstoned (have been marked as deleted) and the reference * count has now dropped to zero, then we can go ahead and finally * remove this SA from the database. */ if (sa->ts_tombstoned && sa->ts_refcnt == 0) { tcpsig_db_t *db = tcpsig_db(sa->ts_stack); /* * To maintain the required lock ordering, we need to drop the * lock on the SA while acquiring the RW lock on the list. Take * an additional hold before doing this dance and drop it once * we have re-gained the lock. */ sa->ts_refcnt++; mutex_exit(&sa->ts_lock); rw_enter(&db->td_lock, RW_WRITER); mutex_enter(&sa->ts_lock); sa->ts_refcnt--; mutex_exit(&sa->ts_lock); list_remove(&db->td_salist, sa); rw_exit(&db->td_lock); tcpsig_sa_free(sa); } else { mutex_exit(&sa->ts_lock); } } static bool tcpsig_sa_match4(tcpsig_sa_t *sa, struct sockaddr_storage *src_s, struct sockaddr_storage *dst_s) { sin_t msrc, mdst, *src, *dst, *sasrc, *sadst; if (src_s->ss_family != AF_INET) return (false); src = (sin_t *)src_s; dst = (sin_t *)dst_s; if (sa->ts_family == AF_INET6) { sin6_t *sasrc6 = (sin6_t *)&sa->ts_src; sin6_t *sadst6 = (sin6_t *)&sa->ts_dst; if (!IN6_IS_ADDR_V4MAPPED(&sasrc6->sin6_addr) || !IN6_IS_ADDR_V4MAPPED(&sadst6->sin6_addr)) { return (false); } msrc = sin_null; msrc.sin_family = AF_INET; msrc.sin_port = sasrc6->sin6_port; IN6_V4MAPPED_TO_INADDR(&sasrc6->sin6_addr, &msrc.sin_addr); sasrc = &msrc; mdst = sin_null; mdst.sin_family = AF_INET; mdst.sin_port = sadst6->sin6_port; IN6_V4MAPPED_TO_INADDR(&sadst6->sin6_addr, &mdst.sin_addr); sadst = &mdst; } else { sasrc = (sin_t *)&sa->ts_src; sadst = (sin_t *)&sa->ts_dst; } if (sasrc->sin_port != 0 && sasrc->sin_port != src->sin_port) return (false); if (sadst->sin_port != 0 && sadst->sin_port != dst->sin_port) return (false); if (sasrc->sin_addr.s_addr != src->sin_addr.s_addr) return (false); if (sadst->sin_addr.s_addr != dst->sin_addr.s_addr) return (false); return (true); } static bool tcpsig_sa_match6(tcpsig_sa_t *sa, struct sockaddr_storage *src_s, struct sockaddr_storage *dst_s) { sin6_t *src, *dst, *sasrc, *sadst; if (src_s->ss_family != AF_INET6 || sa->ts_src.ss_family != AF_INET6) return (false); src = (sin6_t *)src_s; dst = (sin6_t *)dst_s; sasrc = (sin6_t *)&sa->ts_src; sadst = (sin6_t *)&sa->ts_dst; if (sasrc->sin6_port != 0 && sasrc->sin6_port != src->sin6_port) return (false); if (sadst->sin6_port != 0 && sadst->sin6_port != dst->sin6_port) return (false); if (!IN6_ARE_ADDR_EQUAL(&sasrc->sin6_addr, &src->sin6_addr)) return (false); if (!IN6_ARE_ADDR_EQUAL(&sadst->sin6_addr, &dst->sin6_addr)) return (false); return (true); } static tcpsig_sa_t * tcpsig_sa_find_held(struct sockaddr_storage *src, struct sockaddr_storage *dst, tcp_stack_t *tcps) { tcpsig_db_t *db = tcpsig_db(tcps); tcpsig_sa_t *sa = NULL; ASSERT(RW_LOCK_HELD(&db->td_lock)); if (src->ss_family != dst->ss_family) return (NULL); for (sa = list_head(&db->td_salist); sa != NULL; sa = list_next(&db->td_salist, sa)) { mutex_enter(&sa->ts_lock); /* We don't consider tombstoned entries as a possible match */ if (sa->ts_tombstoned) { mutex_exit(&sa->ts_lock); continue; } if (tcpsig_sa_match4(sa, src, dst) || tcpsig_sa_match6(sa, src, dst)) { sa->ts_refcnt++; mutex_exit(&sa->ts_lock); break; } mutex_exit(&sa->ts_lock); } return (sa); } static tcpsig_sa_t * tcpsig_sa_find(struct sockaddr_storage *src, struct sockaddr_storage *dst, tcp_stack_t *tcps) { tcpsig_db_t *db = tcpsig_db(tcps); tcpsig_sa_t *sa; rw_enter(&db->td_lock, RW_READER); sa = tcpsig_sa_find_held(src, dst, tcps); rw_exit(&db->td_lock); return (sa); } static int tcpsig_sa_flush(keysock_t *ks, tcp_stack_t *tcps, int *diagp) { tcpsig_db_t *db = tcpsig_db(tcps); tcpsig_sa_t *nextsa; rw_enter(&db->td_lock, RW_WRITER); nextsa = list_head(&db->td_salist); while (nextsa != NULL) { tcpsig_sa_t *sa = nextsa; nextsa = list_next(&db->td_salist, sa); mutex_enter(&sa->ts_lock); if (sa->ts_refcnt > 0) { sa->ts_tombstoned = true; mutex_exit(&sa->ts_lock); continue; } list_remove(&db->td_salist, sa); mutex_exit(&sa->ts_lock); tcpsig_sa_free(sa); } rw_exit(&db->td_lock); return (0); } static int tcpsig_sa_add(keysock_t *ks, tcp_stack_t *tcps, keysock_in_t *ksi, sadb_ext_t **extv, int *diagp) { tcpsig_db_t *db; sadb_address_t *srcext, *dstext; sadb_sa_t *assoc; struct sockaddr_storage *src, *dst; sadb_key_t *key; tcpsig_sa_t *sa, *dupsa; int ret = 0; assoc = (sadb_sa_t *)extv[SADB_EXT_SA]; srcext = (sadb_address_t *)extv[SADB_EXT_ADDRESS_SRC]; dstext = (sadb_address_t *)extv[SADB_EXT_ADDRESS_DST]; key = (sadb_key_t *)extv[SADB_X_EXT_STR_AUTH]; if (assoc == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_SA; return (EINVAL); } if (srcext == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_SRC; return (EINVAL); } if (dstext == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_DST; return (EINVAL); } if (key == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_ASTR; return (EINVAL); } src = (struct sockaddr_storage *)(srcext + 1); dst = (struct sockaddr_storage *)(dstext + 1); if (src->ss_family != dst->ss_family) { *diagp = SADB_X_DIAGNOSTIC_AF_MISMATCH; return (EINVAL); } if (src->ss_family != AF_INET && src->ss_family != AF_INET6) { *diagp = SADB_X_DIAGNOSTIC_BAD_SRC_AF; return (EINVAL); } /* We only support MD5 */ if (assoc->sadb_sa_auth != SADB_AALG_MD5) { *diagp = SADB_X_DIAGNOSTIC_BAD_AALG; return (EINVAL); } /* The authentication key length must be a multiple of whole bytes */ if ((key->sadb_key_bits & 0x7) != 0) { *diagp = SADB_X_DIAGNOSTIC_MALFORMED_AKEY; return (EINVAL); } db = tcpsig_db(tcps); sa = kmem_zalloc(sizeof (*sa), KM_NOSLEEP_LAZY); if (sa == NULL) return (ENOMEM); sa->ts_stack = tcps; sa->ts_family = src->ss_family; if (sa->ts_family == AF_INET6) { bcopy(src, (sin6_t *)&sa->ts_src, sizeof (sin6_t)); bcopy(dst, (sin6_t *)&sa->ts_dst, sizeof (sin6_t)); } else { bcopy(src, (sin_t *)&sa->ts_src, sizeof (sin_t)); bcopy(dst, (sin_t *)&sa->ts_dst, sizeof (sin_t)); } sa->ts_key.sak_algid = assoc->sadb_sa_auth; sa->ts_key.sak_keylen = SADB_1TO8(key->sadb_key_bits); sa->ts_key.sak_keybits = key->sadb_key_bits; sa->ts_key.sak_key = kmem_alloc(sa->ts_key.sak_keylen, KM_NOSLEEP_LAZY); if (sa->ts_key.sak_key == NULL) { kmem_free(sa, sizeof (*sa)); return (ENOMEM); } bcopy(key + 1, sa->ts_key.sak_key, sa->ts_key.sak_keylen); bzero(key + 1, sa->ts_key.sak_keylen); mutex_init(&sa->ts_lock, NULL, MUTEX_DEFAULT, NULL); sa->ts_refcnt = 0; sa->ts_tombstoned = false; rw_enter(&db->td_lock, RW_WRITER); if ((dupsa = tcpsig_sa_find_held(src, dst, tcps)) != NULL) { rw_exit(&db->td_lock); tcpsig_sa_rele(dupsa); tcpsig_sa_free(sa); *diagp = SADB_X_DIAGNOSTIC_DUPLICATE_SA; ret = EEXIST; } else { list_insert_tail(&db->td_salist, sa); rw_exit(&db->td_lock); } return (ret); } static uint8_t * tcpsig_make_addr_ext(uint8_t *start, uint8_t *end, uint16_t exttype, sa_family_t af, struct sockaddr_storage *addr) { uint8_t *cur = start; unsigned int addrext_len; sadb_address_t *addrext = (sadb_address_t *)cur; if (cur == NULL) return (NULL); cur += sizeof (*addrext); if (cur > end) return (NULL); addrext->sadb_address_proto = IPPROTO_TCP; addrext->sadb_address_reserved = 0; addrext->sadb_address_prefixlen = 0; addrext->sadb_address_exttype = exttype; ASSERT(af == AF_INET || af == AF_INET6); if (af == AF_INET) { sin_t *sin = (sin_t *)cur; cur += sizeof (*sin); if (cur > end) return (NULL); *sin = sin_null; bcopy(addr, sin, sizeof (*sin)); } else { sin6_t *sin6 = (sin6_t *)cur; cur += sizeof (*sin6); if (cur > end) return (NULL); *sin6 = sin6_null; bcopy(addr, sin6, sizeof (*sin6)); } addrext_len = roundup(cur - start, sizeof (uint64_t)); addrext->sadb_address_len = SADB_8TO64(addrext_len); cur = start + addrext_len; if (cur > end) cur = NULL; return (cur); } static mblk_t * tcpsig_dump_one(tcpsig_sa_t *sa, sadb_msg_t *samsg) { size_t alloclen, addrsize, keysize; sadb_sa_t *assoc; sadb_msg_t *newsamsg; uint8_t *cur, *end; sadb_key_t *key; mblk_t *mp; alloclen = sizeof (sadb_msg_t) + sizeof (sadb_sa_t); switch (sa->ts_family) { case AF_INET: addrsize = roundup(sizeof (sin_t) + sizeof (sadb_address_t), sizeof (uint64_t)); break; case AF_INET6: addrsize = roundup(sizeof (sin6_t) + sizeof (sadb_address_t), sizeof (uint64_t)); break; } keysize = roundup(sizeof (sadb_key_t) + sa->ts_key.sak_keylen, sizeof (uint64_t)); alloclen += addrsize * 2 + keysize; mp = allocb(alloclen, BPRI_HI); if (mp == NULL) return (NULL); bzero(mp->b_rptr, alloclen); mp->b_wptr += alloclen; end = mp->b_wptr; newsamsg = (sadb_msg_t *)mp->b_rptr; *newsamsg = *samsg; newsamsg->sadb_msg_len = (uint16_t)SADB_8TO64(alloclen); assoc = (sadb_sa_t *)(newsamsg + 1); assoc->sadb_sa_exttype = SADB_EXT_SA; assoc->sadb_sa_len = SADB_8TO64(sizeof (*assoc)); assoc->sadb_sa_auth = sa->ts_key.sak_algid; assoc->sadb_sa_flags = SADB_X_SAFLAGS_TCPSIG; assoc->sadb_sa_state = IPSA_STATE_MATURE; cur = (uint8_t *)(assoc + 1); cur = tcpsig_make_addr_ext(cur, end, SADB_EXT_ADDRESS_SRC, sa->ts_family, &sa->ts_src); cur = tcpsig_make_addr_ext(cur, end, SADB_EXT_ADDRESS_DST, sa->ts_family, &sa->ts_dst); if (cur == NULL) return (NULL); key = (sadb_key_t *)cur; key->sadb_key_exttype = SADB_X_EXT_STR_AUTH; key->sadb_key_len = SADB_8TO64(keysize); key->sadb_key_bits = sa->ts_key.sak_keybits; key->sadb_key_reserved = 0; bcopy(sa->ts_key.sak_key, (uint8_t *)(key + 1), sa->ts_key.sak_keylen); return (mp); } static int tcpsig_sa_dump(keysock_t *ks, tcp_stack_t *tcps, sadb_msg_t *samsg, int *diag) { tcpsig_db_t *db; tcpsig_sa_t *sa; db = tcpsig_db(tcps); rw_enter(&db->td_lock, RW_READER); for (sa = list_head(&db->td_salist); sa != NULL; sa = list_next(&db->td_salist, sa)) { mblk_t *mp; mutex_enter(&sa->ts_lock); if (sa->ts_tombstoned) { mutex_exit(&sa->ts_lock); continue; } mutex_exit(&sa->ts_lock); mp = tcpsig_dump_one(sa, samsg); if (mp == NULL) { rw_exit(&db->td_lock); return (ENOMEM); } keysock_passup(mp, (sadb_msg_t *)mp->b_rptr, ks->keysock_serial, NULL, B_TRUE, ks->keysock_keystack); } rw_exit(&db->td_lock); /* A sequence number of 0 indicates the end of the list */ samsg->sadb_msg_seq = 0; return (0); } static int tcpsig_sa_delget(keysock_t *ks, tcp_stack_t *tcps, sadb_msg_t *samsg, sadb_ext_t **extv, int *diagp) { sadb_address_t *srcext, *dstext; struct sockaddr_storage *src, *dst; tcpsig_sa_t *sa; mblk_t *mp; srcext = (sadb_address_t *)extv[SADB_EXT_ADDRESS_SRC]; dstext = (sadb_address_t *)extv[SADB_EXT_ADDRESS_DST]; if (srcext == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_SRC; return (EINVAL); } if (dstext == NULL) { *diagp = SADB_X_DIAGNOSTIC_MISSING_DST; return (EINVAL); } src = (struct sockaddr_storage *)(srcext + 1); dst = (struct sockaddr_storage *)(dstext + 1); sa = tcpsig_sa_find(src, dst, tcps); if (sa == NULL) { *diagp = SADB_X_DIAGNOSTIC_PAIR_SA_NOTFOUND; return (ESRCH); } if (samsg->sadb_msg_type == SADB_GET) { mp = tcpsig_dump_one(sa, samsg); if (mp == NULL) return (ENOMEM); keysock_passup(mp, (sadb_msg_t *)mp->b_rptr, ks->keysock_serial, NULL, B_TRUE, ks->keysock_keystack); tcpsig_sa_rele(sa); return (0); } /* * Delete the entry. * At this point we still have a hold on the entry from the find call * above, so mark it as tombstoned and then release the hold. If * that causes the reference count to become 0, the entry will be * removed from the database. */ mutex_enter(&sa->ts_lock); sa->ts_tombstoned = true; mutex_exit(&sa->ts_lock); tcpsig_sa_rele(sa); return (0); } void tcpsig_sa_handler(keysock_t *ks, mblk_t *mp, sadb_msg_t *samsg, sadb_ext_t **extv) { keysock_stack_t *keystack = ks->keysock_keystack; netstack_t *nst = keystack->keystack_netstack; tcp_stack_t *tcps = nst->netstack_tcp; keysock_in_t *ksi = (keysock_in_t *)mp->b_rptr; int diag = SADB_X_DIAGNOSTIC_NONE; int error; switch (samsg->sadb_msg_type) { case SADB_ADD: error = tcpsig_sa_add(ks, tcps, ksi, extv, &diag); keysock_error(ks, mp, error, diag); break; case SADB_GET: case SADB_DELETE: error = tcpsig_sa_delget(ks, tcps, samsg, extv, &diag); keysock_error(ks, mp, error, diag); break; case SADB_FLUSH: error = tcpsig_sa_flush(ks, tcps, &diag); keysock_error(ks, mp, error, diag); break; case SADB_DUMP: error = tcpsig_sa_dump(ks, tcps, samsg, &diag); keysock_error(ks, mp, error, diag); break; default: keysock_error(ks, mp, EOPNOTSUPP, diag); break; } } static void tcpsig_pseudo_compute4(tcp_t *tcp, int tcplen, MD5_CTX *ctx, bool inbound) { struct ip_pseudo { struct in_addr ipp_src; struct in_addr ipp_dst; uint8_t ipp_pad; uint8_t ipp_proto; uint16_t ipp_len; } ipp; conn_t *connp = tcp->tcp_connp; if (inbound) { ipp.ipp_src.s_addr = connp->conn_faddr_v4; ipp.ipp_dst.s_addr = connp->conn_saddr_v4; } else { ipp.ipp_src.s_addr = connp->conn_saddr_v4; ipp.ipp_dst.s_addr = connp->conn_faddr_v4; } ipp.ipp_pad = 0; ipp.ipp_proto = IPPROTO_TCP; ipp.ipp_len = htons(tcplen); DTRACE_PROBE1(ipp4, struct ip_pseudo *, &ipp); MD5Update(ctx, (char *)&ipp, sizeof (ipp)); } static void tcpsig_pseudo_compute6(tcp_t *tcp, int tcplen, MD5_CTX *ctx, bool inbound) { struct ip6_pseudo { struct in6_addr ipp_src; struct in6_addr ipp_dst; uint32_t ipp_len; uint32_t ipp_nxt; } ip6p; conn_t *connp = tcp->tcp_connp; if (inbound) { ip6p.ipp_src = connp->conn_faddr_v6; ip6p.ipp_dst = connp->conn_saddr_v6; } else { ip6p.ipp_src = connp->conn_saddr_v6; ip6p.ipp_dst = connp->conn_faddr_v6; } ip6p.ipp_len = htonl(tcplen); ip6p.ipp_nxt = htonl(IPPROTO_TCP); DTRACE_PROBE1(ipp6, struct ip6_pseudo *, &ip6p); MD5Update(ctx, (char *)&ip6p, sizeof (ip6p)); } bool tcpsig_signature(mblk_t *mp, tcp_t *tcp, tcpha_t *tcpha, int tcplen, uint8_t *digest, bool inbound) { tcp_stack_t *tcps = tcp->tcp_tcps; conn_t *connp = tcp->tcp_connp; tcpsig_sa_t *sa; MD5_CTX context; /* * The TCP_MD5SIG option is 20 bytes, including padding, which adds 5 * 32-bit words to the header's 4-bit field. Check that it can fit in * the current packet. */ if (!inbound && (tcpha->tha_offset_and_reserved >> 4) > 10) { TCP_STAT(tcps, tcp_sig_no_space); return (false); } sa = inbound ? tcp->tcp_sig_sa_in : tcp->tcp_sig_sa_out; if (sa == NULL) { struct sockaddr_storage src, dst; bzero(&src, sizeof (src)); bzero(&dst, sizeof (dst)); if (connp->conn_ipversion == IPV6_VERSION) { sin6_t *sin6; sin6 = (sin6_t *)&src; sin6->sin6_family = AF_INET6; if (inbound) { sin6->sin6_addr = connp->conn_faddr_v6; sin6->sin6_port = connp->conn_fport; } else { sin6->sin6_addr = connp->conn_saddr_v6; sin6->sin6_port = connp->conn_lport; } sin6 = (sin6_t *)&dst; sin6->sin6_family = AF_INET6; if (inbound) { sin6->sin6_addr = connp->conn_saddr_v6; sin6->sin6_port = connp->conn_lport; } else { sin6->sin6_addr = connp->conn_faddr_v6; sin6->sin6_port = connp->conn_fport; } } else { sin_t *sin; sin = (sin_t *)&src; sin->sin_family = AF_INET; if (inbound) { sin->sin_addr.s_addr = connp->conn_faddr_v4; sin->sin_port = connp->conn_fport; } else { sin->sin_addr.s_addr = connp->conn_saddr_v4; sin->sin_port = connp->conn_lport; } sin = (sin_t *)&dst; sin->sin_family = AF_INET; if (inbound) { sin->sin_addr.s_addr = connp->conn_saddr_v4; sin->sin_port = connp->conn_lport; } else { sin->sin_addr.s_addr = connp->conn_faddr_v4; sin->sin_port = connp->conn_fport; } } sa = tcpsig_sa_find(&src, &dst, tcps); if (sa == NULL) { TCP_STAT(tcps, tcp_sig_match_failed); return (false); } /* * tcpsig_sa_find() returns a held SA, so we don't need to take * another one before adding it to tcp. */ if (inbound) tcp->tcp_sig_sa_in = sa; else tcp->tcp_sig_sa_out = sa; } VERIFY3U(sa->ts_key.sak_algid, ==, SADB_AALG_MD5); /* We have a key for this connection, generate the hash */ MD5Init(&context); /* TCP pseudo-header */ if (connp->conn_ipversion == IPV6_VERSION) tcpsig_pseudo_compute6(tcp, tcplen, &context, inbound); else tcpsig_pseudo_compute4(tcp, tcplen, &context, inbound); /* TCP header, excluding options and with a zero checksum */ uint16_t offset = tcpha->tha_offset_and_reserved; uint16_t sum = tcpha->tha_sum; if (!inbound) { /* Account for the MD5 option we are going to add */ tcpha->tha_offset_and_reserved += (5 << 4); } tcpha->tha_sum = 0; MD5Update(&context, tcpha, sizeof (*tcpha)); tcpha->tha_offset_and_reserved = offset; tcpha->tha_sum = sum; /* TCP segment data */ for (; mp != NULL; mp = mp->b_cont) MD5Update(&context, mp->b_rptr, mp->b_wptr - mp->b_rptr); /* Connection-specific key */ MD5Update(&context, sa->ts_key.sak_key, sa->ts_key.sak_keylen); MD5Final(digest, &context); return (true); } bool tcpsig_verify(mblk_t *mp, tcp_t *tcp, tcpha_t *tcpha, ip_recv_attr_t *ira, uint8_t *digest) { uint8_t calc_digest[MD5_DIGEST_LENGTH]; if (!tcpsig_signature(mp, tcp, tcpha, ira->ira_pktlen - ira->ira_ip_hdr_length, calc_digest, true)) { /* The appropriate stat will already have been bumped */ return (false); } if (bcmp(digest, calc_digest, sizeof (calc_digest)) != 0) { TCP_STAT(tcp->tcp_tcps, tcp_sig_verify_failed); return (false); } return (true); }