| 1 | /* Copyright (C) 2014 eperi GmbH. |
| 2 | Copyright (C) 2015 MariaDB Corporation |
| 3 | |
| 4 | This program is free software; you can redistribute it and/or modify |
| 5 | it under the terms of the GNU General Public License as published by |
| 6 | the Free Software Foundation; version 2 of the License. |
| 7 | |
| 8 | This program is distributed in the hope that it will be useful, |
| 9 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 10 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 11 | GNU General Public License for more details. |
| 12 | |
| 13 | You should have received a copy of the GNU General Public License |
| 14 | along with this program; if not, write to the Free Software |
| 15 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ |
| 16 | |
| 17 | /******************************************************************//** |
| 18 | @file Parser.cc |
| 19 | A class to parse the key file |
| 20 | |
| 21 | How it works... |
| 22 | The location and usage can be configured via the configuration file. |
| 23 | Example |
| 24 | |
| 25 | [mysqld] |
| 26 | ... |
| 27 | file_key_management_filename = /home/mdb/keys.enc |
| 28 | file_key_management_filekey = secret |
| 29 | ... |
| 30 | |
| 31 | The keys are read from a file. |
| 32 | The filename is set up via the file_key_management_filename |
| 33 | configuration value. |
| 34 | file_key_management_filename is used to configure the absolute |
| 35 | path to this file. |
| 36 | |
| 37 | Examples: |
| 38 | file_key_management_filename = \\\\unc\\keys.enc (windows share) |
| 39 | file_key_management_filename = e:/tmp/keys.enc (windows path) |
| 40 | file_key_management_filename = /tmp/keys.enc (linux path) |
| 41 | |
| 42 | The key file contains AES keys as hex-encoded strings. |
| 43 | Supported are keys of size 128, 192 or 256 bits. |
| 44 | Example: |
| 45 | 1;F5502320F8429037B8DAEF761B189D12 |
| 46 | 2;770A8A65DA156D24EE2A093277530142770A8A65DA156D24EE2A093277530142 |
| 47 | |
| 48 | 1 is the key identifier which can be used for table creation, |
| 49 | it is followed by a AES key |
| 50 | |
| 51 | The key file could be encrypted and the key to decrypt the file can |
| 52 | be given with the optional file_key_management_filekey |
| 53 | parameter. |
| 54 | |
| 55 | The file key can also be located if FILE: is prepended to the |
| 56 | key. Then the following part is interpreted as absolute path to the |
| 57 | file containing the file key (which must be a text - not binary - string). |
| 58 | |
| 59 | Example: |
| 60 | |
| 61 | file_key_management_filekey = FILE:y:/secret256.enc |
| 62 | |
| 63 | If the key file can not be read at server startup, for example if the |
| 64 | file key is not present, the plugin will not start |
| 65 | access to encrypted tables will not be possible. |
| 66 | |
| 67 | Open SSL command line utility can be used to create an encrypted key file. |
| 68 | Example: |
| 69 | openssl enc -aes-256-cbc -md sha1 -k "secret" -in keys.txt -out keys.enc |
| 70 | ***********************************************************************/ |
| 71 | |
| 72 | #include <my_global.h> |
| 73 | #include "parser.h" |
| 74 | #include <m_string.h> |
| 75 | #include <mysys_err.h> |
| 76 | |
| 77 | #define FILE_PREFIX "FILE:" |
| 78 | #define MAX_KEY_FILE_SIZE 1024*1024 |
| 79 | #define MAX_SECRET_SIZE 256 |
| 80 | |
| 81 | /* |
| 82 | The values below are what one gets after |
| 83 | openssl enc -aes-256-cbc -md sha1 -k "secret" -in keys.txt -out keys.enc |
| 84 | */ |
| 85 | #define OpenSSL_prefix "Salted__" |
| 86 | #define OpenSSL_prefix_len (sizeof(OpenSSL_prefix) - 1) |
| 87 | #define OpenSSL_salt_len 8 |
| 88 | #define OpenSSL_key_len 32 |
| 89 | #define OpenSSL_iv_len 16 |
| 90 | |
| 91 | /** |
| 92 | Calculate key and iv from a given salt and secret as in the |
| 93 | openssl command-line tool |
| 94 | |
| 95 | @param salt [in] the given salt as extracted from the encrypted file |
| 96 | @param secret [in] the given secret as String, provided by the user |
| 97 | @param key [out] 32 Bytes of key are written to this pointer |
| 98 | @param iv [out] 16 Bytes of iv are written to this pointer |
| 99 | |
| 100 | Note, that in openssl this whole function can be reduced to |
| 101 | |
| 102 | #include <openssl/evp.h> |
| 103 | EVP_BytesToKey(EVP_aes_256_cbc(), EVP_sha1(), salt, |
| 104 | secret, strlen(secret), 1, key, iv); |
| 105 | |
| 106 | but alas! we want to support yassl too |
| 107 | */ |
| 108 | |
| 109 | void Parser::bytes_to_key(const unsigned char *salt, const char *input, |
| 110 | unsigned char *key, unsigned char *iv) |
| 111 | { |
| 112 | unsigned char digest[MY_SHA1_HASH_SIZE]; |
| 113 | int key_left = OpenSSL_key_len; |
| 114 | int iv_left = OpenSSL_iv_len; |
| 115 | const size_t ilen= strlen(input); |
| 116 | const size_t slen= OpenSSL_salt_len; // either this or explicit (size_t) casts below |
| 117 | |
| 118 | my_sha1_multi(digest, input, ilen, salt, slen, NullS); |
| 119 | |
| 120 | while (iv_left) |
| 121 | { |
| 122 | int left= MY_SHA1_HASH_SIZE; |
| 123 | if (key_left) |
| 124 | { |
| 125 | int store = MY_MIN(key_left, MY_SHA1_HASH_SIZE); |
| 126 | memcpy(&key[OpenSSL_key_len - key_left], digest, store); |
| 127 | |
| 128 | key_left -= store; |
| 129 | left -= store; |
| 130 | } |
| 131 | |
| 132 | if (iv_left && left) |
| 133 | { |
| 134 | int store= MY_MIN(iv_left, left); |
| 135 | memcpy(&iv[OpenSSL_iv_len - iv_left], &digest[MY_SHA1_HASH_SIZE - left], store); |
| 136 | |
| 137 | iv_left -= store; |
| 138 | } |
| 139 | |
| 140 | if (iv_left) |
| 141 | my_sha1_multi(digest, digest, MY_SHA1_HASH_SIZE, |
| 142 | input, ilen, salt, slen, NullS); |
| 143 | } |
| 144 | } |
| 145 | |
| 146 | |
| 147 | bool Parser::parse(std::map<uint,keyentry> *keys) |
| 148 | { |
| 149 | const char *secret= filekey; |
| 150 | char buf[MAX_SECRET_SIZE + 1]; |
| 151 | |
| 152 | //If secret starts with FILE: interpret the secret as a filename. |
| 153 | if (strncmp(filekey, FILE_PREFIX,sizeof(FILE_PREFIX) -1) == 0) |
| 154 | { |
| 155 | if (read_filekey(filekey + sizeof(FILE_PREFIX) - 1, buf)) |
| 156 | return 1; |
| 157 | secret= buf; |
| 158 | } |
| 159 | |
| 160 | return parse_file(keys, secret); |
| 161 | } |
| 162 | |
| 163 | |
| 164 | /* |
| 165 | secret is limited to MAX_SECRET_SIZE characters |
| 166 | */ |
| 167 | |
| 168 | bool Parser::read_filekey(const char *filekey, char *secret) |
| 169 | { |
| 170 | int f= open(filekey, O_RDONLY|O_BINARY); |
| 171 | if (f == -1) |
| 172 | { |
| 173 | my_error(EE_FILENOTFOUND,ME_ERROR_LOG, filekey, errno); |
| 174 | return 1; |
| 175 | } |
| 176 | |
| 177 | int len= read(f, secret, MAX_SECRET_SIZE); |
| 178 | if (len <= 0) |
| 179 | { |
| 180 | my_error(EE_READ,ME_ERROR_LOG, filekey, errno); |
| 181 | close(f); |
| 182 | return 1; |
| 183 | } |
| 184 | close(f); |
| 185 | while (secret[len - 1] == '\r' || secret[len - 1] == '\n') len--; |
| 186 | secret[len]= '\0'; |
| 187 | return 0; |
| 188 | } |
| 189 | |
| 190 | |
| 191 | /** |
| 192 | Get the keys from the key file <filename> and decrypt it with the |
| 193 | key <secret>. Store the keys with id smaller then <maxKeyId> in an |
| 194 | array of structs keyentry. |
| 195 | |
| 196 | @return 0 when ok, 1 for an error |
| 197 | */ |
| 198 | |
| 199 | bool Parser::parse_file(std::map<uint,keyentry> *keys, const char *secret) |
| 200 | { |
| 201 | char *buffer= read_and_decrypt_file(secret); |
| 202 | |
| 203 | if (!buffer) |
| 204 | return 1; |
| 205 | |
| 206 | keyentry key; |
| 207 | char *line=buffer; |
| 208 | |
| 209 | while (*line) |
| 210 | { |
| 211 | line_number++; |
| 212 | switch (parse_line(&line, &key)) { |
| 213 | case 1: // comment |
| 214 | break; |
| 215 | case -1: // error |
| 216 | free(buffer); |
| 217 | return 1; |
| 218 | case 0: |
| 219 | (*keys)[key.id] = key; |
| 220 | break; |
| 221 | } |
| 222 | } |
| 223 | |
| 224 | free(buffer); |
| 225 | if (keys->size() == 0 || (*keys)[1].id == 0) |
| 226 | { |
| 227 | report_error("System key id 1 is missing" , 0); |
| 228 | return 1; |
| 229 | } |
| 230 | |
| 231 | return 0; |
| 232 | } |
| 233 | |
| 234 | void Parser::report_error(const char *reason, size_t position) |
| 235 | { |
| 236 | my_printf_error(EE_READ, "%s at %s line %u, column %zu" , |
| 237 | ME_ERROR_LOG, reason, filename, line_number, position + 1); |
| 238 | } |
| 239 | |
| 240 | /* |
| 241 | return 0 - new key |
| 242 | 1 - comment |
| 243 | -1 - error |
| 244 | */ |
| 245 | int Parser::parse_line(char **line_ptr, keyentry *key) |
| 246 | { |
| 247 | int res= 1; |
| 248 | char *p= *line_ptr; |
| 249 | while (isspace(*p) && *p != '\n') p++; |
| 250 | if (*p != '#' && *p != '\n') |
| 251 | { |
| 252 | if (!isdigit(*p)) |
| 253 | { |
| 254 | report_error("Syntax error" , p - *line_ptr); |
| 255 | return -1; |
| 256 | } |
| 257 | |
| 258 | longlong id = 0; |
| 259 | while (isdigit(*p)) |
| 260 | { |
| 261 | id = id * 10 + *p - '0'; |
| 262 | if (id > UINT_MAX32) |
| 263 | { |
| 264 | report_error("Invalid key id" , p - *line_ptr); |
| 265 | return -1; |
| 266 | } |
| 267 | p++; |
| 268 | } |
| 269 | |
| 270 | if (id < 1) |
| 271 | { |
| 272 | report_error("Invalid key id" , p - *line_ptr); |
| 273 | return -1; |
| 274 | } |
| 275 | |
| 276 | if (*p != ';') |
| 277 | { |
| 278 | report_error("Syntax error" , p - *line_ptr); |
| 279 | return -1; |
| 280 | } |
| 281 | |
| 282 | p++; |
| 283 | key->id= (unsigned int)id; |
| 284 | key->length=0; |
| 285 | while (isxdigit(p[0]) && isxdigit(p[1]) && key->length < sizeof(key->key)) |
| 286 | { |
| 287 | key->key[key->length++] = from_hex(p[0]) * 16 + from_hex(p[1]); |
| 288 | p+=2; |
| 289 | } |
| 290 | if (isxdigit(*p) || |
| 291 | (key->length != 16 && key->length != 24 && key->length != 32)) |
| 292 | { |
| 293 | report_error("Invalid key" , p - *line_ptr); |
| 294 | return -1; |
| 295 | } |
| 296 | |
| 297 | res= 0; |
| 298 | } |
| 299 | while (*p && *p != '\n') p++; |
| 300 | *line_ptr= *p == '\n' ? p + 1 : p; |
| 301 | return res; |
| 302 | } |
| 303 | |
| 304 | /** |
| 305 | Decrypt the key file 'filename' if it is encrypted with the key |
| 306 | 'secret'. Store the content of the decrypted file in 'buffer'. The |
| 307 | buffer has to be freed in the calling function. |
| 308 | */ |
| 309 | #ifdef _WIN32 |
| 310 | #define lseek _lseeki64 |
| 311 | #endif |
| 312 | |
| 313 | char* Parser::read_and_decrypt_file(const char *secret) |
| 314 | { |
| 315 | int f; |
| 316 | if (!filename || !filename[0]) |
| 317 | { |
| 318 | my_printf_error(EE_CANT_OPEN_STREAM, "file-key-management-filename is not set" , |
| 319 | ME_ERROR_LOG); |
| 320 | goto err0; |
| 321 | } |
| 322 | |
| 323 | f= open(filename, O_RDONLY|O_BINARY, 0); |
| 324 | if (f < 0) |
| 325 | { |
| 326 | my_error(EE_FILENOTFOUND, ME_ERROR_LOG, filename, errno); |
| 327 | goto err0; |
| 328 | } |
| 329 | |
| 330 | my_off_t file_size; |
| 331 | file_size= lseek(f, 0, SEEK_END); |
| 332 | |
| 333 | if (file_size == MY_FILEPOS_ERROR || (my_off_t)lseek(f, 0, SEEK_SET) == MY_FILEPOS_ERROR) |
| 334 | { |
| 335 | my_error(EE_CANT_SEEK, MYF(0), filename, errno); |
| 336 | goto err1; |
| 337 | } |
| 338 | |
| 339 | if (file_size > MAX_KEY_FILE_SIZE) |
| 340 | { |
| 341 | my_error(EE_READ, MYF(0), filename, EFBIG); |
| 342 | goto err1; |
| 343 | } |
| 344 | |
| 345 | //Read file into buffer |
| 346 | uchar *buffer; |
| 347 | buffer= (uchar*)malloc((size_t)file_size + 1); |
| 348 | if (!buffer) |
| 349 | { |
| 350 | my_error(EE_OUTOFMEMORY, ME_ERROR_LOG| ME_FATAL, file_size); |
| 351 | goto err1; |
| 352 | } |
| 353 | |
| 354 | if (read(f, buffer, (int)file_size) != (int)file_size) |
| 355 | { |
| 356 | my_printf_error(EE_READ, |
| 357 | "read from %s failed, errno %d" , |
| 358 | MYF(ME_ERROR_LOG|ME_FATAL), filename, errno); |
| 359 | goto err2; |
| 360 | } |
| 361 | |
| 362 | // Check for file encryption |
| 363 | uchar *decrypted; |
| 364 | if (file_size > OpenSSL_prefix_len && strncmp((char*)buffer, OpenSSL_prefix, OpenSSL_prefix_len) == 0) |
| 365 | { |
| 366 | uchar key[OpenSSL_key_len]; |
| 367 | uchar iv[OpenSSL_iv_len]; |
| 368 | |
| 369 | decrypted= (uchar*)malloc((size_t)file_size); |
| 370 | if (!decrypted) |
| 371 | { |
| 372 | my_error(EE_OUTOFMEMORY, ME_ERROR_LOG | ME_FATAL, file_size); |
| 373 | goto err2; |
| 374 | } |
| 375 | bytes_to_key(buffer + OpenSSL_prefix_len, secret, key, iv); |
| 376 | uint32 d_size; |
| 377 | if (my_aes_crypt(MY_AES_CBC, ENCRYPTION_FLAG_DECRYPT, |
| 378 | buffer + OpenSSL_prefix_len + OpenSSL_salt_len, |
| 379 | (unsigned int)file_size - OpenSSL_prefix_len - OpenSSL_salt_len, |
| 380 | decrypted, &d_size, key, OpenSSL_key_len, |
| 381 | iv, OpenSSL_iv_len)) |
| 382 | |
| 383 | { |
| 384 | my_printf_error(EE_READ, "Cannot decrypt %s. Wrong key?" , ME_ERROR_LOG, filename); |
| 385 | goto err3; |
| 386 | } |
| 387 | |
| 388 | free(buffer); |
| 389 | buffer= decrypted; |
| 390 | file_size= d_size; |
| 391 | } |
| 392 | else if (*secret) |
| 393 | { |
| 394 | my_printf_error(EE_READ, "Cannot decrypt %s. Not encrypted" , ME_ERROR_LOG, filename); |
| 395 | goto err2; |
| 396 | } |
| 397 | |
| 398 | buffer[file_size]= '\0'; |
| 399 | close(f); |
| 400 | return (char*) buffer; |
| 401 | |
| 402 | err3: |
| 403 | free(decrypted); |
| 404 | err2: |
| 405 | free(buffer); |
| 406 | err1: |
| 407 | close(f); |
| 408 | err0: |
| 409 | return NULL; |
| 410 | } |
| 411 | |