thrift/lib/cpp/README.SSL.md
2014-03-19 06:47:47 +01:00

5.8 KiB

Notes on Thrift/SSL

Author: Ping Li pingli@facebook.com

  1. Scope

    This SSL only supports blocking mode socket I/O. It can only be used with TSimpleServer, TThreadedServer, and TThreadPoolServer.

  2. Implementation

    There're two main classes TSSLSocketFactory and TSSLSocket. Instances of TSSLSocket are always created from TSSLSocketFactory.

    PosixSSLThreadFactory creates PosixSSLThread. The only difference from the PthreadThread type is that it cleanups OpenSSL error queue upon exiting the thread. Ideally, OpenSSL APIs should only be called from PosixSSLThread.

  3. How to use SSL APIs

    // This is for demo. In real code, typically only one TSSLSocketFactory // instance is needed. shared_ptr getSSLSocketFactory() { shared_ptr factory(new TSSLSocketFactory()); // client: load trusted certificates factory->loadTrustedCertificates("my-trusted-ca-certificates.pem"); // client: optionally set your own access manager, otherwise, // the default client access manager will be loaded.

    factory->loadCertificate("my-certificate-signed-by-ca.pem"); factory->loadPrivateKey("my-private-key.pem"); // server: optionally setup access manager // shared_ptr accessManager(new MyAccessManager); // factory->access(accessManager); ... }

    // client code sample shared_ptr factory = getSSLSocketFactory(); shared_ptr socket = factory.createSocket(host, port); shared_ptr transport(new TBufferedTransport(socket)); ...

    // server code sample shared_ptr factory = getSSLSocketFactory(); shared_ptr socket(new TSSLServerSocket(port, factory)); shared_ptr transportFactory(new TBufferedTransportFactory)); ...

  4. AccessManager

    AccessManager defines a callback interface. It has three callback methods:

    (a) Decision verify(const sockaddr_storage& sa); (b) Decision verify(const string& host, const char* name, int size); (c) Decision verify(const sockaddr_storage& sa, const char* data, int size);

    After SSL handshake completes, additional checks are conducted. Application is given the chance to decide whether or not to continue the conversation with the remote. Application is queried through the above three "verify" method. They are called at different points of the verification process.

    Decisions can be one of ALLOW, DENY, and SKIP. ALLOW and DENY means the conversation should be continued or disconnected, respectively. ALLOW and DENY decision stops the verification process. SKIP means there's no decision based on the given input, continue the verification process.

    First, (a) is called with the remote IP. It is called once at the beginning. "sa" is the IP address of the remote peer.

    Then, the certificate of remote peer is loaded. SubjectAltName extensions are extracted and sent to application for verification. When a DNS subjectAltName field is extracted, (b) is called. When an IP subjectAltName field is extracted, (c) is called.

    The "host" in (b) is the value from TSocket::getHost() if this is a client side socket, or TSocket::getPeerHost() if this is a server side socket. The reason is client side socket initiates the connection. TSocket::getHost() is the remote host name. On server side, the remote host name is unknown unless it's retrieved through TSocket::getPeerHost(). Either way, "host" should be the remote host name. Keep in mind, if TSocket::getPeerHost() failed, it would return the remote host name in numeric format.

    If all subjectAltName extensions were "skipped", the common name field would be checked. It is sent to application through (c), where "sa" is the remote IP address. "data" is the IP address extracted from subjectAltName IP extension, and "size" is the length of the extension data.

    If any of the above "verify" methods returned a decision ALLOW or DENY, the verification process would be stopped.

    If any of the above "verify" methods returned SKIP, that decision would be ignored and the verification process would move on till the last item is examined. At that point, if there's still no decision, the connection is terminated.

    Thread safety, an access manager should not store state information if it's to be used by many SSL sockets.

  5. SIGPIPE signal

    Applications running OpenSSL over network connections may crash if SIGPIPE is not ignored. This happens when they receive a connection reset by remote peer exception, which somehow triggers a SIGPIPE signal. If not handled, this signal would kill the application.

  6. How to run test client/server in SSL mode

    The server expects the followings from the current working directory,

    • "server-certificate.pem"
    • "server-private-key.pem"

    The client loads "trusted-ca-certificate.pem" from current directory.

    The file names are hard coded in the source code. You need to create these certificates before you can run the test code in SSL mode. Make sure at least one of the followings is included in "server-certificate.pem",

    • subjectAltName, DNS localhost
    • subjectAltName, IP 127.0.0.1
    • common name, localhost

    Run,

    • "./test_server --ssl" to start server
    • "./test_client --ssl" to run client

    If "-h " is used to run client, the above "localhost" in the above server-certificate.pem has to be replaced with that host name.

  7. TSSLSocketFactory::randomize()

    The default implementation of OpenSSLSocketFactory::randomize() simply calls OpenSSL's RAND_poll() when OpenSSL library is first initialized.

    The PRNG seed is key to the application security. This method should be overridden if it's not strong enough for you.