2019-07-01 01:07:58 +03:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-30 08:11:46 +03:00
|
|
|
package caddytls
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2020-03-07 09:15:25 +03:00
|
|
|
"fmt"
|
2019-05-30 08:11:46 +03:00
|
|
|
|
2020-03-07 09:15:25 +03:00
|
|
|
"github.com/caddyserver/certmagic"
|
2019-05-30 08:11:46 +03:00
|
|
|
"github.com/klauspost/cpuid"
|
|
|
|
)
|
|
|
|
|
2019-08-09 21:05:47 +03:00
|
|
|
// SupportedCipherSuites is the unordered map of cipher suite
|
2019-07-18 18:52:43 +03:00
|
|
|
// string names to their definition in crypto/tls. All values
|
|
|
|
// should be IANA-reserved names. See
|
|
|
|
// https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml
|
2019-08-09 21:05:47 +03:00
|
|
|
// Two of the cipher suite constants in the standard lib do not use the
|
|
|
|
// full IANA name, but we do; see:
|
|
|
|
// https://github.com/golang/go/issues/32061 and
|
|
|
|
// https://github.com/golang/go/issues/30325#issuecomment-512862374.
|
2019-07-18 18:52:43 +03:00
|
|
|
// TODO: might not be needed much longer: https://github.com/golang/go/issues/30325
|
2019-08-09 21:05:47 +03:00
|
|
|
var SupportedCipherSuites = map[string]uint16{
|
2019-07-18 18:52:43 +03:00
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256": tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
|
|
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256": tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
|
|
"TLS_RSA_WITH_AES_128_GCM_SHA256": tls.TLS_RSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
"TLS_RSA_WITH_AES_256_GCM_SHA384": tls.TLS_RSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
"TLS_RSA_WITH_AES_256_CBC_SHA": tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
"TLS_RSA_WITH_AES_128_CBC_SHA256": tls.TLS_RSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
"TLS_RSA_WITH_AES_128_CBC_SHA": tls.TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
"TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA": tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
"TLS_RSA_WITH_3DES_EDE_CBC_SHA": tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
2019-05-30 08:11:46 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// defaultCipherSuites is the ordered list of all the cipher
|
|
|
|
// suites we want to support by default, assuming AES-NI
|
|
|
|
// (hardware acceleration for AES).
|
|
|
|
var defaultCipherSuitesWithAESNI = []uint16{
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
|
|
}
|
|
|
|
|
|
|
|
// defaultCipherSuites is the ordered list of all the cipher
|
|
|
|
// suites we want to support by default, assuming lack of
|
|
|
|
// AES-NI (NO hardware acceleration for AES).
|
|
|
|
var defaultCipherSuitesWithoutAESNI = []uint16{
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
}
|
|
|
|
|
|
|
|
// getOptimalDefaultCipherSuites returns an appropriate cipher
|
|
|
|
// suite to use depending on the hardware support for AES.
|
|
|
|
//
|
2019-07-02 21:37:06 +03:00
|
|
|
// See https://github.com/caddyserver/caddy/issues/1674
|
2019-05-30 08:11:46 +03:00
|
|
|
func getOptimalDefaultCipherSuites() []uint16 {
|
|
|
|
if cpuid.CPU.AesNi() {
|
|
|
|
return defaultCipherSuitesWithAESNI
|
|
|
|
}
|
|
|
|
return defaultCipherSuitesWithoutAESNI
|
|
|
|
}
|
|
|
|
|
2019-08-09 21:05:47 +03:00
|
|
|
// SupportedCurves is the unordered map of supported curves.
|
2019-05-30 08:11:46 +03:00
|
|
|
// https://golang.org/pkg/crypto/tls/#CurveID
|
2019-08-09 21:05:47 +03:00
|
|
|
var SupportedCurves = map[string]tls.CurveID{
|
|
|
|
// TODO: Use IANA names, probably? see https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8
|
|
|
|
// All named crypto/elliptic curves have secpXXXr1 IANA names.
|
|
|
|
"x25519": tls.X25519, // x25519, 29
|
|
|
|
"p256": tls.CurveP256, // secp256r1, 23
|
|
|
|
"p384": tls.CurveP384, // secp384r1, 24
|
|
|
|
"p521": tls.CurveP521, // secp521r1, 25
|
2019-05-30 08:11:46 +03:00
|
|
|
}
|
|
|
|
|
2019-07-18 18:52:43 +03:00
|
|
|
// supportedCertKeyTypes is all the key types that are supported
|
|
|
|
// for certificates that are obtained through ACME.
|
2020-03-07 09:15:25 +03:00
|
|
|
var supportedCertKeyTypes = map[string]certmagic.KeyType{
|
|
|
|
"rsa2048": certmagic.RSA2048,
|
|
|
|
"rsa4096": certmagic.RSA4096,
|
|
|
|
"p256": certmagic.P256,
|
|
|
|
"p384": certmagic.P384,
|
|
|
|
"ed25519": certmagic.ED25519,
|
2019-07-18 18:52:43 +03:00
|
|
|
}
|
|
|
|
|
2019-05-30 08:11:46 +03:00
|
|
|
// defaultCurves is the list of only the curves we want to use
|
|
|
|
// by default, in descending order of preference.
|
|
|
|
//
|
|
|
|
// This list should only include curves which are fast by design
|
|
|
|
// (e.g. X25519) and those for which an optimized assembly
|
|
|
|
// implementation exists (e.g. P256). The latter ones can be
|
|
|
|
// found here:
|
|
|
|
// https://github.com/golang/go/tree/master/src/crypto/elliptic
|
|
|
|
var defaultCurves = []tls.CurveID{
|
|
|
|
tls.X25519,
|
|
|
|
tls.CurveP256,
|
|
|
|
}
|
|
|
|
|
2019-08-09 21:05:47 +03:00
|
|
|
// SupportedProtocols is a map of supported protocols.
|
|
|
|
var SupportedProtocols = map[string]uint16{
|
2019-05-30 08:11:46 +03:00
|
|
|
"tls1.2": tls.VersionTLS12,
|
|
|
|
"tls1.3": tls.VersionTLS13,
|
|
|
|
}
|
|
|
|
|
2020-03-07 09:15:25 +03:00
|
|
|
// unsupportedProtocols is a map of unsupported protocols.
|
|
|
|
// Used for logging only, not enforcement.
|
|
|
|
var unsupportedProtocols = map[string]uint16{
|
|
|
|
"ssl3.0": tls.VersionSSL30,
|
|
|
|
"tls1.0": tls.VersionTLS10,
|
|
|
|
"tls1.1": tls.VersionTLS11,
|
|
|
|
}
|
|
|
|
|
2019-05-30 08:11:46 +03:00
|
|
|
// publicKeyAlgorithms is the map of supported public key algorithms.
|
|
|
|
var publicKeyAlgorithms = map[string]x509.PublicKeyAlgorithm{
|
|
|
|
"rsa": x509.RSA,
|
|
|
|
"dsa": x509.DSA,
|
|
|
|
"ecdsa": x509.ECDSA,
|
|
|
|
}
|
2020-03-07 09:15:25 +03:00
|
|
|
|
|
|
|
// ProtocolName returns the standard name for the passed protocol version ID
|
|
|
|
// (e.g. "TLS1.3") or a fallback representation of the ID value if the version
|
|
|
|
// is not supported.
|
|
|
|
func ProtocolName(id uint16) string {
|
|
|
|
for k, v := range SupportedProtocols {
|
|
|
|
if v == id {
|
|
|
|
return k
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for k, v := range unsupportedProtocols {
|
|
|
|
if v == id {
|
|
|
|
return k
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Sprintf("0x%04x", id)
|
|
|
|
}
|