linux-crypto.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: James Yonan <james@openvpn.net>
To: James Yonan <james@openvpn.net>
Cc: herbert@gondor.hengli.com.au, linux-crypto@vger.kernel.org,
	Daniel Borkmann <dborkman@redhat.com>,
	Florian Weimer <fw@deneb.enyo.de>
Subject: Re: crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Date: Thu, 26 Sep 2013 11:45:59 -0600	[thread overview]
Message-ID: <524472D7.2000609@openvpn.net> (raw)
In-Reply-To: <1380183639-6288-1-git-send-email-james@openvpn.net>

Here is the latest iteration of the constant-time memory 
equality-testing patch:

* This patch includes contributions and a signoff from Daniel Borkmann.

* Moved the optimization flag -Os (used to prevent early return 
optimization) into the Makefile after seeing a report that #pragma gcc 
is considered broken and unmaintained.

* Added #ifndef __HAVE_ARCH_CRYPTO_MEMNEQ to accommodate possible future 
arch-specific asm implementations.

* For clarity, separated the size-independent function 
(__crypto_memneq_generic) from the fast-path optimization for 16 bytes 
(__crypto_memneq_16) using a switch so that future fast-path data widths 
can be easily added.

* Reduce the number of #ifdefs by using sizeof(unsigned long) instead of 
BITS_PER_LONG.

* Shortened the public function name to crypto_memneq.

James

On 26/09/2013 02:20, James Yonan wrote:
> When comparing MAC hashes, AEAD authentication tags, or other hash
> values in the context of authentication or integrity checking, it
> is important not to leak timing information to a potential attacker,
> i.e. when communication happens over a network.
>
> Bytewise memory comparisons (such as memcmp) are usually optimized so
> that they return a nonzero value as soon as a mismatch is found. E.g,
> on x86_64/i5 for 512 bytes this can be ~50 cyc for a full mismatch
> and up to ~850 cyc for a full match (cold). This early-return behavior
> can leak timing information as a side channel, allowing an attacker to
> iteratively guess the correct result.
>
> This patch adds a new method crypto_memneq ("memory not equal to each
> other") to the crypto API that compares memory areas of the same length
> in roughly "constant time" (cache misses could change the timing, but
> since they don't reveal information about the content of the strings
> being compared, they are effectively benign). Iow, best and worst case
> behaviour take the same amount of time to complete (in contrast to
> memcmp).
>
> Note that crypto_memneq (unlike memcmp) can only be used to test for
> equality or inequality, NOT for lexicographical order. This, however,
> is not an issue for its use-cases within the crypto API.
>
> We tried to locate all of the places in the crypto API where memcmp was
> being used for authentication or integrity checking, and convert them
> over to crypto_memneq.
>
> crypto_memneq is declared noinline, placed in its own source file,
> and compiled with optimizations that might increase code size disabled
> ("Os") because a smart compiler (or LTO) might notice that the return
> value is always compared against zero/nonzero, and might then
> reintroduce the same early-return optimization that we are trying to
> avoid.
>
> Using #pragma or __attribute__ optimization annotations of the code
> for disabling optimization was avoided as it seems to be considered
> broken or unmaintained for long time in GCC [1]. Therefore, we work
> around that by specifying the compile flag for memneq.o directly in
> the Makefile. We found that this seems to be most appropriate.
>
> As we use ("Os"), this patch also provides a loop-free "fast-path" for
> frequently used 16 byte digests. Similarly to kernel library string
> functions, leave an option for future even further optimized architecture
> specific assembler implementations.
>
> This was a joint work of James Yonan and Daniel Borkmann. Also thanks
> for feedback from Florian Weimer on this and earlier proposals [2].
>
>    [1] http://gcc.gnu.org/ml/gcc/2012-07/msg00211.html
>    [2] https://lkml.org/lkml/2013/2/10/131
>
> Signed-off-by: James Yonan <james@openvpn.net>
> Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
> Cc: Florian Weimer <fw@deneb.enyo.de>
> ---
>   crypto/Makefile              |   7 ++-
>   crypto/asymmetric_keys/rsa.c |   5 +-
>   crypto/authenc.c             |   6 +-
>   crypto/authencesn.c          |   8 +--
>   crypto/ccm.c                 |   4 +-
>   crypto/gcm.c                 |   2 +-
>   crypto/memneq.c              | 138 +++++++++++++++++++++++++++++++++++++++++++
>   include/crypto/algapi.h      |  18 +++++-
>   8 files changed, 174 insertions(+), 14 deletions(-)
>   create mode 100644 crypto/memneq.c
>
> diff --git a/crypto/Makefile b/crypto/Makefile
> index 2d5ed08..b88cdf0 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -2,8 +2,13 @@
>   # Cryptographic API
>   #
>
> +# memneq MUST be built with -Os or -O0 to prevent early-return optimizations
> +# that will defeat memneq's actual purpose to prevent timing attacks.
> +CFLAGS_REMOVE_memneq.o := -O1 -O2 -O3
> +CFLAGS_memneq.o := -Os
> +
>   obj-$(CONFIG_CRYPTO) += crypto.o
> -crypto-y := api.o cipher.o compress.o
> +crypto-y := api.o cipher.o compress.o memneq.o
>
>   obj-$(CONFIG_CRYPTO_WORKQUEUE) += crypto_wq.o
>
> diff --git a/crypto/asymmetric_keys/rsa.c b/crypto/asymmetric_keys/rsa.c
> index 4a6a069..1912b9b 100644
> --- a/crypto/asymmetric_keys/rsa.c
> +++ b/crypto/asymmetric_keys/rsa.c
> @@ -13,6 +13,7 @@
>   #include <linux/module.h>
>   #include <linux/kernel.h>
>   #include <linux/slab.h>
> +#include <crypto/algapi.h>
>   #include "public_key.h"
>
>   MODULE_LICENSE("GPL");
> @@ -189,12 +190,12 @@ static int RSA_verify(const u8 *H, const u8 *EM, size_t k, size_t hash_size,
>   		}
>   	}
>
> -	if (memcmp(asn1_template, EM + T_offset, asn1_size) != 0) {
> +	if (crypto_memneq(asn1_template, EM + T_offset, asn1_size) != 0) {
>   		kleave(" = -EBADMSG [EM[T] ASN.1 mismatch]");
>   		return -EBADMSG;
>   	}
>
> -	if (memcmp(H, EM + T_offset + asn1_size, hash_size) != 0) {
> +	if (crypto_memneq(H, EM + T_offset + asn1_size, hash_size) != 0) {
>   		kleave(" = -EKEYREJECTED [EM[T] hash mismatch]");
>   		return -EKEYREJECTED;
>   	}
> diff --git a/crypto/authenc.c b/crypto/authenc.c
> index ffce19d..2b3f4ab 100644
> --- a/crypto/authenc.c
> +++ b/crypto/authenc.c
> @@ -188,7 +188,7 @@ static void authenc_verify_ahash_update_done(struct crypto_async_request *areq,
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
>
> -	err = memcmp(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
> +	err = crypto_memneq(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
>   	if (err)
>   		goto out;
>
> @@ -227,7 +227,7 @@ static void authenc_verify_ahash_done(struct crypto_async_request *areq,
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
>
> -	err = memcmp(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
> +	err = crypto_memneq(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
>   	if (err)
>   		goto out;
>
> @@ -462,7 +462,7 @@ static int crypto_authenc_verify(struct aead_request *req,
>   	ihash = ohash + authsize;
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
> -	return memcmp(ihash, ohash, authsize) ? -EBADMSG : 0;
> +	return crypto_memneq(ihash, ohash, authsize) ? -EBADMSG : 0;
>   }
>
>   static int crypto_authenc_iverify(struct aead_request *req, u8 *iv,
> diff --git a/crypto/authencesn.c b/crypto/authencesn.c
> index ab53762..c569d58 100644
> --- a/crypto/authencesn.c
> +++ b/crypto/authencesn.c
> @@ -247,7 +247,7 @@ static void authenc_esn_verify_ahash_update_done(struct crypto_async_request *ar
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
>
> -	err = memcmp(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
> +	err = crypto_memneq(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
>   	if (err)
>   		goto out;
>
> @@ -296,7 +296,7 @@ static void authenc_esn_verify_ahash_update_done2(struct crypto_async_request *a
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
>
> -	err = memcmp(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
> +	err = crypto_memneq(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
>   	if (err)
>   		goto out;
>
> @@ -336,7 +336,7 @@ static void authenc_esn_verify_ahash_done(struct crypto_async_request *areq,
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
>
> -	err = memcmp(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
> +	err = crypto_memneq(ihash, ahreq->result, authsize) ? -EBADMSG : 0;
>   	if (err)
>   		goto out;
>
> @@ -568,7 +568,7 @@ static int crypto_authenc_esn_verify(struct aead_request *req)
>   	ihash = ohash + authsize;
>   	scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen,
>   				 authsize, 0);
> -	return memcmp(ihash, ohash, authsize) ? -EBADMSG : 0;
> +	return crypto_memneq(ihash, ohash, authsize) ? -EBADMSG : 0;
>   }
>
>   static int crypto_authenc_esn_iverify(struct aead_request *req, u8 *iv,
> diff --git a/crypto/ccm.c b/crypto/ccm.c
> index 499c917..3e05499 100644
> --- a/crypto/ccm.c
> +++ b/crypto/ccm.c
> @@ -363,7 +363,7 @@ static void crypto_ccm_decrypt_done(struct crypto_async_request *areq,
>
>   	if (!err) {
>   		err = crypto_ccm_auth(req, req->dst, cryptlen);
> -		if (!err && memcmp(pctx->auth_tag, pctx->odata, authsize))
> +		if (!err && crypto_memneq(pctx->auth_tag, pctx->odata, authsize))
>   			err = -EBADMSG;
>   	}
>   	aead_request_complete(req, err);
> @@ -422,7 +422,7 @@ static int crypto_ccm_decrypt(struct aead_request *req)
>   		return err;
>
>   	/* verify */
> -	if (memcmp(authtag, odata, authsize))
> +	if (crypto_memneq(authtag, odata, authsize))
>   		return -EBADMSG;
>
>   	return err;
> diff --git a/crypto/gcm.c b/crypto/gcm.c
> index 43e1fb0..b4f0179 100644
> --- a/crypto/gcm.c
> +++ b/crypto/gcm.c
> @@ -582,7 +582,7 @@ static int crypto_gcm_verify(struct aead_request *req,
>
>   	crypto_xor(auth_tag, iauth_tag, 16);
>   	scatterwalk_map_and_copy(iauth_tag, req->src, cryptlen, authsize, 0);
> -	return memcmp(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
> +	return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
>   }
>
>   static void gcm_decrypt_done(struct crypto_async_request *areq, int err)
> diff --git a/crypto/memneq.c b/crypto/memneq.c
> new file mode 100644
> index 0000000..cd01622
> --- /dev/null
> +++ b/crypto/memneq.c
> @@ -0,0 +1,138 @@
> +/*
> + * Constant-time equality testing of memory regions.
> + *
> + * Authors:
> + *
> + *   James Yonan <james@openvpn.net>
> + *   Daniel Borkmann <dborkman@redhat.com>
> + *
> + * This file is provided under a dual BSD/GPLv2 license.  When using or
> + * redistributing this file, you may do so under either license.
> + *
> + * GPL LICENSE SUMMARY
> + *
> + * Copyright(c) 2013 OpenVPN Technologies, Inc. All rights reserved.
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of version 2 of the GNU General Public License as
> + * published by the Free Software Foundation.
> + *
> + * This program is distributed in the hope that it will be useful, but
> + * WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> + * General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program; if not, write to the Free Software
> + * Foundation, Inc., 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
> + * The full GNU General Public License is included in this distribution
> + * in the file called LICENSE.GPL.
> + *
> + * BSD LICENSE
> + *
> + * Copyright(c) 2013 OpenVPN Technologies, Inc. All rights reserved.
> + *
> + * Redistribution and use in source and binary forms, with or without
> + * modification, are permitted provided that the following conditions
> + * are met:
> + *
> + *   * Redistributions of source code must retain the above copyright
> + *     notice, this list of conditions and the following disclaimer.
> + *   * Redistributions in binary form must reproduce the above copyright
> + *     notice, this list of conditions and the following disclaimer in
> + *     the documentation and/or other materials provided with the
> + *     distribution.
> + *   * Neither the name of OpenVPN Technologies nor the names of its
> + *     contributors may be used to endorse or promote products derived
> + *     from this software without specific prior written permission.
> + *
> + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> + * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> + * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> + * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> + * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> + */
> +
> +#include <crypto/algapi.h>
> +
> +#ifndef __HAVE_ARCH_CRYPTO_MEMNEQ
> +
> +/* Generic path for arbitrary size */
> +static inline unsigned long
> +__crypto_memneq_generic(const void *a, const void *b, size_t size)
> +{
> +	unsigned long neq = 0;
> +
> +#if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS)
> +	while (size >= sizeof(unsigned long)) {
> +		neq |= *(unsigned long *)a ^ *(unsigned long *)b;
> +		a += sizeof(unsigned long);
> +		b += sizeof(unsigned long);
> +		size -= sizeof(unsigned long);
> +	}
> +#endif /* CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS */
> +	while (size > 0) {
> +		neq |= *(unsigned char *)a ^ *(unsigned char *)b;
> +		a += 1;
> +		b += 1;
> +		size -= 1;
> +	}
> +	return neq;
> +}
> +
> +/* Loop-free fast-path for frequently used 16-byte size */
> +static inline unsigned long __crypto_memneq_16(const void *a, const void *b)
> +{
> +#ifdef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS
> +	if (sizeof(unsigned long) == 8)
> +		return ((*(unsigned long *)(a)   ^ *(unsigned long *)(b))
> +		      | (*(unsigned long *)(a+8) ^ *(unsigned long *)(b+8)));
> +	else if (sizeof(unsigned int) == 4)
> +		return ((*(unsigned int *)(a)    ^ *(unsigned int *)(b))
> +                      | (*(unsigned int *)(a+4)  ^ *(unsigned int *)(b+4))
> +		      | (*(unsigned int *)(a+8)  ^ *(unsigned int *)(b+8))
> +	              | (*(unsigned int *)(a+12) ^ *(unsigned int *)(b+12)));
> +	else
> +#endif /* CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS */
> +		return ((*(unsigned char *)(a)    ^ *(unsigned char *)(b))
> +		      | (*(unsigned char *)(a+1)  ^ *(unsigned char *)(b+1))
> +		      | (*(unsigned char *)(a+2)  ^ *(unsigned char *)(b+2))
> +		      | (*(unsigned char *)(a+3)  ^ *(unsigned char *)(b+3))
> +		      | (*(unsigned char *)(a+4)  ^ *(unsigned char *)(b+4))
> +		      | (*(unsigned char *)(a+5)  ^ *(unsigned char *)(b+5))
> +		      | (*(unsigned char *)(a+6)  ^ *(unsigned char *)(b+6))
> +		      | (*(unsigned char *)(a+7)  ^ *(unsigned char *)(b+7))
> +		      | (*(unsigned char *)(a+8)  ^ *(unsigned char *)(b+8))
> +		      | (*(unsigned char *)(a+9)  ^ *(unsigned char *)(b+9))
> +		      | (*(unsigned char *)(a+10) ^ *(unsigned char *)(b+10))
> +		      | (*(unsigned char *)(a+11) ^ *(unsigned char *)(b+11))
> +		      | (*(unsigned char *)(a+12) ^ *(unsigned char *)(b+12))
> +		      | (*(unsigned char *)(a+13) ^ *(unsigned char *)(b+13))
> +		      | (*(unsigned char *)(a+14) ^ *(unsigned char *)(b+14))
> +		      | (*(unsigned char *)(a+15) ^ *(unsigned char *)(b+15)));
> +}
> +
> +/* Compare two areas of memory without leaking timing information,
> + * and with special optimizations for common sizes.  Users should
> + * not call this function directly, but should instead use
> + * crypto_memneq defined in crypto/algapi.h.
> + */
> +noinline unsigned long __crypto_memneq(const void *a, const void *b,
> +				       size_t size)
> +{
> +	switch (size) {
> +	case 16:
> +		return __crypto_memneq_16(a, b);
> +	default:
> +		return __crypto_memneq_generic(a, b, size);
> +	}
> +}
> +EXPORT_SYMBOL(__crypto_memneq);
> +
> +#endif /* __HAVE_ARCH_CRYPTO_MEMNEQ */
> diff --git a/include/crypto/algapi.h b/include/crypto/algapi.h
> index 418d270..e73c19e 100644
> --- a/include/crypto/algapi.h
> +++ b/include/crypto/algapi.h
> @@ -386,5 +386,21 @@ static inline int crypto_requires_sync(u32 type, u32 mask)
>   	return (type ^ CRYPTO_ALG_ASYNC) & mask & CRYPTO_ALG_ASYNC;
>   }
>
> -#endif	/* _CRYPTO_ALGAPI_H */
> +noinline unsigned long __crypto_memneq(const void *a, const void *b, size_t size);
> +
> +/**
> + * crypto_memneq - Compare two areas of memory without leaking
> + *		   timing information.
> + *
> + * @a: One area of memory
> + * @b: Another area of memory
> + * @size: The size of the area.
> + *
> + * Returns 0 when data is equal, 1 otherwise.
> + */
> +static inline int crypto_memneq(const void *a, const void *b, size_t size)
> +{
> +	return __crypto_memneq(a, b, size) != 0UL ? 1 : 0;
> +}
>
> +#endif	/* _CRYPTO_ALGAPI_H */
>

  reply	other threads:[~2013-09-26 17:46 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-09-26  8:20 crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks James Yonan
2013-09-26 17:45 ` James Yonan [this message]
2013-10-07  7:10 ` Herbert Xu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=524472D7.2000609@openvpn.net \
    --to=james@openvpn.net \
    --cc=dborkman@redhat.com \
    --cc=fw@deneb.enyo.de \
    --cc=herbert@gondor.hengli.com.au \
    --cc=linux-crypto@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).