|
| 1 | +/* |
| 2 | + * Copyright 2019 The Netty Project |
| 3 | + * |
| 4 | + * The Netty Project licenses this file to you under the Apache License, |
| 5 | + * version 2.0 (the "License"); you may not use this file except in compliance |
| 6 | + * with the License. You may obtain a copy of the License at: |
| 7 | + * |
| 8 | + * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | + * |
| 10 | + * Unless required by applicable law or agreed to in writing, software |
| 11 | + * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 12 | + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 13 | + * License for the specific language governing permissions and limitations |
| 14 | + * under the License. |
| 15 | + */ |
| 16 | +package io.netty.handler.ssl; |
| 17 | + |
| 18 | +import io.netty.buffer.ByteBufUtil; |
| 19 | +import io.netty.channel.ChannelHandlerContext; |
| 20 | +import io.netty.channel.ChannelInboundHandlerAdapter; |
| 21 | +import io.netty.internal.tcnative.SSL; |
| 22 | +import io.netty.util.internal.ReflectionUtil; |
| 23 | +import io.netty.util.internal.SystemPropertyUtil; |
| 24 | +import io.netty.util.internal.logging.InternalLogger; |
| 25 | +import io.netty.util.internal.logging.InternalLoggerFactory; |
| 26 | + |
| 27 | +import javax.crypto.SecretKey; |
| 28 | +import javax.crypto.spec.SecretKeySpec; |
| 29 | +import javax.net.ssl.SSLEngine; |
| 30 | +import javax.net.ssl.SSLSession; |
| 31 | +import java.lang.reflect.Field; |
| 32 | + |
| 33 | +/** |
| 34 | + * The {@link SslMasterKeyHandler} is a channel-handler you can include in your pipeline to consume the master key |
| 35 | + * & session identifier for a TLS session. |
| 36 | + * This can be very useful, for instance the {@link WiresharkSslMasterKeyHandler} implementation will |
| 37 | + * log the secret & identifier in a format that is consumable by Wireshark -- allowing easy decryption of pcap/tcpdumps. |
| 38 | + */ |
| 39 | +public abstract class SslMasterKeyHandler extends ChannelInboundHandlerAdapter { |
| 40 | + |
| 41 | + private static final InternalLogger logger = InternalLoggerFactory.getInstance(SslMasterKeyHandler.class); |
| 42 | + |
| 43 | + /** |
| 44 | + * The JRE SSLSessionImpl cannot be imported |
| 45 | + */ |
| 46 | + private static final Class<?> SSL_SESSIONIMPL_CLASS; |
| 47 | + |
| 48 | + /** |
| 49 | + * The master key field in the SSLSessionImpl |
| 50 | + */ |
| 51 | + private static final Field SSL_SESSIONIMPL_MASTER_SECRET_FIELD; |
| 52 | + |
| 53 | + /** |
| 54 | + * A system property that can be used to turn on/off the {@link SslMasterKeyHandler} dynamically without having |
| 55 | + * to edit your pipeline. |
| 56 | + * <code>-Dio.netty.ssl.masterKeyHandler=true</code> |
| 57 | + */ |
| 58 | + public static final String SYSTEM_PROP_KEY = "io.netty.ssl.masterKeyHandler"; |
| 59 | + |
| 60 | + /** |
| 61 | + * The unavailability cause of whether the private Sun implementation of SSLSessionImpl is available. |
| 62 | + */ |
| 63 | + private static final Throwable UNAVAILABILITY_CAUSE; |
| 64 | + |
| 65 | + static { |
| 66 | + Throwable cause = null; |
| 67 | + Class<?> clazz = null; |
| 68 | + Field field = null; |
| 69 | + try { |
| 70 | + clazz = Class.forName("sun.security.ssl.SSLSessionImpl"); |
| 71 | + field = clazz.getDeclaredField("masterSecret"); |
| 72 | + cause = ReflectionUtil.trySetAccessible(field, true); |
| 73 | + } catch (Throwable e) { |
| 74 | + cause = e; |
| 75 | + logger.debug("sun.security.ssl.SSLSessionImpl is unavailable.", e); |
| 76 | + } |
| 77 | + UNAVAILABILITY_CAUSE = cause; |
| 78 | + SSL_SESSIONIMPL_CLASS = clazz; |
| 79 | + SSL_SESSIONIMPL_MASTER_SECRET_FIELD = field; |
| 80 | + } |
| 81 | + |
| 82 | + /** |
| 83 | + * Constructor. |
| 84 | + */ |
| 85 | + protected SslMasterKeyHandler() { |
| 86 | + } |
| 87 | + |
| 88 | + /** |
| 89 | + * Ensure that SSLSessionImpl is available. |
| 90 | + * @throws UnsatisfiedLinkError if unavailable |
| 91 | + */ |
| 92 | + public static void ensureSunSslEngineAvailability() { |
| 93 | + if (UNAVAILABILITY_CAUSE != null) { |
| 94 | + throw new IllegalStateException( |
| 95 | + "Failed to find SSLSessionImpl on classpath", UNAVAILABILITY_CAUSE); |
| 96 | + } |
| 97 | + } |
| 98 | + |
| 99 | + /** |
| 100 | + * Returns the cause of unavailability. |
| 101 | + * |
| 102 | + * @return the cause if unavailable. {@code null} if available. |
| 103 | + */ |
| 104 | + public static Throwable sunSslEngineUnavailabilityCause() { |
| 105 | + return UNAVAILABILITY_CAUSE; |
| 106 | + } |
| 107 | + |
| 108 | + /* Returns {@code true} if and only if sun.security.ssl.SSLSessionImpl exists in the runtime. |
| 109 | + */ |
| 110 | + public static boolean isSunSslEngineAvailable() { |
| 111 | + return UNAVAILABILITY_CAUSE == null; |
| 112 | + } |
| 113 | + |
| 114 | + /** |
| 115 | + * Consume the master key for the session and the sessionId |
| 116 | + * @param masterKey A 48-byte secret shared between the client and server. |
| 117 | + * @param session The current TLS session |
| 118 | + */ |
| 119 | + protected abstract void accept(SecretKey masterKey, SSLSession session); |
| 120 | + |
| 121 | + @Override |
| 122 | + public final void userEventTriggered(ChannelHandlerContext ctx, Object evt) { |
| 123 | + //only try to log the session info if the ssl handshake has successfully completed. |
| 124 | + if (evt == SslHandshakeCompletionEvent.SUCCESS) { |
| 125 | + boolean shouldHandle = SystemPropertyUtil.getBoolean(SYSTEM_PROP_KEY, false); |
| 126 | + |
| 127 | + if (shouldHandle) { |
| 128 | + final SslHandler handler = ctx.pipeline().get(SslHandler.class); |
| 129 | + final SSLEngine engine = handler.engine(); |
| 130 | + final SSLSession sslSession = engine.getSession(); |
| 131 | + |
| 132 | + //the OpenJDK does not expose a way to get the master secret, so try to use reflection to get it. |
| 133 | + if (isSunSslEngineAvailable() && sslSession.getClass().equals(SSL_SESSIONIMPL_CLASS)) { |
| 134 | + final SecretKey secretKey; |
| 135 | + try { |
| 136 | + secretKey = (SecretKey) SSL_SESSIONIMPL_MASTER_SECRET_FIELD.get(sslSession); |
| 137 | + } catch (IllegalAccessException e) { |
| 138 | + throw new IllegalArgumentException("Failed to access the field 'masterSecret' " + |
| 139 | + "via reflection.", e); |
| 140 | + } |
| 141 | + accept(secretKey, sslSession); |
| 142 | + } else if (OpenSsl.isAvailable() && engine instanceof ReferenceCountedOpenSslEngine) { |
| 143 | + SecretKeySpec secretKey = new SecretKeySpec( |
| 144 | + SSL.getMasterKey(((ReferenceCountedOpenSslEngine) engine).sslPointer()), "AES"); |
| 145 | + accept(secretKey, sslSession); |
| 146 | + } |
| 147 | + } |
| 148 | + } |
| 149 | + |
| 150 | + ctx.fireUserEventTriggered(evt); |
| 151 | + } |
| 152 | + |
| 153 | + /** |
| 154 | + * Create a {@link WiresharkSslMasterKeyHandler} instance. |
| 155 | + * This TLS master key handler logs the master key and session-id in a format |
| 156 | + * understood by Wireshark -- this can be especially useful if you need to ever |
| 157 | + * decrypt a TLS session and are using perfect forward secrecy (i.e. Diffie-Hellman) |
| 158 | + * The key and session identifier are forwarded to the log named 'io.netty.wireshark'. |
| 159 | + */ |
| 160 | + public static SslMasterKeyHandler newWireSharkSslMasterKeyHandler() { |
| 161 | + return new WiresharkSslMasterKeyHandler(); |
| 162 | + } |
| 163 | + |
| 164 | + /** |
| 165 | + * Record the session identifier and master key to the {@link InternalLogger} named <code>io.netty.wireshark</code>. |
| 166 | + * ex. <code>RSA Session-ID:XXX Master-Key:YYY</code> |
| 167 | + * This format is understood by Wireshark 1.6.0. |
| 168 | + * https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=686d4cabb41185591c361f9ec6b709034317144b |
| 169 | + * The key and session identifier are forwarded to the log named 'io.netty.wireshark'. |
| 170 | + */ |
| 171 | + private static final class WiresharkSslMasterKeyHandler extends SslMasterKeyHandler { |
| 172 | + |
| 173 | + private static final InternalLogger wireshark_logger = |
| 174 | + InternalLoggerFactory.getInstance("io.netty.wireshark"); |
| 175 | + |
| 176 | + private static final char[] hexCode = "0123456789ABCDEF".toCharArray(); |
| 177 | + |
| 178 | + @Override |
| 179 | + protected void accept(SecretKey masterKey, SSLSession session) { |
| 180 | + if (masterKey.getEncoded().length != 48) { |
| 181 | + throw new IllegalArgumentException("An invalid length master key was provided."); |
| 182 | + } |
| 183 | + final byte[] sessionId = session.getId(); |
| 184 | + wireshark_logger.warn("RSA Session-ID:{} Master-Key:{}", |
| 185 | + ByteBufUtil.hexDump(sessionId).toLowerCase(), |
| 186 | + ByteBufUtil.hexDump(masterKey.getEncoded()).toLowerCase()); |
| 187 | + } |
| 188 | + } |
| 189 | + |
| 190 | +} |
0 commit comments