/src/botan/src/fuzzer/tls_server.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * (C) 2015,2016 Jack Lloyd |
3 | | * |
4 | | * Botan is released under the Simplified BSD License (see license.txt) |
5 | | */ |
6 | | |
7 | | #include "fuzzers.h" |
8 | | |
9 | | #include <botan/data_src.h> |
10 | | #include <botan/hex.h> |
11 | | #include <botan/pkcs8.h> |
12 | | #include <botan/tls_server.h> |
13 | | #include <botan/tls_session_manager_noop.h> |
14 | | |
15 | | #include <memory> |
16 | | |
17 | | namespace { |
18 | | |
19 | | const char* const fixed_rsa_key = |
20 | | "-----BEGIN PRIVATE KEY-----\n" |
21 | | "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCe6qqpMQVJ7zCJ\n" |
22 | | "oSnpxia0yO6M7Ie3FGqPcd0DzueC+kWPvuHQ+PpP5vfO6qqRaDVII37PFX5NUZQm\n" |
23 | | "GK/rAm7spjIHTCMgqSZ8pN13LU8m1gDwIdu9al16LXN9zZjB67uLlFn2trtLi234\n" |
24 | | "i0cnyeF8IC0cz7tgCOzMSVEBcqJjkdgGrZ3WUgOXecVm2lXVrYlEiaSxFp4VOE9k\n" |
25 | | "RFeVrELCjmNtc4hRd1yJsF+vObCtvyqGYQE1Qcb0MVSQDBHMkiUVmO6zuW7td5ef\n" |
26 | | "O/1OyntQJGyVa+SnWbkSLCybta2J7MreHENrF5GA0K1KL140SNRHeWifRMuNQua7\n" |
27 | | "qmKXMBTFAgMBAAECggEAIk3fxyQI0zvpy1vZ01ft1QqmzA7nAPNMSWi33/GS8iga\n" |
28 | | "SfxXfKeySPs/tQ/dAARxs//NiOBH4mLgyxR7LQzaawU5OXALCSraXv+ruuUx990s\n" |
29 | | "WKnGaG4EfbJAAwEVn47Gbkv425P4fEc91vAhzQn8PbIoatbAyOtESpjs/pYDTeC/\n" |
30 | | "mnJId8gqO90cqyRECEMjk9sQ8iEjWPlik4ayGlUVbeeMu6/pJ9F8IZEgkLZiNDAB\n" |
31 | | "4anmOFaT7EmqUjI4IlcaqfbbXyDXlvWUYukidEss+CNvPuqbQHBDnpFVvBxdDR2N\n" |
32 | | "Uj2D5Xd5blcIe2/+1IVRnznjoQ5zvutzb7ThBmMehQKBgQDOITKG0ht2kXLxjVoR\n" |
33 | | "r/pVpx+f3hs3H7wE0+vrLHoQgkVjpMWXQ47YuZTT9rCOOYNI2cMoH2D27t1j78/B\n" |
34 | | "9kGYABUVpvQQ+6amqJDI1eYI6e68TPueEDjeALfSCdmPNiI3lZZrCIK9XLpkoy8K\n" |
35 | | "tGYBRRJ+JJxjj1zPXj9SGshPgwKBgQDFXUtoxY3mCStH3+0b1qxGG9r1L5goHEmd\n" |
36 | | "Am8WBYDheNpL0VqPNzouhuM/ZWMGyyAs/py6aLATe+qhR1uX5vn7LVZwjCSONZ4j\n" |
37 | | "7ieEEUh1BHetPI1oI5PxgokRYfVuckotqVseanI/536Er3Yf2FXNQ1/ceVp9WykX\n" |
38 | | "3mYTKMhQFwKBgQDKakcXpZNaZ5IcKdZcsBZ/rdGcR5sqEnursf9lvRNQytwg8Vkn\n" |
39 | | "JSxNHlBLpV/TCh8lltHRwJ6TXhUBYij+KzhWbx5FWOErHDOWTMmArqtp7W6GcoJT\n" |
40 | | "wVJWjxXzp8CApYQMWVSQXpckJL7UvHohZO0WKiHyxTjde5aD++TqV2qEyQKBgBbD\n" |
41 | | "jvoTpy08K4DLxCZs2Uvw1I1pIuylbpwsdrGciuP2s38BM6fHH+/T4Qwj3osfDKQD\n" |
42 | | "7gHWJ1Dn/wUBHQBlRLoC3bB3iZPZfVb5lhc2gxv0GvWhQVIcoGi/vJ2DpfJKPmIL\n" |
43 | | "4ZWdg3X5dm9JaZ98rVDSj5D3ckd5J0E4hp95GbmbAoGBAJJHM4O9lx60tIjw9Sf/\n" |
44 | | "QmKWyUk0NLnt8DcgRMW7fVxtzPNDy9DBKGIkDdWZ2s+ForICA3C9WSxBC1EOEHGG\n" |
45 | | "xkg2xKt66CeutGroP6M191mHQrRClt1VbEYzQFX21BCk5kig9i/BURyoTHtFiV+t\n" |
46 | | "kbf4VLg8Vk9u/R3RU1HsYWhe\n" |
47 | | "-----END PRIVATE KEY-----\n"; |
48 | | |
49 | | const char* const fixed_rsa_cert = |
50 | | "-----BEGIN CERTIFICATE-----\n" |
51 | | "MIIDUDCCAjgCCQD7pIb1ZsoafjANBgkqhkiG9w0BAQsFADBqMQswCQYDVQQGEwJW\n" |
52 | | "VDEQMA4GA1UECAwHVmVybW9udDEWMBQGA1UEBwwNVGhlIEludGVybmV0czEUMBIG\n" |
53 | | "A1UECgwLTWFuZ29zIFIgVXMxGzAZBgNVBAMMEnNlcnZlci5leGFtcGxlLmNvbTAe\n" |
54 | | "Fw0xNjAxMDYxNzQ3MjNaFw0yNjAxMDMxNzQ3MjNaMGoxCzAJBgNVBAYTAlZUMRAw\n" |
55 | | "DgYDVQQIDAdWZXJtb250MRYwFAYDVQQHDA1UaGUgSW50ZXJuZXRzMRQwEgYDVQQK\n" |
56 | | "DAtNYW5nb3MgUiBVczEbMBkGA1UEAwwSc2VydmVyLmV4YW1wbGUuY29tMIIBIjAN\n" |
57 | | "BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnuqqqTEFSe8wiaEp6cYmtMjujOyH\n" |
58 | | "txRqj3HdA87ngvpFj77h0Pj6T+b3zuqqkWg1SCN+zxV+TVGUJhiv6wJu7KYyB0wj\n" |
59 | | "IKkmfKTddy1PJtYA8CHbvWpdei1zfc2Yweu7i5RZ9ra7S4tt+ItHJ8nhfCAtHM+7\n" |
60 | | "YAjszElRAXKiY5HYBq2d1lIDl3nFZtpV1a2JRImksRaeFThPZERXlaxCwo5jbXOI\n" |
61 | | "UXdcibBfrzmwrb8qhmEBNUHG9DFUkAwRzJIlFZjus7lu7XeXnzv9Tsp7UCRslWvk\n" |
62 | | "p1m5Eiwsm7WtiezK3hxDaxeRgNCtSi9eNEjUR3lon0TLjULmu6pilzAUxQIDAQAB\n" |
63 | | "MA0GCSqGSIb3DQEBCwUAA4IBAQA1eZGc/4V7z/E/6eG0hVkzoAZeuTcSP7WqBSx+\n" |
64 | | "OP2yh0163UYjoa6nehmkKYQQ9PbYPZGzIcl+dBFyYzy6jcp0NdtzpWnTFrjl4rMq\n" |
65 | | "akcQ1D0LTYjJXVP9G/vF/SvatOFeVTnQmLlLt/a8ZtRUINqejeZZPzH8ifzFW6tu\n" |
66 | | "mlhTVIEKyPHpxClh5Y3ubw/mZYygekFTqMkTx3FwJxKU8J6rYGZxanWAODUIvCUo\n" |
67 | | "Fxer1qC5Love3uWl3vXPLEZWZdORnExSRByzz2immBP2vX4zYZoeZRhTQ9ae1TIV\n" |
68 | | "Dk02a/1AOJZdZReDbgXhlqaUx5pk/rzo4mDzvu5HSCeXmClz\n" |
69 | | "-----END CERTIFICATE-----\n"; |
70 | | |
71 | | class Fuzzer_TLS_Server_Creds : public Botan::Credentials_Manager { |
72 | | public: |
73 | 5.85k | Fuzzer_TLS_Server_Creds() { |
74 | 5.85k | Botan::DataSource_Memory cert_in(fixed_rsa_cert); |
75 | 5.85k | m_rsa_cert = std::make_unique<Botan::X509_Certificate>(cert_in); |
76 | | |
77 | 5.85k | Botan::DataSource_Memory key_in(fixed_rsa_key); |
78 | 5.85k | m_rsa_key.reset(Botan::PKCS8::load_key(key_in).release()); |
79 | 5.85k | } |
80 | | |
81 | | std::vector<Botan::X509_Certificate> cert_chain( |
82 | | const std::vector<std::string>& algos, |
83 | | const std::vector<Botan::AlgorithmIdentifier>& /*signature_schemes*/, |
84 | | const std::string& /*type*/, |
85 | 63.6k | const std::string& /*hostname*/) override { |
86 | 63.6k | std::vector<Botan::X509_Certificate> v; |
87 | | |
88 | 63.6k | for(const auto& algo : algos) { |
89 | 63.6k | if(algo == "RSA") { |
90 | 21.2k | v.push_back(*m_rsa_cert); |
91 | 21.2k | break; |
92 | 21.2k | } |
93 | 63.6k | } |
94 | | |
95 | 63.6k | return v; |
96 | 63.6k | } |
97 | | |
98 | | std::shared_ptr<Botan::Private_Key> private_key_for(const Botan::X509_Certificate& /*cert*/, |
99 | | const std::string& type, |
100 | 186 | const std::string& /*context*/) override { |
101 | 186 | if(type == "RSA") { |
102 | 0 | return m_rsa_key; |
103 | 0 | } |
104 | 186 | return nullptr; |
105 | 186 | } |
106 | | |
107 | 93 | Botan::secure_vector<uint8_t> session_ticket_key() override { |
108 | 93 | return Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899"); |
109 | 93 | } |
110 | | |
111 | 4.04k | Botan::secure_vector<uint8_t> dtls_cookie_secret() override { |
112 | 4.04k | return Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899"); |
113 | 4.04k | } |
114 | | |
115 | 20.8k | std::string psk_identity_hint(const std::string&, const std::string&) override { return "psk_hint"; } |
116 | | |
117 | 0 | std::string psk_identity(const std::string&, const std::string&, const std::string&) override { return "psk_id"; } |
118 | | |
119 | | std::vector<Botan::TLS::ExternalPSK> find_preshared_keys( |
120 | | std::string_view host, |
121 | | Botan::TLS::Connection_Side whoami, |
122 | | const std::vector<std::string>& identities = {}, |
123 | 14.4k | const std::optional<std::string>& prf = std::nullopt) override { |
124 | 14.4k | if(!identities.empty() && std::find(identities.begin(), identities.end(), "psk_id") == identities.end()) { |
125 | 103 | return Botan::Credentials_Manager::find_preshared_keys(host, whoami, identities, prf); |
126 | 103 | } |
127 | | |
128 | 14.3k | std::vector<Botan::TLS::ExternalPSK> psks; |
129 | 14.3k | psks.emplace_back("psk_id", "SHA-256", Botan::hex_decode_locked("AABBCCDDEEFF00112233445566778899")); |
130 | 14.3k | return psks; |
131 | 14.4k | } |
132 | | |
133 | | private: |
134 | | std::unique_ptr<Botan::X509_Certificate> m_rsa_cert; |
135 | | std::shared_ptr<Botan::Private_Key> m_rsa_key; |
136 | | }; |
137 | | |
138 | | class Fuzzer_TLS_Policy : public Botan::TLS::Policy { |
139 | | public: |
140 | | // TODO: Enable this once the TLS 1.3 server implementation is ready. |
141 | | // Maybe even build individual fuzz targets for different versions. |
142 | 25.9k | bool allow_tls13() const override { return false; } |
143 | | |
144 | 21.2k | std::vector<uint16_t> ciphersuite_list(Botan::TLS::Protocol_Version) const override { |
145 | 21.2k | std::vector<uint16_t> ciphersuites; |
146 | | |
147 | 1.99M | for(auto&& suite : Botan::TLS::Ciphersuite::all_known_ciphersuites()) { |
148 | 1.99M | if(suite.valid()) { |
149 | 1.99M | ciphersuites.push_back(suite.ciphersuite_code()); |
150 | 1.99M | } |
151 | 1.99M | } |
152 | | |
153 | 21.2k | return ciphersuites; |
154 | 21.2k | } |
155 | | }; |
156 | | |
157 | | class Fuzzer_TLS_Server_Callbacks : public Botan::TLS::Callbacks { |
158 | | public: |
159 | 70.3k | void tls_emit_data(std::span<const uint8_t>) override { |
160 | | // discard |
161 | 70.3k | } |
162 | | |
163 | 0 | void tls_record_received(uint64_t, std::span<const uint8_t>) override { |
164 | | // ignore peer data |
165 | 0 | } |
166 | | |
167 | 20.2k | void tls_alert(Botan::TLS::Alert) override { |
168 | | // ignore alert |
169 | 20.2k | } |
170 | | |
171 | 1.53k | std::string tls_server_choose_app_protocol(const std::vector<std::string>& client_protos) override { |
172 | 1.53k | if(client_protos.size() > 1) { |
173 | 121 | return client_protos[0]; |
174 | 1.41k | } else { |
175 | 1.41k | return "fuzzy"; |
176 | 1.41k | } |
177 | 1.53k | } |
178 | | |
179 | | void tls_verify_cert_chain(const std::vector<Botan::X509_Certificate>& cert_chain, |
180 | | const std::vector<std::optional<Botan::OCSP::Response>>& ocsp_responses, |
181 | | const std::vector<Botan::Certificate_Store*>& trusted_roots, |
182 | | Botan::Usage_Type usage, |
183 | | std::string_view hostname, |
184 | 0 | const Botan::TLS::Policy& policy) override { |
185 | 0 | try { |
186 | | // try to validate to exercise those code paths |
187 | 0 | Botan::TLS::Callbacks::tls_verify_cert_chain( |
188 | 0 | cert_chain, ocsp_responses, trusted_roots, usage, hostname, policy); |
189 | 0 | } catch(...) { |
190 | | // ignore validation result |
191 | 0 | } |
192 | 0 | } |
193 | | }; |
194 | | |
195 | | } // namespace |
196 | | |
197 | 5.85k | void fuzz(const uint8_t in[], size_t len) { |
198 | 5.85k | if(len <= 1) { |
199 | 1 | return; |
200 | 1 | } |
201 | | |
202 | 5.85k | auto session_manager = std::make_shared<Botan::TLS::Session_Manager_Noop>(); |
203 | 5.85k | auto policy = std::make_shared<Fuzzer_TLS_Policy>(); |
204 | 5.85k | Botan::TLS::Server_Information info("server.name", 443); |
205 | 5.85k | auto creds = std::make_shared<Fuzzer_TLS_Server_Creds>(); |
206 | 5.85k | auto callbacks = std::make_shared<Fuzzer_TLS_Server_Callbacks>(); |
207 | | |
208 | 5.85k | const bool is_datagram = in[0] & 1; |
209 | | |
210 | 5.85k | Botan::TLS::Server server(callbacks, session_manager, creds, policy, fuzzer_rng_as_shared(), is_datagram); |
211 | | |
212 | 5.85k | try { |
213 | 5.85k | server.received_data(in + 1, len - 1); |
214 | 5.85k | } catch(std::exception& e) {} |
215 | 5.85k | } |