mirror of
https://github.com/postgres/postgres.git
synced 2025-07-02 09:02:37 +03:00
Support TLS handshake directly without SSLRequest negotiation
By skipping SSLRequest, you can eliminate one round-trip when establishing a TLS connection. It is also more friendly to generic TLS proxies that don't understand the PostgreSQL protocol. This is disabled by default in libpq, because the direct TLS handshake will fail with old server versions. It can be enabled with the sslnegotation=direct option. It will still fall back to the negotiated TLS handshake if the server rejects the direct attempt, either because it is an older version or the server doesn't support TLS at all, but the fallback can be disabled with the sslnegotiation=requiredirect option. Author: Greg Stark, Heikki Linnakangas Reviewed-by: Matthias van de Meent, Jacob Champion
This commit is contained in:
@ -109,18 +109,51 @@ secure_loaded_verify_locations(void)
|
||||
int
|
||||
secure_open_server(Port *port)
|
||||
{
|
||||
int r = 0;
|
||||
|
||||
#ifdef USE_SSL
|
||||
int r = 0;
|
||||
ssize_t len;
|
||||
|
||||
/* push unencrypted buffered data back through SSL setup */
|
||||
len = pq_buffer_remaining_data();
|
||||
if (len > 0)
|
||||
{
|
||||
char *buf = palloc(len);
|
||||
|
||||
pq_startmsgread();
|
||||
if (pq_getbytes(buf, len) == EOF)
|
||||
return STATUS_ERROR; /* shouldn't be possible */
|
||||
pq_endmsgread();
|
||||
port->raw_buf = buf;
|
||||
port->raw_buf_remaining = len;
|
||||
port->raw_buf_consumed = 0;
|
||||
}
|
||||
Assert(pq_buffer_remaining_data() == 0);
|
||||
|
||||
r = be_tls_open_server(port);
|
||||
|
||||
if (port->raw_buf_remaining > 0)
|
||||
{
|
||||
/*
|
||||
* This shouldn't be possible -- it would mean the client sent
|
||||
* encrypted data before we established a session key...
|
||||
*/
|
||||
elog(LOG, "buffered unencrypted data remains after negotiating SSL connection");
|
||||
return STATUS_ERROR;
|
||||
}
|
||||
if (port->raw_buf != NULL)
|
||||
{
|
||||
pfree(port->raw_buf);
|
||||
port->raw_buf = NULL;
|
||||
}
|
||||
|
||||
ereport(DEBUG2,
|
||||
(errmsg_internal("SSL connection from DN:\"%s\" CN:\"%s\"",
|
||||
port->peer_dn ? port->peer_dn : "(anonymous)",
|
||||
port->peer_cn ? port->peer_cn : "(anonymous)")));
|
||||
#endif
|
||||
|
||||
return r;
|
||||
#else
|
||||
return 0;
|
||||
#endif
|
||||
}
|
||||
|
||||
/*
|
||||
@ -232,6 +265,19 @@ secure_raw_read(Port *port, void *ptr, size_t len)
|
||||
{
|
||||
ssize_t n;
|
||||
|
||||
/* Read from the "unread" buffered data first. c.f. libpq-be.h */
|
||||
if (port->raw_buf_remaining > 0)
|
||||
{
|
||||
/* consume up to len bytes from the raw_buf */
|
||||
if (len > port->raw_buf_remaining)
|
||||
len = port->raw_buf_remaining;
|
||||
Assert(port->raw_buf);
|
||||
memcpy(ptr, port->raw_buf + port->raw_buf_consumed, len);
|
||||
port->raw_buf_consumed += len;
|
||||
port->raw_buf_remaining -= len;
|
||||
return len;
|
||||
}
|
||||
|
||||
/*
|
||||
* Try to read from the socket without blocking. If it succeeds we're
|
||||
* done, otherwise we'll wait for the socket using the latch mechanism.
|
||||
|
@ -1116,15 +1116,17 @@ pq_discardbytes(size_t len)
|
||||
}
|
||||
|
||||
/* --------------------------------
|
||||
* pq_buffer_has_data - is any buffered data available to read?
|
||||
* pq_buffer_remaining_data - return number of bytes in receive buffer
|
||||
*
|
||||
* This will *not* attempt to read more data.
|
||||
* This will *not* attempt to read more data. And reading up to that number of
|
||||
* bytes should not cause reading any more data either.
|
||||
* --------------------------------
|
||||
*/
|
||||
bool
|
||||
pq_buffer_has_data(void)
|
||||
ssize_t
|
||||
pq_buffer_remaining_data(void)
|
||||
{
|
||||
return (PqRecvPointer < PqRecvLength);
|
||||
Assert(PqRecvLength >= PqRecvPointer);
|
||||
return (PqRecvLength - PqRecvPointer);
|
||||
}
|
||||
|
||||
|
||||
|
@ -41,6 +41,7 @@
|
||||
bool Trace_connection_negotiation = false;
|
||||
|
||||
static void BackendInitialize(ClientSocket *client_sock, CAC_state cac);
|
||||
static int ProcessSSLStartup(Port *port);
|
||||
static int ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done);
|
||||
static void SendNegotiateProtocolVersion(List *unrecognized_protocol_options);
|
||||
static void process_startup_packet_die(SIGNAL_ARGS);
|
||||
@ -251,11 +252,15 @@ BackendInitialize(ClientSocket *client_sock, CAC_state cac)
|
||||
RegisterTimeout(STARTUP_PACKET_TIMEOUT, StartupPacketTimeoutHandler);
|
||||
enable_timeout_after(STARTUP_PACKET_TIMEOUT, AuthenticationTimeout * 1000);
|
||||
|
||||
/* Handle direct SSL handshake */
|
||||
status = ProcessSSLStartup(port);
|
||||
|
||||
/*
|
||||
* Receive the startup packet (which might turn out to be a cancel request
|
||||
* packet).
|
||||
*/
|
||||
status = ProcessStartupPacket(port, false, false);
|
||||
if (status == STATUS_OK)
|
||||
status = ProcessStartupPacket(port, false, false);
|
||||
|
||||
/*
|
||||
* If we're going to reject the connection due to database state, say so
|
||||
@ -347,6 +352,77 @@ BackendInitialize(ClientSocket *client_sock, CAC_state cac)
|
||||
set_ps_display("initializing");
|
||||
}
|
||||
|
||||
/*
|
||||
* Check for a direct SSL connection.
|
||||
*
|
||||
* This happens before the startup packet so we are careful not to actually
|
||||
* read any bytes from the stream if it's not a direct SSL connection.
|
||||
*/
|
||||
static int
|
||||
ProcessSSLStartup(Port *port)
|
||||
{
|
||||
int firstbyte;
|
||||
|
||||
Assert(!port->ssl_in_use);
|
||||
|
||||
pq_startmsgread();
|
||||
firstbyte = pq_peekbyte();
|
||||
pq_endmsgread();
|
||||
if (firstbyte == EOF)
|
||||
{
|
||||
/*
|
||||
* Like in ProcessStartupPacket, if we get no data at all, don't
|
||||
* clutter the log with a complaint.
|
||||
*/
|
||||
return STATUS_ERROR;
|
||||
}
|
||||
|
||||
if (firstbyte != 0x16)
|
||||
{
|
||||
/* Not an SSL handshake message */
|
||||
return STATUS_OK;
|
||||
}
|
||||
|
||||
/*
|
||||
* First byte indicates standard SSL handshake message
|
||||
*
|
||||
* (It can't be a Postgres startup length because in network byte order
|
||||
* that would be a startup packet hundreds of megabytes long)
|
||||
*/
|
||||
|
||||
#ifdef USE_SSL
|
||||
if (!LoadedSSL || port->laddr.addr.ss_family == AF_UNIX)
|
||||
{
|
||||
/* SSL not supported */
|
||||
goto reject;
|
||||
}
|
||||
|
||||
if (secure_open_server(port) == -1)
|
||||
{
|
||||
/*
|
||||
* we assume secure_open_server() sent an appropriate TLS alert
|
||||
* already
|
||||
*/
|
||||
goto reject;
|
||||
}
|
||||
Assert(port->ssl_in_use);
|
||||
|
||||
if (Trace_connection_negotiation)
|
||||
ereport(LOG,
|
||||
(errmsg("direct SSL connection accepted")));
|
||||
return STATUS_OK;
|
||||
#else
|
||||
/* SSL not supported by this build */
|
||||
goto reject;
|
||||
#endif
|
||||
|
||||
reject:
|
||||
if (Trace_connection_negotiation)
|
||||
ereport(LOG,
|
||||
(errmsg("direct SSL connection rejected")));
|
||||
return STATUS_ERROR;
|
||||
}
|
||||
|
||||
/*
|
||||
* Read a client's startup packet and do something according to it.
|
||||
*
|
||||
@ -468,8 +544,13 @@ ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done)
|
||||
char SSLok;
|
||||
|
||||
#ifdef USE_SSL
|
||||
/* No SSL when disabled or on Unix sockets */
|
||||
if (!LoadedSSL || port->laddr.addr.ss_family == AF_UNIX)
|
||||
|
||||
/*
|
||||
* No SSL when disabled or on Unix sockets.
|
||||
*
|
||||
* Also no SSL negotiation if we already have a direct SSL connection
|
||||
*/
|
||||
if (!LoadedSSL || port->laddr.addr.ss_family == AF_UNIX || port->ssl_in_use)
|
||||
SSLok = 'N';
|
||||
else
|
||||
SSLok = 'S'; /* Support for SSL */
|
||||
@ -487,11 +568,10 @@ ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done)
|
||||
(errmsg("SSLRequest rejected")));
|
||||
}
|
||||
|
||||
retry1:
|
||||
if (send(port->sock, &SSLok, 1, 0) != 1)
|
||||
while (secure_write(port, &SSLok, 1) != 1)
|
||||
{
|
||||
if (errno == EINTR)
|
||||
goto retry1; /* if interrupted, just retry */
|
||||
continue; /* if interrupted, just retry */
|
||||
ereport(COMMERROR,
|
||||
(errcode_for_socket_access(),
|
||||
errmsg("failed to send SSL negotiation response: %m")));
|
||||
@ -509,7 +589,7 @@ retry1:
|
||||
* encrypted and indeed may have been injected by a man-in-the-middle.
|
||||
* We report this case to the client.
|
||||
*/
|
||||
if (pq_buffer_has_data())
|
||||
if (pq_buffer_remaining_data() > 0)
|
||||
ereport(FATAL,
|
||||
(errcode(ERRCODE_PROTOCOL_VIOLATION),
|
||||
errmsg("received unencrypted data after SSL request"),
|
||||
@ -542,7 +622,7 @@ retry1:
|
||||
(errmsg("GSSENCRequest rejected")));
|
||||
}
|
||||
|
||||
while (send(port->sock, &GSSok, 1, 0) != 1)
|
||||
while (secure_write(port, &GSSok, 1) != 1)
|
||||
{
|
||||
if (errno == EINTR)
|
||||
continue;
|
||||
@ -563,7 +643,7 @@ retry1:
|
||||
* encrypted and indeed may have been injected by a man-in-the-middle.
|
||||
* We report this case to the client.
|
||||
*/
|
||||
if (pq_buffer_has_data())
|
||||
if (pq_buffer_remaining_data() > 0)
|
||||
ereport(FATAL,
|
||||
(errcode(ERRCODE_PROTOCOL_VIOLATION),
|
||||
errmsg("received unencrypted data after GSSAPI encryption request"),
|
||||
|
Reference in New Issue
Block a user