Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Parse RSA parameters DP, DQ and QP from PKCS1 private keys #352

Merged

Conversation

jack-fortanix
Copy link
Contributor

Otherwise these values are recomputed in mbedtls_rsa_deduce_crt, which currently suffers from side channel issues in the computation of QP (see https://eprint.iacr.org/2020/055). By loading the pre-computed values not only is the side channel avoided, but runtime overhead of loading RSA keys is reduced.

Discussion in #347

Otherwise these values are recomputed in mbedtls_rsa_deduce_crt, which
currently suffers from side channel issues in the computation of QP (see
https://eprint.iacr.org/2020/055). By loading the pre-computed values not
only is the side channel avoided, but runtime overhead of loading RSA keys
is reduced.

Discussion in ARMmbed#347
jack-fortanix added a commit to jack-fortanix/rust-mbedtls that referenced this pull request Jan 22, 2020
Currently they are ignored in the serialized key and then regenerated
from P/Q/D. But that exposes key loading to a side channel attack on
the modular inversion and GCD bignum functions when QP is computed.
[And probably similar issues for DP/DQ during the division step but no
attack there has been published yet.]

Backport of ARMmbed/mbed-crypto#352
@gilles-peskine-arm gilles-peskine-arm added bug Something isn't working needs: backports Needs backports to Mbed TLS branches needs: review The pull request is ready for review. This generally means that it has no known issues. labels Jan 23, 2020
@gilles-peskine-arm
Copy link
Collaborator

Thanks for the patch! Unfortunately, the CI points out that it doesn't build when MBEDTLS_RSA_NO_CRT is defined.

var/lib/build/library/rsa.c: In function 'mbedtls_rsa_complete':
/var/lib/build/library/rsa.c:252:67: error: variable 'have_QP' set but not used [-Werror=unused-but-set-variable]
     int have_N, have_P, have_Q, have_D, have_E, have_DP, have_DQ, have_QP;
                                                                   ^
/var/lib/build/library/rsa.c:252:58: error: variable 'have_DQ' set but not used [-Werror=unused-but-set-variable]
     int have_N, have_P, have_Q, have_D, have_E, have_DP, have_DQ, have_QP;
                                                          ^
/var/lib/build/library/rsa.c:252:49: error: variable 'have_DP' set but not used [-Werror=unused-but-set-variable]
     int have_N, have_P, have_Q, have_D, have_E, have_DP, have_DQ, have_QP;
                                                 ^
cc1: all warnings being treated as errors
library/CMakeFiles/mbedcrypto.dir/build.make:1358: recipe for target 'library/CMakeFiles/mbedcrypto.dir/rsa.c.o' failed
make[2]: *** [library/CMakeFiles/mbedcrypto.dir/rsa.c.o] Error 1
make[2]: *** Waiting for unfinished jobs....
CMakeFiles/Makefile2:268: recipe for target 'library/CMakeFiles/mbedcrypto.dir/all' failed
make[1]: *** [library/CMakeFiles/mbedcrypto.dir/all] Error 2
make: *** [all] Error 2
Makefile:138: recipe for target 'all' failed
^^^^test_rsa_no_crt: build: Default + RSA_NO_CRT (ASan build): command make -> 2^^^^

To reproduce:

make clean
scripts/config.py set MBEDTLS_RSA_NO_CRT
make all test

To run all the tests we run with CRT usage disabled:

tests/scripts/all.sh test_rsa_no_crt

@gilles-peskine-arm gilles-peskine-arm added the needs: work The pull request needs rework before it can be merged. label Jan 23, 2020
@yanesca yanesca self-requested a review January 23, 2020 09:28
@@ -769,14 +769,29 @@ static int pk_parse_key_pkcs1_der( mbedtls_rsa_context *rsa,
goto cleanup;
p += len;

/* Complete the RSA private key */
if( ( ret = mbedtls_rsa_complete( rsa ) ) != 0 )
/* Import DP */
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we please add a comment here as a reminder for the future to ensure that nobody "optimises" this code out?

Basically explaining that although we could compute these values, we choose not to because this way it is faster and reduces the attack surface exposed to side channel attacks.

@jack-fortanix
Copy link
Contributor Author

@gilles-peskine-arm I addressed the build problem but it looks like Jenkins is still failing, can you forward the issue here?

tests/scripts/all.sh test_rsa_no_crt was able to reproduce the error you were seeing, but after fixing it a later build fails with

/home/jack/sw/mbed-crypto/tests/suites/test_suite_psa_crypto.function: In function ‘test_generate_random’:
suites/helpers.function:154:25: error: argument 2 value ‘18446744073709551597’ exceeds maximum object size 9223372036854775807 [-Werror=alloc-size-larger-than=]
             ( pointer ) = mbedtls_calloc( sizeof( *( pointer ) ), \
             ~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                           ( length ) );           \
                                           ~~~~~~~~~~~~
/home/jack/sw/mbed-crypto/tests/suites/test_suite_psa_crypto.function:5161:5: note: in expansion of macro ‘ASSERT_ALLOC’
     ASSERT_ALLOC( changed, bytes );
     ^~~~~~~~~~~~
In file included from suites/helpers.function:5:0:
/usr/include/stdlib.h:541:14: note: in a call to allocation function ‘calloc’ declared here
 extern void *calloc (size_t __nmemb, size_t __size)
              ^~~~~~
cc1: all warnings being treated as errors

This appears to be a GCM test so I don't think has anything to do with my change - and the same error appears with development branch.

@yanesca
Copy link
Collaborator

yanesca commented Jan 23, 2020

Unfortunately all.sh is very sensitive to the OS and tools used and can have such problems. As a workaround you could delete the generate_random function from tests/suites/test_suite_psa_crypto.function and the entries starting with generate_random from tests/suites/test_suite_psa_crypto.data then tests/scripts/all.sh test_rsa_no_crt should be able to reproduce the failure.

For more detailed test output you can run the individual test functions with -v option. For example: cd tests/ && ./test_suite_pk -v.

@jack-fortanix
Copy link
Contributor Author

@yanesca Thanks, your suggestion resolved the build problem in the random tests. Unfortunately? now all.sh passes for me so I still don't know why the Jenkins builds are failing.

@yanesca
Copy link
Collaborator

yanesca commented Jan 24, 2020

I copied the CI output here:
https://gist.github.com/yanesca/f250b5faa8e390b76eede7520e4ec84c

In the first couple of lines it prints out the OS and tools versions. Also here is my local environment (slightly more recent than the CI), I could reproduce with these too (I encountered the same compilation problem though):

* uname: /bin/uname: Linux mbedTLS-devPC1 4.15.0-74-generic #84-Ubuntu SMP Thu Dec 19 08:06:28 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
                                                                      
* gcc: /usr/bin/gcc: gcc (Ubuntu 7.4.0-1ubuntu1~18.04.1) 7.4.0

* ldd: /usr/bin/ldd: ldd (Ubuntu GLIBC 2.27-3ubuntu1) 2.27

* asan: Version: 5.5.0-12ubuntu1

The PR should be ready after fixing this test. This won't make the CI green though, because we have an unrelated failure in the CI.

@jack-fortanix
Copy link
Contributor Author

I was not able to reproduce until I edited all.sh to add -fsanitize=leak - for whatever reason it doesn't show up with just ASan. Anyway should be resolved now.

@yanesca
Copy link
Collaborator

yanesca commented Jan 28, 2020

Yes, it is resolved, the CI is only failing on known issues that are unrelated to this PR.

Aren't you on OS X by any chance? Leak analyser is turned off by default in OS X ASan:
https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer

yanesca
yanesca previously approved these changes Jan 28, 2020
Copy link
Collaborator

@yanesca yanesca left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have found a minor snag, other than that it looks good to me.

(It would be nice to have it resolved, but it is not a blocker for merging.)

library/pkparse.c Outdated Show resolved Hide resolved
@yanesca yanesca removed the needs: work The pull request needs rework before it can be merged. label Jan 28, 2020
Copy link
Collaborator

@gilles-peskine-arm gilles-peskine-arm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As noted by @yanesca, please use mbedtls_asn1_get_mpi where applicable.

library/rsa.c Outdated Show resolved Hide resolved
@jack-fortanix
Copy link
Contributor Author

Updated

Copy link
Collaborator

@yanesca yanesca left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me!

@yanesca yanesca removed the needs: review The pull request is ready for review. This generally means that it has no known issues. label Jan 29, 2020
@yanesca
Copy link
Collaborator

yanesca commented Jan 29, 2020

The only thing left on this PR is to do the backports. @jack-fortanix Could you please raise PRs with the same content in the Mbed TLS repository targeting the mbedtls-2.7 and mbedtls-2.16 branches?

jack-fortanix added a commit to jack-fortanix/mbedtls that referenced this pull request Jan 29, 2020
Otherwise these values are recomputed in mbedtls_rsa_deduce_crt, which
currently suffers from side channel issues in the computation of QP
(see https://eprint.iacr.org/2020/055). By loading the pre-computed
values not only is the side channel avoided, but runtime overhead of
loading RSA keys is reduced.

Discussion in ARMmbed/mbed-crypto#347

Backport of ARMmbed/mbed-crypto#352
jack-fortanix added a commit to jack-fortanix/mbedtls that referenced this pull request Jan 29, 2020
Otherwise these values are recomputed in mbedtls_rsa_deduce_crt, which
currently suffers from side channel issues in the computation of QP
(see https://eprint.iacr.org/2020/055). By loading the pre-computed
values not only is the side channel avoided, but runtime overhead of
loading RSA keys is reduced.

Discussion in ARMmbed/mbed-crypto#347

Backport of ARMmbed/mbed-crypto#352
@yanesca
Copy link
Collaborator

yanesca commented Jan 30, 2020

Thank you for submitting the backports!

@gilles-peskine-arm gilles-peskine-arm added ready for merge Design and code approved, CI passed, and likewise for backports. Label added by gatekeepers only. and removed needs: backports Needs backports to Mbed TLS branches labels Jan 31, 2020
@gilles-peskine-arm gilles-peskine-arm merged commit c0611a5 into ARMmbed:development Jan 31, 2020
jack-fortanix added a commit to jack-fortanix/rust-mbedtls that referenced this pull request Feb 4, 2020
Currently they are ignored in the serialized key and then regenerated
from P/Q/D. But that exposes key loading to a side channel attack on
the modular inversion and GCD bignum functions when QP is computed.
[And probably similar issues for DP/DQ during the division step but no
attack there has been published yet.]

Backport of ARMmbed/mbed-crypto#352
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Feb 29, 2020
= mbed TLS 2.16.5 branch released 2020-02-20

Security
   * Fix potential memory overread when performing an ECDSA signature
     operation. The overread only happens with cryptographically low
     probability (of the order of 2^-n where n is the bitsize of the curve)
     unless the RNG is broken, and could result in information disclosure or
     denial of service (application crash or extra resource consumption).
     Found by Auke Zeilstra and Peter Schwabe, using static analysis.
   * To avoid a side channel vulnerability when parsing an RSA private key,
     read all the CRT parameters from the DER structure rather than
     reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
     Brumley. Reported and fix contributed by Jack Lloyd.
     ARMmbed/mbed-crypto#352

Bugfix
   * Fix an unchecked call to mbedtls_md() in the x509write module.
   * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
     RSA keys that would later be rejected by functions expecting private
     keys. Found by Catena cyber using oss-fuzz (issue 20467).
   * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
     RSA keys with invalid values by silently fixing those values.
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Mar 8, 2020
security/mbedtls: security fix

Revisions pulled up:
- security/mbedtls/Makefile                                     1.12
- security/mbedtls/PLIST                                        1.6
- security/mbedtls/distinfo                                     1.8

---
   Module Name:    pkgsrc
   Committed By:   nia
   Date:           Sat Feb 29 11:45:02 UTC 2020

   Modified Files:
           pkgsrc/security/mbedtls: Makefile PLIST distinfo

   Log Message:
   mbedtls: Update to 2.16.5

   = mbed TLS 2.16.5 branch released 2020-02-20

   Security
      * Fix potential memory overread when performing an ECDSA signature
        operation. The overread only happens with cryptographically low
        probability (of the order of 2^-n where n is the bitsize of the curve)
        unless the RNG is broken, and could result in information disclosure or
        denial of service (application crash or extra resource consumption).
        Found by Auke Zeilstra and Peter Schwabe, using static analysis.
      * To avoid a side channel vulnerability when parsing an RSA private key,
        read all the CRT parameters from the DER structure rather than
        reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
        Brumley. Reported and fix contributed by Jack Lloyd.
        ARMmbed/mbed-crypto#352

   Bugfix
      * Fix an unchecked call to mbedtls_md() in the x509write module.
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys that would later be rejected by functions expecting private
        keys. Found by Catena cyber using oss-fuzz (issue 20467).
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys with invalid values by silently fixing those values.
bors bot added a commit to fortanix/rust-mbedtls that referenced this pull request Mar 9, 2020
90: Fix ECDSA side channel r=jethrogb a=jack-fortanix

Backport of ARMmbed/mbed-crypto@247c4d3
which addresses the attack described in https://eprint.iacr.org/2020/055.pdf

91: Parse RSA CRT parameters from PKCS1 private keys r=jethrogb a=jack-fortanix

Currently they are ignored in the serialized key and then regenerated from P/Q/D. But that exposes key loading to a side channel attack on the modular inversion and GCD bignum functions when QP is computed. [And probably similar issues for DP/DQ during the division step but no attack there has been published yet.]

Also this reduces computational overhead of loading RSA private keys from memory which will be nice for us in roche.

Backport of ARMmbed/mbed-crypto#352

Co-authored-by: Jack Lloyd <[email protected]>
bors bot added a commit to fortanix/rust-mbedtls that referenced this pull request Mar 9, 2020
90: Fix ECDSA side channel r=jethrogb a=jack-fortanix

Backport of ARMmbed/mbed-crypto@247c4d3
which addresses the attack described in https://eprint.iacr.org/2020/055.pdf

91: Parse RSA CRT parameters from PKCS1 private keys r=jethrogb a=jack-fortanix

Currently they are ignored in the serialized key and then regenerated from P/Q/D. But that exposes key loading to a side channel attack on the modular inversion and GCD bignum functions when QP is computed. [And probably similar issues for DP/DQ during the division step but no attack there has been published yet.]

Also this reduces computational overhead of loading RSA private keys from memory which will be nice for us in roche.

Backport of ARMmbed/mbed-crypto#352

94: Fix docs on macro invocations r=jethrogb a=jethrogb



Co-authored-by: Jack Lloyd <[email protected]>
Co-authored-by: Jethro Beekman <[email protected]>
simonbutcher pushed a commit to simonbutcher/mbedtls that referenced this pull request Mar 13, 2020
Otherwise these values are recomputed in mbedtls_rsa_deduce_crt, which
currently suffers from side channel issues in the computation of QP
(see https://eprint.iacr.org/2020/055). By loading the pre-computed
values not only is the side channel avoided, but runtime overhead of
loading RSA keys is reduced.

Discussion in ARMmbed/mbed-crypto#347

Backport of ARMmbed/mbed-crypto#352
gilles-peskine-arm added a commit to gilles-peskine-arm/mbed-crypto that referenced this pull request Mar 23, 2020
* ARMmbed#352: Parse RSA parameters DP, DQ and QP from PKCS1 private keys
* ARMmbed#263: Introduce ASN.1 SEQUENCE traversal API
* ARMmbed#345: Fix possible error code mangling in psa_mac_verify_finish
* ARMmbed#357: Update Mbed Crypto with latest Mbed TLS changes as of 2020-02-03
* ARMmbed#350: test_suite_asn1parse: improve testing of trailing garbage in parse_prefixes
* ARMmbed#346: Improve robustness and testing of mbedtls_mpi_copy
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Apr 6, 2020
security/mbedtls: security fix

Revisions pulled up:
- security/mbedtls/Makefile                                     1.12
- security/mbedtls/PLIST                                        1.6
- security/mbedtls/distinfo                                     1.8

---
   Module Name:    pkgsrc
   Committed By:   nia
   Date:           Sat Feb 29 11:45:02 UTC 2020

   Modified Files:
           pkgsrc/security/mbedtls: Makefile PLIST distinfo

   Log Message:
   mbedtls: Update to 2.16.5

   = mbed TLS 2.16.5 branch released 2020-02-20

   Security
      * Fix potential memory overread when performing an ECDSA signature
        operation. The overread only happens with cryptographically low
        probability (of the order of 2^-n where n is the bitsize of the curve)
        unless the RNG is broken, and could result in information disclosure or
        denial of service (application crash or extra resource consumption).
        Found by Auke Zeilstra and Peter Schwabe, using static analysis.
      * To avoid a side channel vulnerability when parsing an RSA private key,
        read all the CRT parameters from the DER structure rather than
        reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
        Brumley. Reported and fix contributed by Jack Lloyd.
        ARMmbed/mbed-crypto#352

   Bugfix
      * Fix an unchecked call to mbedtls_md() in the x509write module.
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys that would later be rejected by functions expecting private
        keys. Found by Catena cyber using oss-fuzz (issue 20467).
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys with invalid values by silently fixing those values.
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request May 27, 2020
security/mbedtls: security fix

Revisions pulled up:
- security/mbedtls/Makefile                                     1.12
- security/mbedtls/PLIST                                        1.6
- security/mbedtls/distinfo                                     1.8

---
   Module Name:    pkgsrc
   Committed By:   nia
   Date:           Sat Feb 29 11:45:02 UTC 2020

   Modified Files:
           pkgsrc/security/mbedtls: Makefile PLIST distinfo

   Log Message:
   mbedtls: Update to 2.16.5

   = mbed TLS 2.16.5 branch released 2020-02-20

   Security
      * Fix potential memory overread when performing an ECDSA signature
        operation. The overread only happens with cryptographically low
        probability (of the order of 2^-n where n is the bitsize of the curve)
        unless the RNG is broken, and could result in information disclosure or
        denial of service (application crash or extra resource consumption).
        Found by Auke Zeilstra and Peter Schwabe, using static analysis.
      * To avoid a side channel vulnerability when parsing an RSA private key,
        read all the CRT parameters from the DER structure rather than
        reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
        Brumley. Reported and fix contributed by Jack Lloyd.
        ARMmbed/mbed-crypto#352

   Bugfix
      * Fix an unchecked call to mbedtls_md() in the x509write module.
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys that would later be rejected by functions expecting private
        keys. Found by Catena cyber using oss-fuzz (issue 20467).
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys with invalid values by silently fixing those values.
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Oct 14, 2021
security/mbedtls: security fix

Revisions pulled up:
- security/mbedtls/Makefile                                     1.12
- security/mbedtls/PLIST                                        1.6
- security/mbedtls/distinfo                                     1.8

---
   Module Name:    pkgsrc
   Committed By:   nia
   Date:           Sat Feb 29 11:45:02 UTC 2020

   Modified Files:
           pkgsrc/security/mbedtls: Makefile PLIST distinfo

   Log Message:
   mbedtls: Update to 2.16.5

   = mbed TLS 2.16.5 branch released 2020-02-20

   Security
      * Fix potential memory overread when performing an ECDSA signature
        operation. The overread only happens with cryptographically low
        probability (of the order of 2^-n where n is the bitsize of the curve)
        unless the RNG is broken, and could result in information disclosure or
        denial of service (application crash or extra resource consumption).
        Found by Auke Zeilstra and Peter Schwabe, using static analysis.
      * To avoid a side channel vulnerability when parsing an RSA private key,
        read all the CRT parameters from the DER structure rather than
        reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
        Brumley. Reported and fix contributed by Jack Lloyd.
        ARMmbed/mbed-crypto#352

   Bugfix
      * Fix an unchecked call to mbedtls_md() in the x509write module.
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys that would later be rejected by functions expecting private
        keys. Found by Catena cyber using oss-fuzz (issue 20467).
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys with invalid values by silently fixing those values.
netbsd-srcmastr pushed a commit to NetBSD/pkgsrc that referenced this pull request Jan 18, 2023
security/mbedtls: security fix

Revisions pulled up:
- security/mbedtls/Makefile                                     1.12
- security/mbedtls/PLIST                                        1.6
- security/mbedtls/distinfo                                     1.8

---
   Module Name:    pkgsrc
   Committed By:   nia
   Date:           Sat Feb 29 11:45:02 UTC 2020

   Modified Files:
           pkgsrc/security/mbedtls: Makefile PLIST distinfo

   Log Message:
   mbedtls: Update to 2.16.5

   = mbed TLS 2.16.5 branch released 2020-02-20

   Security
      * Fix potential memory overread when performing an ECDSA signature
        operation. The overread only happens with cryptographically low
        probability (of the order of 2^-n where n is the bitsize of the curve)
        unless the RNG is broken, and could result in information disclosure or
        denial of service (application crash or extra resource consumption).
        Found by Auke Zeilstra and Peter Schwabe, using static analysis.
      * To avoid a side channel vulnerability when parsing an RSA private key,
        read all the CRT parameters from the DER structure rather than
        reconstructing them. Found by Alejandro Cabrera Aldaya and Billy Bob
        Brumley. Reported and fix contributed by Jack Lloyd.
        ARMmbed/mbed-crypto#352

   Bugfix
      * Fix an unchecked call to mbedtls_md() in the x509write module.
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys that would later be rejected by functions expecting private
        keys. Found by Catena cyber using oss-fuzz (issue 20467).
      * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
        RSA keys with invalid values by silently fixing those values.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working ready for merge Design and code approved, CI passed, and likewise for backports. Label added by gatekeepers only.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants