From patchwork Mon Sep 17 03:40:01 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arne Schwabe X-Patchwork-Id: 464 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director11.mail.ord1d.rsapps.net ([172.30.191.6]) by backend30.mail.ord1d.rsapps.net (Dovecot) with LMTP id DSQhEwyvn1sARgAAIUCqbw for ; Mon, 17 Sep 2018 09:41:32 -0400 Received: from proxy19.mail.ord1d.rsapps.net ([172.30.191.6]) by director11.mail.ord1d.rsapps.net with LMTP id iH5CNAyvn1tlXAAAvGGmqA ; Mon, 17 Sep 2018 09:41:32 -0400 Received: from smtp16.gate.ord1c ([172.30.191.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy19.mail.ord1d.rsapps.net with LMTP id kF3tMwyvn1sxOgAAyH2SIw ; Mon, 17 Sep 2018 09:41:32 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp16.gate.ord1c.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dmarc=none (p=nil; dis=none) header.from=rfc2549.org X-Suspicious-Flag: YES X-Classification-ID: 625ad2a6-ba7f-11e8-95b2-bc305bf036a4-1-1 Received: from [216.105.38.7] ([216.105.38.7:40094] helo=lists.sourceforge.net) by smtp16.gate.ord1c.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 33/9B-05947-B0FAF9B5; Mon, 17 Sep 2018 09:41:31 -0400 Received: from [127.0.0.1] (helo=sfs-ml-1.v29.lw.sourceforge.com) by sfs-ml-1.v29.lw.sourceforge.com with esmtp (Exim 4.90_1) (envelope-from ) id 1g1tlH-0002Cm-K7; Mon, 17 Sep 2018 13:40:23 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-1.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1g1tlF-0002CQ-NX for openvpn-devel@lists.sourceforge.net; Mon, 17 Sep 2018 13:40:21 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=References:In-Reply-To:Message-Id:Date:Subject:To: From:Sender:Reply-To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=iymMRHL+4e59KGKifC1y06ydLfbqm7Gdms8Pf5BLOIY=; b=BOtNaOs/0ATuGadHgujskaODhb P1ugIwCIuufO9Q7sVlFnnLqgENETMUJCiQ4id3h+oLmxgCxhRt0GHrFaR96OgMEQ6qIpyyFURql5g ymRMlBYSQh9xEcacDspAGe5vINWfiwiitX8YjCFVBsVyaMubfs1lZSYeNochJtz0xeiQ=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=References:In-Reply-To:Message-Id:Date:Subject:To:From:Sender:Reply-To:Cc :MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=iymMRHL+4e59KGKifC1y06ydLfbqm7Gdms8Pf5BLOIY=; b=MlZr6tN31K8qYUc6YW4qGlrpdZ /Q908sQ4VaFnXWqqdo+3rhfAAhE++i+tjteAF02wghxiNoQ+dFJWnI5MYI/z8gUN8FurhNw1QJn8e wXvtaffrt1N4uNbhOH3u6onTk5wypAQbWDX5CpYq45KRaY/THQbxIoRjBNdHVldKQ7x4=; Received: from mail.blinkt.de ([192.26.174.232]) by sfi-mx-3.v28.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) id 1g1tl5-000ty3-FS for openvpn-devel@lists.sourceforge.net; Mon, 17 Sep 2018 13:40:21 +0000 Received: from kamera.blinkt.de ([2001:638:502:390:20c:29ff:fec8:535c]) by mail.blinkt.de with smtp (Exim 4.91 (FreeBSD)) (envelope-from ) id 1g1tkv-000OMG-MJ for openvpn-devel@lists.sourceforge.net; Mon, 17 Sep 2018 15:40:01 +0200 Received: (nullmailer pid 11710 invoked by uid 10006); Mon, 17 Sep 2018 13:40:01 -0000 From: Arne Schwabe To: openvpn-devel@lists.sourceforge.net Date: Mon, 17 Sep 2018 15:40:01 +0200 Message-Id: <20180917134001.11666-1-arne@rfc2549.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180912110713.31670-1-arne@rfc2549.or> References: <20180912110713.31670-1-arne@rfc2549.or> X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.0 LOTS_OF_MONEY Huge... sums of money -0.0 AWL AWL: Adjusted score from AWL reputation of From: address X-Headers-End: 1g1tl5-000ty3-FS Subject: [Openvpn-devel] [PATCH v2] Make compression asymmetric by default and add warnings X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox This commit introduces the allow-compression option that allow changing the new default to the previous default or to a stricter version. Warning are not generated in the post option check (options_postprocess_mutate) since these warnings should also be shown on pushed options. Patch V2: fix spelling and grammer (thanks tincantech), also fix uncompressiable to incompressible in three other instances in the source code --- doc/openvpn.8 | 44 +++++++++++++++++---- src/openvpn/comp-lz4.c | 3 +- src/openvpn/comp.c | 2 +- src/openvpn/comp.h | 16 ++++++-- src/openvpn/lzo.c | 2 +- src/openvpn/mtu.h | 2 +- src/openvpn/options.c | 90 ++++++++++++++++++++++++++++++++++++------ 7 files changed, 132 insertions(+), 27 deletions(-) diff --git a/doc/openvpn.8 b/doc/openvpn.8 index de1a1928..be37d640 100644 --- a/doc/openvpn.8 +++ b/doc/openvpn.8 @@ -2508,26 +2508,54 @@ Enable a compression algorithm. The .B algorithm -parameter may be "lzo", "lz4", or empty. LZO and LZ4 -are different compression algorithms, with LZ4 generally +parameter may be "lzo", "lz4", "lz4\-v2", "stub", "stub\-v2" or empty. +LZO and LZ4 are different compression algorithms, with LZ4 generally offering the best performance with least CPU usage. For backwards compatibility with OpenVPN versions before v2.4, use "lzo" (which is identical to the older option "\-\-comp\-lzo yes"). +The "lz4\-v2" and "stub\-v2" variants implement a better framing that does not add +overhead when packets cannot be compressed. All other variants always add one extra +framing byte compared to no compression framing. + If the .B algorithm -parameter is empty, compression will be turned off, but the packet -framing for compression will still be enabled, allowing a different -setting to be pushed later. +parameter is "stub", "stub\-v2", or empty, compression will be turned off, but +the packet framing for compression will still be enabled, allowing a different +setting to be pushed later. Additionally, "stub" and "stub\-v2" will disable +announcing lzo and lz4 compression support via "IV_" variables to the server. + .B Security Considerations Compression and encryption is a tricky combination. If an attacker knows or is able to control (parts of) the plaintext of packets that contain secrets, the attacker might be able to extract the secret if compression is enabled. See -e.g. the CRIME and BREACH attacks on TLS which also leverage compression to -break encryption. If you are not entirely sure that the above does not apply -to your traffic, you are advised to *not* enable compression. +e.g. the CRIME and BREACH attacks on TLS and VORACLE on VPNs which also leverage +compression to break encryption. If you are not entirely sure that the above does +not apply to your traffic, you are advised to *not* enable compression. + +.\"********************************************************* +.TP +.B \-\-allow-compression [mode] +As described in +\.B \-\-compress +option, compression is potentially dangerous option. This option allows +controlling the behaviour of OpenVPN when compression is used and allowed. +.B mode +may be "yes", "no", or "asym" (default). + +With allow-compression set to "no", OpenVPN will refuse any non stub +compression. With "yes" OpenVPN will send and receive compressed packets. +With "asym", the default, OpenVPN will only decompress (downlink) packets but +not compress (uplink) packets. This also allows migrating to disable compression +when changing both server and client configurations to remove compression at the +same time is not a feasible option. + +The default of asym has been chosen to maximise compatibility with existing +configuration while at the same time phasing out compression in existing +deployment by disabling compression on the uplink, effectively completely disabling +compression if both client and server are upgraded. .\"********************************************************* .TP diff --git a/src/openvpn/comp-lz4.c b/src/openvpn/comp-lz4.c index f2916bdd..2f6ce3f3 100644 --- a/src/openvpn/comp-lz4.c +++ b/src/openvpn/comp-lz4.c @@ -70,8 +70,9 @@ do_lz4_compress(struct buffer *buf, { /* * In order to attempt compression, length must be at least COMPRESS_THRESHOLD. + * and asymmetric compression must be disabled */ - if (buf->len >= COMPRESS_THRESHOLD) + if (buf->len >= COMPRESS_THRESHOLD && (compctx->flags & COMP_F_NO_ASYM)) { const size_t ps = PAYLOAD_SIZE(frame); int zlen_max = ps + COMP_EXTRA_BUFFER(ps); diff --git a/src/openvpn/comp.c b/src/openvpn/comp.c index a9459133..9b131137 100644 --- a/src/openvpn/comp.c +++ b/src/openvpn/comp.c @@ -127,7 +127,7 @@ void comp_add_to_extra_buffer(struct frame *frame) { /* Leave room for compression buffer to expand in worst case scenario - * where data is totally uncompressible */ + * where data is totally incompressible */ frame_add_to_extra_buffer(frame, COMP_EXTRA_BUFFER(EXPANDED_SIZE(frame))); } diff --git a/src/openvpn/comp.h b/src/openvpn/comp.h index 0dadd1e6..a1a19ed1 100644 --- a/src/openvpn/comp.h +++ b/src/openvpn/comp.h @@ -52,10 +52,12 @@ */ /* Compression flags */ -#define COMP_F_ADAPTIVE (1<<0) /* COMP_ALG_LZO only */ -#define COMP_F_ASYM (1<<1) /* only downlink is compressed, not uplink */ -#define COMP_F_SWAP (1<<2) /* initial command byte is swapped with last byte in buffer to preserve payload alignment */ +#define COMP_F_ADAPTIVE (1<<0) /* COMP_ALG_LZO only */ +#define COMP_F_NO_ASYM (1<<1) /* not only downlink is compressed but also uplink */ +#define COMP_F_SWAP (1<<2) /* initial command byte is swapped with last byte in buffer to preserve payload alignment */ #define COMP_F_ADVERTISE_STUBS_ONLY (1<<3) /* tell server that we only support compression stubs */ +#define COMP_F_ALLOW_STUB_ONLY (1<<4) /* Only accept stub compression, even with COMP_F_ADVERTISE_STUBS_ONLY + * we still accept other compressions to be pushed */ /* @@ -188,6 +190,14 @@ comp_enabled(const struct compress_options *info) return info->alg != COMP_ALG_UNDEF; } +static inline bool +comp_non_stub_enabled (const struct compress_options *info) +{ + return info->alg != COMP_ALGV2_UNCOMPRESSED && + info->alg != COMP_ALG_STUB && + info->alg != COMP_ALG_UNDEF; +} + static inline bool comp_unswapped_prefix(const struct compress_options *info) { diff --git a/src/openvpn/lzo.c b/src/openvpn/lzo.c index e3be6adf..61bf0c12 100644 --- a/src/openvpn/lzo.c +++ b/src/openvpn/lzo.c @@ -123,7 +123,7 @@ lzo_compress_uninit(struct compress_context *compctx) static inline bool lzo_compression_enabled(struct compress_context *compctx) { - if (compctx->flags & COMP_F_ASYM) + if (!(compctx->flags & COMP_F_NO_ASYM)) { return false; } diff --git a/src/openvpn/mtu.h b/src/openvpn/mtu.h index a82154af..0b9889da 100644 --- a/src/openvpn/mtu.h +++ b/src/openvpn/mtu.h @@ -45,7 +45,7 @@ * ifconfig $1 10.1.0.2 pointopoint 10.1.0.1 mtu 1450 * * Compression overflow bytes is the worst-case size expansion that would be - * expected if we tried to compress mtu + extra_frame bytes of uncompressible data. + * expected if we tried to compress mtu + extra_frame bytes of incompressible data. */ /* diff --git a/src/openvpn/options.c b/src/openvpn/options.c index 61fa9833..b5baec82 100644 --- a/src/openvpn/options.c +++ b/src/openvpn/options.c @@ -349,9 +349,10 @@ static const char usage_message[] = #endif #if defined(USE_COMP) "--compress alg : Use compression algorithm alg\n" + "--allow-compression: Specify wether compression should be allowed\n" #if defined(ENABLE_LZO) "--comp-lzo : Use LZO compression -- may add up to 1 byte per\n" - " packet for uncompressible data.\n" + " packet for incompressible data.\n" "--comp-noadapt : Don't use adaptive compression when --comp-lzo\n" " is specified.\n" #endif @@ -4952,6 +4953,19 @@ set_user_script(struct options *options, #endif } +static void show_compression_warning(struct compress_options *info) +{ + if (comp_non_stub_enabled(info)) + { + /* Check if already displayed the strong warning and enabled full compression */ + if (!(info->flags & COMP_F_NO_ASYM)) + { + msg(M_WARN, "WARNING: Compression enabled, Compression has been used in the past to " + "break encryption. Enabling decompression of received packet only. " + "Sent packets are not compressed."); + } + } +} static void add_option(struct options *options, @@ -7368,29 +7382,73 @@ add_option(struct options *options, } #endif #if defined(USE_COMP) + else if (streq(p[0], "allow-compression") && p[1] && !p[2]) + { + VERIFY_PERMISSION(OPT_P_COMP); + + if (streq(p[1], "no")) + { + options->comp.flags = COMP_F_ALLOW_STUB_ONLY|COMP_F_ADVERTISE_STUBS_ONLY; + if (comp_non_stub_enabled(&options->comp)) { + msg(msglevel, "'--allow-compression no' conflicts with enabling compression"); + /* we could manipulate the algorithm to a stub/no variant but the only scenario + * that the previous message does not abort the program is when pushed from a server + * and the server probably has a very confused configuration, so keep whatever we have */ + } + } + else if (options->comp.flags & COMP_F_ALLOW_STUB_ONLY) + { + msg(msglevel, "Cannot set allow-compression to '%s' after set to 'no'", p[1]); + goto err; + } + else if (streq(p[1], "asym")) + { + options->comp.flags &= ~COMP_F_NO_ASYM; + } + else if (streq(p[1], "yes")) + { + msg(M_WARN, "WARNING: Compression enabled, Compression has been used in the past to break encryption. " + "Allowing compression allows attacks that break encryption. " + "Using '--allow-compression yes' is strongly discouraged for common usage. " + "See --compress in the manual page for more information"); + options->comp.flags |= COMP_F_NO_ASYM; + } + else + { + msg(msglevel, "bad allow-compression option: %s -- must be 'yes', 'no', or 'asym'", p[1]); + goto err; + } + } else if (streq(p[0], "comp-lzo") && !p[2]) { VERIFY_PERMISSION(OPT_P_COMP); + /* All lzo variants do not use swap */ + options->comp.flags &= ~COMP_F_SWAP; #if defined(ENABLE_LZO) if (p[1] && streq(p[1], "no")) #endif { options->comp.alg = COMP_ALG_STUB; - options->comp.flags = 0; + options->comp.flags &= ~COMP_F_ADAPTIVE; } #if defined(ENABLE_LZO) + else if (options->comp.flags & COMP_F_ALLOW_STUB_ONLY) + { + msg(msglevel, "Cannot set comp-lzo to '%s', allow-compression is set to 'no'", p[1]); + goto err; + } else if (p[1]) { if (streq(p[1], "yes")) { options->comp.alg = COMP_ALG_LZO; - options->comp.flags = 0; + options->comp.flags &= ~COMP_F_ADAPTIVE; } else if (streq(p[1], "adaptive")) { options->comp.alg = COMP_ALG_LZO; - options->comp.flags = COMP_F_ADAPTIVE; + options->comp.flags |= COMP_F_ADAPTIVE; } else { @@ -7401,12 +7459,15 @@ add_option(struct options *options, else { options->comp.alg = COMP_ALG_LZO; - options->comp.flags = COMP_F_ADAPTIVE; + options->comp.flags |= COMP_F_ADAPTIVE; } + show_compression_warning(&options->comp); #endif /* if defined(ENABLE_LZO) */ } else if (streq(p[0], "comp-noadapt") && !p[1]) { + /* We do not need to check here if we allow compression since + * it only modifies a flag if compression is enabled */ VERIFY_PERMISSION(OPT_P_COMP); options->comp.flags &= ~COMP_F_ADAPTIVE; } @@ -7418,30 +7479,34 @@ add_option(struct options *options, if (streq(p[1], "stub")) { options->comp.alg = COMP_ALG_STUB; - options->comp.flags = (COMP_F_SWAP|COMP_F_ADVERTISE_STUBS_ONLY); + options->comp.flags |= (COMP_F_SWAP|COMP_F_ADVERTISE_STUBS_ONLY); } else if (streq(p[1], "stub-v2")) { options->comp.alg = COMP_ALGV2_UNCOMPRESSED; - options->comp.flags = COMP_F_ADVERTISE_STUBS_ONLY; + options->comp.flags |= COMP_F_ADVERTISE_STUBS_ONLY; + } + else if (options->comp.flags & COMP_F_ALLOW_STUB_ONLY) + { + msg(msglevel, "Cannot set compress to '%s', allow-compression is set to 'no'", p[1]); + goto err; } #if defined(ENABLE_LZO) else if (streq(p[1], "lzo")) { options->comp.alg = COMP_ALG_LZO; - options->comp.flags = 0; + options->comp.flags &= ~(COMP_F_ADAPTIVE | COMP_F_SWAP); } #endif #if defined(ENABLE_LZ4) else if (streq(p[1], "lz4")) { options->comp.alg = COMP_ALG_LZ4; - options->comp.flags = COMP_F_SWAP; + options->comp.flags |= COMP_F_SWAP; } else if (streq(p[1], "lz4-v2")) { options->comp.alg = COMP_ALGV2_LZ4; - options->comp.flags = 0; } #endif else @@ -7453,8 +7518,9 @@ add_option(struct options *options, else { options->comp.alg = COMP_ALG_STUB; - options->comp.flags = COMP_F_SWAP; + options->comp.flags |= COMP_F_SWAP; } + show_compression_warning(&options->comp); } #endif /* USE_COMP */ else if (streq(p[0], "show-ciphers") && !p[1]) @@ -8345,4 +8411,4 @@ add_option(struct options *options, } err: gc_free(&gc); -} +} \ No newline at end of file