Opened 5 years ago

Closed 5 years ago

#1829 closed defect (wontfix)

ssl: fail gracefully on Alert instead of ClientHello

Reported by: Gernot Vormayr Owned by:
Priority: minor Milestone:
Component: nginx-module Version: 1.16.x
Keywords: Cc:
uname -a: Linux 2560ab422d73 5.2.6-arch1-1-ARCH #1 SMP PREEMPT Sun Aug 4 14:58:49 UTC 2019 x86_64 GNU/Linux
nginx -V: nginx version: nginx/1.16.0
built by gcc 8.3.0 (Debian 8.3.0-6)
built with OpenSSL 1.1.1c 28 May 2019
TLS SNI support enabled
configure arguments: --prefix=/etc/nginx --sbin-path=/usr/sbin/nginx --modules-path=/usr/lib/nginx/modules --conf-path=/etc/nginx/nginx.conf --error-log-path=/var/log/nginx/error.log --http-log-path=/var/log/nginx/access.log --pid-path=/var/run/nginx.pid --lock-path=/var/run/nginx.lock --http-client-body-temp-path=/var/cache/nginx/client_temp --http-proxy-temp-path=/var/cache/nginx/proxy_temp --http-fastcgi-temp-path=/var/cache/nginx/fastcgi_temp --http-uwsgi-temp-path=/var/cache/nginx/uwsgi_temp --http-scgi-temp-path=/var/cache/nginx/scgi_temp --user=nginx --group=nginx --with-compat --with-file-aio --with-threads --with-http_addition_module --with-http_auth_request_module --with-http_dav_module --with-http_flv_module --with-http_gunzip_module --with-http_gzip_static_module --with-http_mp4_module --with-http_random_index_module --with-http_realip_module --with-http_secure_link_module --with-http_slice_module --with-http_ssl_module --with-http_stub_status_module --with-http_sub_module --with-http_v2_module --with-mail --with-mail_ssl_module --with-stream --with-stream_realip_module --with-stream_ssl_module --with-stream_ssl_preread_module --with-cc-opt='-g -O2 -fdebug-prefix-map=/data/builder/debuild/nginx-1.16.0/debian/debuild-base/nginx-1.16.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fPIC' --with-ld-opt='-Wl,-z,relro -Wl,-z,now -Wl,--as-needed -pie'

Description

When openssl encounters an error after it already connected, but before sending a ClientHello, it sends an Alert (might happen with other libraries too). This can happen with, e.g., curl on debian buster with curl --tls-max 1.0 https://localhost/ due to /etc/ssl/openssl.cnf specifying 1.2 as MinVersion. Since nginx inspects the first byte provided by the client and only invokes the ssl part if a ClientHello is detected (https://trac.nginx.org/nginx/browser/nginx/src/http/ngx_http_request.c#L729), it tries to interpret the Alert as plain http, leading to the following log output (2 lines error log, 1 line access log):

2019/08/08 09:59:12 [info] 11#11: *9 client sent invalid method while reading client request line, client: 127.0.0.1, server: host0.domain0.bd, request: "P"
2019/08/08 09:59:12 [info] 11#11: *9 shutdown() failed (107: Transport endpoint is not connected) while reading client request line, client: 127.0.0.1, server: host0.domain0.bd, request: "P"
127.0.0.1 - - [08/Aug/2019:09:59:12 +0000] "\x15\x03\x01\x00\x02\x02P" 400 157 "-" "-"

The attached patch handles this case by logging the error, followed by closing the connection:

2019/08/08 10:00:18 [info] 188#188: *1 peer sent SSL alert while SSL handshaking, client: 127.0.0.1, server: 0.0.0.0:443

Attachments (1)

nginx_ssl_alert.patch (550 bytes ) - added by Gernot Vormayr 5 years ago.

Download all attachments as: .zip

Change History (6)

by Gernot Vormayr, 5 years ago

Attachment: nginx_ssl_alert.patch added

comment:1 by Maxim Dounin, 5 years ago

As long as alerts are allowed before ClientHello, these should be simply passed to SSL layer, much like with other handshake messages. As long as they are not, current behaviour looks correct (expect for additional shutdown() error, which shouldn't happen, though it looks like a separate issue, and not nginx one - as the socket is clearly connected, ENOTCONN error returned by shutdown() looks like a kernel bug).

I don't think I see anything in TLS RFCs which makes alerts explicitly illegal before ClientHello. On the other hand, it doesn't looks like they are meaningful before ClientHello.

Trivial test with the following test patch:

diff --git a/src/http/ngx_http_request.c b/src/http/ngx_http_request.c
--- a/src/http/ngx_http_request.c
+++ b/src/http/ngx_http_request.c
@@ -726,7 +726,10 @@ ngx_http_ssl_handshake(ngx_event_t *rev)
     }
 
     if (n == 1) {
-        if (buf[0] & 0x80 /* SSLv2 */ || buf[0] == 0x16 /* SSLv3/TLSv1 */) {
+        if (buf[0] & 0x80 /* SSLv2 */
+            || buf[0] == 0x16 /* SSLv3/TLSv1 */
+            || buf[0] == 0x15 /* SSLv3/TLSv1 */)
+        {
             ngx_log_debug1(NGX_LOG_DEBUG_HTTP, rev->log, 0,
                            "https ssl handshake: 0x%02Xd", buf[0]);
 

suggests that OpenSSL itself thinks alerts are not allowed before ClientHello, as it reports an unexpected message error in such situation (tested with latest OpenSSL 1.1.1c):

2019/08/08 18:52:15 [info] 45965#100054: *1 SSL_do_handshake() failed (SSL: error:140940F4:SSL routines:ssl3_read_bytes:unexpected message) while SSL handshaking, client: 127.0.0.1, server: 0.0.0.0:8443

Given the above, you may want to report the problem to OpenSSL - it should either not try to send any alerts in this case, or handle them.

in reply to:  1 ; comment:2 by Gernot Vormayr, 5 years ago

Replying to mdounin:

As long as alerts are allowed before ClientHello, these should be simply passed to SSL layer, much like with other handshake messages. As long as they are not, current behaviour looks correct (expect for additional shutdown() error, which shouldn't happen, though it looks like a separate issue, and not nginx one - as the socket is clearly connected, ENOTCONN error returned by shutdown() looks like a kernel bug).

According to a traffic dump nginx sends a HTTP 400 page back, which gets answered with an RST - so depending on timing it could be, that at the point shutdown is called, the socket is already closed.

I don't think I see anything in TLS RFCs which makes alerts explicitly illegal before ClientHello. On the other hand, it doesn't looks like they are meaningful before ClientHello.

I also tried to find something in the RFCs before sending this - couldn't find anything that clearly states anything about Alert before ClientHello. However, https://tools.ietf.org/html/rfc8446#section-6.2 says that when an error is detected, that the detecting party should send an alert and must close the connection immediately after. At the point in time this happens, the connection was already made - but the handshake did not yet occur; the RFC states that e.g. due to memory allocation failure one can send internal error, which could happen while creating the ClientHello. So my interpretation would be that it is legal to have an Alert instead of a ClientHello. But I'm not an expert and would not insist on this.

Trivial test with the following test patch:

diff --git a/src/http/ngx_http_request.c b/src/http/ngx_http_request.c
--- a/src/http/ngx_http_request.c
+++ b/src/http/ngx_http_request.c
@@ -726,7 +726,10 @@ ngx_http_ssl_handshake(ngx_event_t *rev)
     }
 
     if (n == 1) {
-        if (buf[0] & 0x80 /* SSLv2 */ || buf[0] == 0x16 /* SSLv3/TLSv1 */) {
+        if (buf[0] & 0x80 /* SSLv2 */
+            || buf[0] == 0x16 /* SSLv3/TLSv1 */
+            || buf[0] == 0x15 /* SSLv3/TLSv1 */)
+        {
             ngx_log_debug1(NGX_LOG_DEBUG_HTTP, rev->log, 0,
                            "https ssl handshake: 0x%02Xd", buf[0]);
 

suggests that OpenSSL itself thinks alerts are not allowed before ClientHello, as it reports an unexpected message error in such situation (tested with latest OpenSSL 1.1.1c):

2019/08/08 18:52:15 [info] 45965#100054: *1 SSL_do_handshake() failed (SSL: error:140940F4:SSL routines:ssl3_read_bytes:unexpected message) while SSL handshaking, client: 127.0.0.1, server: 0.0.0.0:8443

This is the first version I tried, where I got the same result. Well the relevant part in openssl states

/*
 * If we've got this far and still haven't decided on what version
 * we're using then this must be a client side alert we're dealing with
 * (we don't allow heartbeats yet). We shouldn't be receiving anything
 * other than a ClientHello if we are a server.
 */

So yeah a bit of a mixed feeling - on one hand they say this must be a client side alert - on the other hand they say there should be only ClientHello.

Given the above, you may want to report the problem to OpenSSL - it should either not try to send any alerts in this case, or handle them.

I'd say a bit of both:

  • In hindsight my patch is not good since it tries to handle that itself while this should be handled by the SSL layer
  • I agree with you that this should be forwarded to the SSL layer - so I think that the patch you wrote should go in
  • OpenSSL does definitely do something wrong here: It sends an Alert as response to an alert while the spec clearly says that both parties "must immediately close the connection without sending or receiving any additional data"
  • Without your patch the current implementation imho also violates this rule (it receives an alert and interprets that as application data and sends something back)

in reply to:  2 ; comment:3 by Maxim Dounin, 5 years ago

Replying to gvormayr@…:

Replying to mdounin:

As long as alerts are allowed before ClientHello, these should be simply passed to SSL layer, much like with other handshake messages. As long as they are not, current behaviour looks correct (expect for additional shutdown() error, which shouldn't happen, though it looks like a separate issue, and not nginx one - as the socket is clearly connected, ENOTCONN error returned by shutdown() looks like a kernel bug).

According to a traffic dump nginx sends a HTTP 400 page back, which gets answered with an RST - so depending on timing it could be, that at the point shutdown is called, the socket is already closed.

Depending on the timing, the socket might be reset, and the error could be ECONNRESET (though this is not something shutdown() is expected to indicate as an error), but not ENOTCONN. This looks like a bug in the kernel you are using, likely due to incorrect optimizations in the TCP handling on loopback.

  • I agree with you that this should be forwarded to the SSL layer - so I think that the patch you wrote should go in

We can consider it, but the only thing it does is an optimization of a particular case with garbage got from the client. Are you seeing a lot of these for some reason?

in reply to:  3 ; comment:4 by Gernot Vormayr, 5 years ago

Replying to mdounin:

Replying to gvormayr@…:

Replying to mdounin:

As long as alerts are allowed before ClientHello, these should be simply passed to SSL layer, much like with other handshake messages. As long as they are not, current behaviour looks correct (expect for additional shutdown() error, which shouldn't happen, though it looks like a separate issue, and not nginx one - as the socket is clearly connected, ENOTCONN error returned by shutdown() looks like a kernel bug).

According to a traffic dump nginx sends a HTTP 400 page back, which gets answered with an RST - so depending on timing it could be, that at the point shutdown is called, the socket is already closed.

Depending on the timing, the socket might be reset, and the error could be ECONNRESET (though this is not something shutdown() is expected to indicate as an error), but not ENOTCONN. This looks like a bug in the kernel you are using, likely due to incorrect optimizations in the TCP handling on loopback.

I tried to find out what is happening here, since this is a bit peculiar. Well according to the manpage of shutdown, ECONNRESET is not something it returns (no idea why that is...) and I traced a bit around the linux kernel and read a bit of source code and found out, that the following is happening:

  1. Upon arrival of the RST, tcp_reset is called, which sets sk->sk_err to ECONNRESET and calls tcp_done, which further sets sk->sk_state to TCP_CLOSE.
  2. The shutdown syscall calls inet_shutdown, which sets the return value to ENOTCONN if sk->sk_state is TCP_CLOSE (so sk_err gets ignored here and then it goes on to call tcp_shutdown).

Now depending on timing and scheduling (whether 1 happens before 2) ENOTCONN or no error gets returned from shutdown (I managed to get both outcomes in multiple tests).

I fear finding out the reason why they chose ENOTCONN and not ECONNRESET for shutdown is beyond my detective capabilities (didn't find any explaining comment or anything) - only thing I found out is, that it has been this way in the linux kernel since at least 2.6.

  • I agree with you that this should be forwarded to the SSL layer - so I think that the patch you wrote should go in

We can consider it, but the only thing it does is an optimization of a particular case with garbage got from the client. Are you seeing a lot of these for some reason?

So far I've seen this only during SSL testing (so not really a lot of these). I'd say that this thing is not particularly interesting in any way since nothing bad can happen. The only thing I see that can be happening here is a WTF from a user/admin/developer since the request line "\x15\x03\x01\x00\x02\x02P" looks a bit strange. So I'd say you can close this.

in reply to:  4 comment:5 by Maxim Dounin, 5 years ago

Resolution: wontfix
Status: newclosed

Replying to gvormayr@…:

Replying to mdounin:

Depending on the timing, the socket might be reset, and the error could be ECONNRESET (though this is not something shutdown() is expected to indicate as an error), but not ENOTCONN. This looks like a bug in the kernel you are using, likely due to incorrect optimizations in the TCP handling on loopback.

Well according to the manpage of shutdown, ECONNRESET is not something it returns (no idea why that is...)

That's because shutdown() is not expected to fail regardless of error conditions on the socket as long as socket is valid. It can only fail if something incorrect provided as arguments - that is, not a file descriptor (EBADF), invalid how argument (EINVAL), a socket which was never connected (ENOTCONN), or not a socket at all (ENOTSOCK).

and I traced a bit around the linux kernel and read a bit of source code and found out, that the following is happening:

  1. Upon arrival of the RST, tcp_reset is called, which sets sk->sk_err to ECONNRESET and calls tcp_done, which further sets sk->sk_state to TCP_CLOSE.
  2. The shutdown syscall calls inet_shutdown, which sets the return value to ENOTCONN if sk->sk_state is TCP_CLOSE (so sk_err gets ignored here and then it goes on to call tcp_shutdown).

Now depending on timing and scheduling (whether 1 happens before 2) ENOTCONN or no error gets returned from shutdown (I managed to get both outcomes in multiple tests).

I fear finding out the reason why they chose ENOTCONN and not ECONNRESET for shutdown is beyond my detective capabilities (didn't find any explaining comment or anything) - only thing I found out is, that it has been this way in the linux kernel since at least 2.6.

So it looks like it is broken for a long time, yet this wasn't observed previously. Either way, this is to be fixed in kernel, and is irrelevant to the particular issue.

  • I agree with you that this should be forwarded to the SSL layer - so I think that the patch you wrote should go in

We can consider it, but the only thing it does is an optimization of a particular case with garbage got from the client. Are you seeing a lot of these for some reason?

So far I've seen this only during SSL testing (so not really a lot of these). I'd say that this thing is not particularly interesting in any way since nothing bad can happen. The only thing I see that can be happening here is a WTF from a user/admin/developer since the request line "\x15\x03\x01\x00\x02\x02P" looks a bit strange. So I'd say you can close this.

Well, the request line in question actually explains more than the unexpected message error from OpenSSL, which is basically the same but does not contain any information about the message. Ok, closing this.

Note: See TracTickets for help on using tickets.