2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
2018-06-28 15:47:42 -04:00
|
|
|
//
|
2021-04-18 15:41:13 -04:00
|
|
|
// This file is part of MinIO Object Storage stack
|
2018-06-28 15:47:42 -04:00
|
|
|
//
|
2021-04-18 15:41:13 -04:00
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
2018-06-28 15:47:42 -04:00
|
|
|
//
|
2021-04-18 15:41:13 -04:00
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-06-28 15:47:42 -04:00
|
|
|
|
|
|
|
package crypto
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/rand"
|
|
|
|
"encoding/binary"
|
|
|
|
"errors"
|
|
|
|
"io"
|
2018-07-16 10:49:50 -04:00
|
|
|
"path"
|
2018-06-28 15:47:42 -04:00
|
|
|
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/fips"
|
2022-05-27 09:00:19 -04:00
|
|
|
"github.com/minio/minio/internal/hash/sha256"
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/logger"
|
2018-06-28 15:47:42 -04:00
|
|
|
"github.com/minio/sio"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ObjectKey is a 256 bit secret key used to encrypt the object.
|
|
|
|
// It must never be stored in plaintext.
|
|
|
|
type ObjectKey [32]byte
|
|
|
|
|
|
|
|
// GenerateKey generates a unique ObjectKey from a 256 bit external key
|
2018-08-01 04:02:07 -04:00
|
|
|
// and a source of randomness. If random is nil the default PRNG of the
|
|
|
|
// system (crypto/rand) is used.
|
2021-04-15 11:47:33 -04:00
|
|
|
func GenerateKey(extKey []byte, random io.Reader) (key ObjectKey) {
|
2018-06-28 15:47:42 -04:00
|
|
|
if random == nil {
|
|
|
|
random = rand.Reader
|
|
|
|
}
|
2021-04-22 11:45:30 -04:00
|
|
|
if len(extKey) != 32 { // safety check
|
|
|
|
logger.CriticalIf(context.Background(), errors.New("crypto: invalid key length"))
|
|
|
|
}
|
2018-06-28 15:47:42 -04:00
|
|
|
var nonce [32]byte
|
|
|
|
if _, err := io.ReadFull(random, nonce[:]); err != nil {
|
2018-07-18 01:40:34 -04:00
|
|
|
logger.CriticalIf(context.Background(), errOutOfEntropy)
|
2018-06-28 15:47:42 -04:00
|
|
|
}
|
crypto: generate OEK using HMAC-SHA256 instead of SHA256 (#19297)
This commit changes how MinIO generates the object encryption key (OEK)
when encrypting an object using server-side encryption.
This change is fully backwards compatible. Now, MinIO generates
the OEK as following:
```
Nonce = RANDOM(32) // generate 256 bit random value
OEK = HMAC-SHA256(EK, Context || Nonce)
```
Before, the OEK was computed as following:
```
Nonce = RANDOM(32) // generate 256 bit random value
OEK = SHA256(EK || Nonce)
```
The new scheme does not technically fix a security issue but
uses a more familiar scheme. The only requirement for the
OEK generation function is that it produces a (pseudo)random value
for every pair (`EK`,`Nonce`) as long as no `EK`-`Nonce` combination
is repeated. This prevents a faulty PRNG from repeating or generating
a "bad" key.
The previous scheme guarantees that the `OEK` is a (pseudo)random
value given that no pair (`EK`,`Nonce`) repeats under the assumption
that SHA256 is indistinguable from a random oracle.
The new scheme guarantees that the `OEK` is a (pseudo)random value
given that no pair (`EK`, `Nonce`) repeats under the assumption that
SHA256's underlying compression function is a PRF/PRP.
While the later is a weaker assumption, and therefore, less likely
to be false, both are considered true. SHA256 is believed to be
indistinguable from a random oracle AND its compression function
is assumed to be a PRF/PRP.
As far as the OEK generating is concerned, the OS random number
generator is not required to be pseudo-random but just non-repeating.
Apart from being more compatible to standard definitions and
descriptions for how to generate crypto. keys, this change does not
have any impact of the actual security of the OEK key generation.
Signed-off-by: Andreas Auernhammer <github@aead.dev>
2024-03-19 16:28:10 -04:00
|
|
|
|
|
|
|
const Context = "object-encryption-key generation"
|
|
|
|
mac := hmac.New(sha256.New, extKey)
|
|
|
|
mac.Write([]byte(Context))
|
|
|
|
mac.Write(nonce[:])
|
|
|
|
mac.Sum(key[:0])
|
2018-07-18 01:40:34 -04:00
|
|
|
return key
|
2018-06-28 15:47:42 -04:00
|
|
|
}
|
|
|
|
|
2018-08-01 04:02:07 -04:00
|
|
|
// GenerateIV generates a new random 256 bit IV from the provided source
|
|
|
|
// of randomness. If random is nil the default PRNG of the system
|
|
|
|
// (crypto/rand) is used.
|
|
|
|
func GenerateIV(random io.Reader) (iv [32]byte) {
|
|
|
|
if random == nil {
|
|
|
|
random = rand.Reader
|
|
|
|
}
|
|
|
|
if _, err := io.ReadFull(random, iv[:]); err != nil {
|
|
|
|
logger.CriticalIf(context.Background(), errOutOfEntropy)
|
|
|
|
}
|
|
|
|
return iv
|
|
|
|
}
|
|
|
|
|
2018-07-16 10:49:50 -04:00
|
|
|
// SealedKey represents a sealed object key. It can be stored
|
|
|
|
// at an untrusted location.
|
|
|
|
type SealedKey struct {
|
2024-01-18 02:03:17 -05:00
|
|
|
Key [64]byte // The encrypted and authenticated object-key.
|
2018-07-16 10:49:50 -04:00
|
|
|
IV [32]byte // The random IV used to encrypt the object-key.
|
|
|
|
Algorithm string // The sealing algorithm used to encrypt the object key.
|
|
|
|
}
|
|
|
|
|
2018-06-28 15:47:42 -04:00
|
|
|
// Seal encrypts the ObjectKey using the 256 bit external key and IV. The sealed
|
2018-07-16 10:49:50 -04:00
|
|
|
// key is also cryptographically bound to the object's path (bucket/object) and the
|
|
|
|
// domain (SSE-C or SSE-S3).
|
2021-04-15 11:47:33 -04:00
|
|
|
func (key ObjectKey) Seal(extKey []byte, iv [32]byte, domain, bucket, object string) SealedKey {
|
2021-04-22 11:45:30 -04:00
|
|
|
if len(extKey) != 32 {
|
|
|
|
logger.CriticalIf(context.Background(), errors.New("crypto: invalid key length"))
|
|
|
|
}
|
2018-07-16 10:49:50 -04:00
|
|
|
var (
|
|
|
|
sealingKey [32]byte
|
|
|
|
encryptedKey bytes.Buffer
|
|
|
|
)
|
2021-11-16 12:28:29 -05:00
|
|
|
mac := hmac.New(sha256.New, extKey)
|
2018-06-28 15:47:42 -04:00
|
|
|
mac.Write(iv[:])
|
2018-07-16 10:49:50 -04:00
|
|
|
mac.Write([]byte(domain))
|
|
|
|
mac.Write([]byte(SealAlgorithm))
|
|
|
|
mac.Write([]byte(path.Join(bucket, object))) // use path.Join for canonical 'bucket/object'
|
|
|
|
mac.Sum(sealingKey[:0])
|
2022-06-21 10:54:48 -04:00
|
|
|
if n, err := sio.Encrypt(&encryptedKey, bytes.NewReader(key[:]), sio.Config{Key: sealingKey[:], CipherSuites: fips.DARECiphers()}); n != 64 || err != nil {
|
2018-06-28 15:47:42 -04:00
|
|
|
logger.CriticalIf(context.Background(), errors.New("Unable to generate sealed key"))
|
|
|
|
}
|
2018-07-16 10:49:50 -04:00
|
|
|
sealedKey := SealedKey{
|
|
|
|
IV: iv,
|
|
|
|
Algorithm: SealAlgorithm,
|
|
|
|
}
|
|
|
|
copy(sealedKey.Key[:], encryptedKey.Bytes())
|
|
|
|
return sealedKey
|
2018-06-28 15:47:42 -04:00
|
|
|
}
|
|
|
|
|
2018-07-16 10:49:50 -04:00
|
|
|
// Unseal decrypts a sealed key using the 256 bit external key. Since the sealed key
|
|
|
|
// may be cryptographically bound to the object's path the same bucket/object as during sealing
|
2018-06-28 15:47:42 -04:00
|
|
|
// must be provided. On success the ObjectKey contains the decrypted sealed key.
|
2021-04-15 11:47:33 -04:00
|
|
|
func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error {
|
2022-01-02 12:15:06 -05:00
|
|
|
var unsealConfig sio.Config
|
2018-07-16 10:49:50 -04:00
|
|
|
switch sealedKey.Algorithm {
|
|
|
|
default:
|
2020-01-06 19:15:22 -05:00
|
|
|
return Errorf("The sealing algorithm '%s' is not supported", sealedKey.Algorithm)
|
2018-07-16 10:49:50 -04:00
|
|
|
case SealAlgorithm:
|
2021-11-16 12:28:29 -05:00
|
|
|
mac := hmac.New(sha256.New, extKey)
|
2018-07-16 10:49:50 -04:00
|
|
|
mac.Write(sealedKey.IV[:])
|
|
|
|
mac.Write([]byte(domain))
|
|
|
|
mac.Write([]byte(SealAlgorithm))
|
|
|
|
mac.Write([]byte(path.Join(bucket, object))) // use path.Join for canonical 'bucket/object'
|
2022-06-21 10:54:48 -04:00
|
|
|
unsealConfig = sio.Config{MinVersion: sio.Version20, Key: mac.Sum(nil), CipherSuites: fips.DARECiphers()}
|
2018-07-16 10:49:50 -04:00
|
|
|
case InsecureSealAlgorithm:
|
|
|
|
sha := sha256.New()
|
2021-11-16 12:28:29 -05:00
|
|
|
sha.Write(extKey)
|
2018-07-16 10:49:50 -04:00
|
|
|
sha.Write(sealedKey.IV[:])
|
2022-06-21 10:54:48 -04:00
|
|
|
unsealConfig = sio.Config{MinVersion: sio.Version10, Key: sha.Sum(nil), CipherSuites: fips.DARECiphers()}
|
2018-07-16 10:49:50 -04:00
|
|
|
}
|
2018-06-28 15:47:42 -04:00
|
|
|
|
2020-10-29 12:34:20 -04:00
|
|
|
if out, err := sio.DecryptBuffer(key[:0], sealedKey.Key[:], unsealConfig); len(out) != 32 || err != nil {
|
2018-09-06 15:31:12 -04:00
|
|
|
return ErrSecretKeyMismatch
|
2018-06-28 15:47:42 -04:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DerivePartKey derives an unique 256 bit key from an ObjectKey and the part index.
|
|
|
|
func (key ObjectKey) DerivePartKey(id uint32) (partKey [32]byte) {
|
|
|
|
var bin [4]byte
|
|
|
|
binary.LittleEndian.PutUint32(bin[:], id)
|
|
|
|
|
|
|
|
mac := hmac.New(sha256.New, key[:])
|
|
|
|
mac.Write(bin[:])
|
|
|
|
mac.Sum(partKey[:0])
|
2018-07-18 01:40:34 -04:00
|
|
|
return partKey
|
2018-06-28 15:47:42 -04:00
|
|
|
}
|
2018-10-16 13:02:19 -04:00
|
|
|
|
|
|
|
// SealETag seals the etag using the object key.
|
|
|
|
// It does not encrypt empty ETags because such ETags indicate
|
|
|
|
// that the S3 client hasn't sent an ETag = MD5(object) and
|
|
|
|
// the backend can pick an ETag value.
|
|
|
|
func (key ObjectKey) SealETag(etag []byte) []byte {
|
|
|
|
if len(etag) == 0 { // don't encrypt empty ETag - only if client sent ETag = MD5(object)
|
|
|
|
return etag
|
|
|
|
}
|
|
|
|
var buffer bytes.Buffer
|
|
|
|
mac := hmac.New(sha256.New, key[:])
|
|
|
|
mac.Write([]byte("SSE-etag"))
|
2022-06-21 10:54:48 -04:00
|
|
|
if _, err := sio.Encrypt(&buffer, bytes.NewReader(etag), sio.Config{Key: mac.Sum(nil), CipherSuites: fips.DARECiphers()}); err != nil {
|
2018-10-16 13:02:19 -04:00
|
|
|
logger.CriticalIf(context.Background(), errors.New("Unable to encrypt ETag using object key"))
|
|
|
|
}
|
|
|
|
return buffer.Bytes()
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnsealETag unseals the etag using the provided object key.
|
|
|
|
// It does not try to decrypt the ETag if len(etag) == 16
|
|
|
|
// because such ETags indicate that the S3 client hasn't sent
|
|
|
|
// an ETag = MD5(object) and the backend has picked an ETag value.
|
|
|
|
func (key ObjectKey) UnsealETag(etag []byte) ([]byte, error) {
|
|
|
|
if !IsETagSealed(etag) {
|
|
|
|
return etag, nil
|
|
|
|
}
|
|
|
|
mac := hmac.New(sha256.New, key[:])
|
|
|
|
mac.Write([]byte("SSE-etag"))
|
2022-06-21 10:54:48 -04:00
|
|
|
return sio.DecryptBuffer(make([]byte, 0, len(etag)), etag, sio.Config{Key: mac.Sum(nil), CipherSuites: fips.DARECiphers()})
|
2018-10-16 13:02:19 -04:00
|
|
|
}
|