Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/net Implement sliding window for wireguard replay detect...
details: https://anonhg.NetBSD.org/src/rev/fc5ec339a473
branches: trunk
changeset: 975040:fc5ec339a473
user: riastradh <riastradh%NetBSD.org@localhost>
date: Thu Aug 20 21:31:36 2020 +0000
description:
Implement sliding window for wireguard replay detection.
diffstat:
sys/net/if_wg.c | 121 ++++++++++++++++++++++++++++++++++++++++++++++++++-----
1 files changed, 109 insertions(+), 12 deletions(-)
diffs (197 lines):
diff -r fe8fc8ad671f -r fc5ec339a473 sys/net/if_wg.c
--- a/sys/net/if_wg.c Thu Aug 20 21:31:26 2020 +0000
+++ b/sys/net/if_wg.c Thu Aug 20 21:31:36 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: if_wg.c,v 1.5 2020/08/20 21:31:16 riastradh Exp $ */
+/* $NetBSD: if_wg.c,v 1.6 2020/08/20 21:31:36 riastradh Exp $ */
/*
* Copyright (C) Ryota Ozaki <ozaki.ryota%gmail.com@localhost>
@@ -43,7 +43,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: if_wg.c,v 1.5 2020/08/20 21:31:16 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: if_wg.c,v 1.6 2020/08/20 21:31:36 riastradh Exp $");
#ifdef _KERNEL_OPT
#include "opt_inet.h"
@@ -337,6 +337,82 @@
#define WG_MSG_TYPE_DATA 4
#define WG_MSG_TYPE_MAX WG_MSG_TYPE_DATA
+/* Sliding windows */
+
+#define SLIWIN_BITS 2048u
+#define SLIWIN_TYPE uint32_t
+#define SLIWIN_BPW NBBY*sizeof(SLIWIN_TYPE)
+#define SLIWIN_WORDS howmany(SLIWIN_BITS, SLIWIN_BPW)
+#define SLIWIN_NPKT (SLIWIN_BITS - NBBY*sizeof(SLIWIN_TYPE))
+
+struct sliwin {
+ SLIWIN_TYPE B[SLIWIN_WORDS];
+ uint64_t T;
+};
+
+static void
+sliwin_reset(struct sliwin *W)
+{
+
+ memset(W, 0, sizeof(*W));
+}
+
+static int
+sliwin_check_fast(const volatile struct sliwin *W, uint64_t S)
+{
+
+ /*
+ * If it's more than one window older than the highest sequence
+ * number we've seen, reject.
+ */
+ if (S + SLIWIN_NPKT < atomic_load_relaxed(&W->T))
+ return EAUTH;
+
+ /*
+ * Otherwise, we need to take the lock to decide, so don't
+ * reject just yet. Caller must serialize a call to
+ * sliwin_update in this case.
+ */
+ return 0;
+}
+
+static int
+sliwin_update(struct sliwin *W, uint64_t S)
+{
+ unsigned word, bit;
+
+ /*
+ * If it's more than one window older than the highest sequence
+ * number we've seen, reject.
+ */
+ if (S + SLIWIN_NPKT < W->T)
+ return EAUTH;
+
+ /*
+ * If it's higher than the highest sequence number we've seen,
+ * advance the window.
+ */
+ if (S > W->T) {
+ uint64_t i = W->T / SLIWIN_BPW;
+ uint64_t j = S / SLIWIN_BPW;
+ unsigned k;
+
+ for (k = 0; k < MIN(j - i, SLIWIN_WORDS); k++)
+ W->B[(i + k + 1) % SLIWIN_WORDS] = 0;
+ atomic_store_relaxed(&W->T, S);
+ }
+
+ /* Test and set the bit -- if already set, reject. */
+ word = (S / SLIWIN_BPW) % SLIWIN_WORDS;
+ bit = S % SLIWIN_BPW;
+ if (W->B[word] & (1UL << bit))
+ return EAUTH;
+ W->B[word] |= 1UL << bit;
+
+ /* Accept! */
+ return 0;
+}
+
struct wg_worker {
kmutex_t wgw_lock;
kcondvar_t wgw_cv;
@@ -370,8 +446,11 @@
uint32_t wgs_receiver_index;
volatile uint64_t
wgs_send_counter;
- volatile uint64_t
- wgs_recv_counter;
+
+ struct {
+ kmutex_t lock;
+ struct sliwin window;
+ } *wgs_recvwin;
uint8_t wgs_handshake_hash[WG_HASH_LEN];
uint8_t wgs_chaining_key[WG_CHAINING_KEY_LEN];
@@ -1942,7 +2021,7 @@
{
wgs->wgs_send_counter = 0;
- wgs->wgs_recv_counter = 0;
+ sliwin_reset(&wgs->wgs_recvwin->window);
#define wgs_clear(v) explicit_memset(wgs->wgs_##v, 0, sizeof(wgs->wgs_##v))
wgs_clear(handshake_hash);
@@ -2231,6 +2310,15 @@
}
wgp = wgs->wgs_peer;
+ error = sliwin_check_fast(&wgs->wgs_recvwin->window,
+ wgmd->wgmd_counter);
+ if (error) {
+ WG_LOG_RATECHECK(&wgp->wgp_ppsratecheck, LOG_DEBUG,
+ "out-of-window packet: %"PRIu64"\n",
+ wgmd->wgmd_counter);
+ goto out;
+ }
+
mlen = m_length(m);
encrypted_len = mlen - sizeof(*wgmd);
@@ -2281,17 +2369,17 @@
}
WG_DLOG("outsize=%u\n", (u_int)decrypted_len);
- /* TODO deal with reordering with a sliding window */
- if (wgs->wgs_recv_counter != 0 &&
- wgmd->wgmd_counter <= wgs->wgs_recv_counter) {
+ mutex_enter(&wgs->wgs_recvwin->lock);
+ error = sliwin_update(&wgs->wgs_recvwin->window,
+ wgmd->wgmd_counter);
+ mutex_exit(&wgs->wgs_recvwin->lock);
+ if (error) {
WG_LOG_RATECHECK(&wgp->wgp_ppsratecheck, LOG_DEBUG,
- "wgmd_counter is equal to or smaller than wgs_recv_counter:"
- " %"PRIu64" <= %"PRIu64"\n", wgmd->wgmd_counter,
- wgs->wgs_recv_counter);
+ "replay or out-of-window packet: %"PRIu64"\n",
+ wgmd->wgmd_counter);
m_freem(n);
goto out;
}
- wgs->wgs_recv_counter = wgmd->wgmd_counter;
m_freem(m);
m = NULL;
@@ -3020,11 +3108,16 @@
wgs->wgs_state = WGS_STATE_UNKNOWN;
psref_target_init(&wgs->wgs_psref, wg_psref_class);
wgs->wgs_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE);
+ wgs->wgs_recvwin = kmem_zalloc(sizeof(*wgs->wgs_recvwin), KM_SLEEP);
+ mutex_init(&wgs->wgs_recvwin->lock, MUTEX_DEFAULT, IPL_NONE);
+
wgs = wgp->wgp_session_unstable;
wgs->wgs_peer = wgp;
wgs->wgs_state = WGS_STATE_UNKNOWN;
psref_target_init(&wgs->wgs_psref, wg_psref_class);
wgs->wgs_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE);
+ wgs->wgs_recvwin = kmem_zalloc(sizeof(*wgs->wgs_recvwin), KM_SLEEP);
+ mutex_init(&wgs->wgs_recvwin->lock, MUTEX_DEFAULT, IPL_NONE);
return wgp;
}
@@ -3061,10 +3154,14 @@
wgs = wgp->wgp_session_unstable;
psref_target_destroy(&wgs->wgs_psref, wg_psref_class);
mutex_obj_free(wgs->wgs_lock);
+ mutex_destroy(&wgs->wgs_recvwin->lock);
+ kmem_free(wgs->wgs_recvwin, sizeof(*wgs->wgs_recvwin));
kmem_free(wgs, sizeof(*wgs));
wgs = wgp->wgp_session_stable;
psref_target_destroy(&wgs->wgs_psref, wg_psref_class);
mutex_obj_free(wgs->wgs_lock);
+ mutex_destroy(&wgs->wgs_recvwin->lock);
+ kmem_free(wgs->wgs_recvwin, sizeof(*wgs->wgs_recvwin));
kmem_free(wgs, sizeof(*wgs));
psref_target_destroy(&wgp->wgp_endpoint->wgsa_psref, wg_psref_class);
Home |
Main Index |
Thread Index |
Old Index