open-vault/vault/barrier_aes_gcm.go

352 lines
8.5 KiB
Go
Raw Normal View History

2015-03-05 21:27:35 +00:00
package vault
import (
"crypto/aes"
"crypto/cipher"
"crypto/rand"
2015-03-05 21:57:45 +00:00
"encoding/json"
2015-03-05 21:27:35 +00:00
"fmt"
"strings"
2015-03-05 21:27:35 +00:00
"sync"
2015-04-08 23:43:17 +00:00
"time"
2015-03-05 21:27:35 +00:00
2015-04-08 23:43:17 +00:00
"github.com/armon/go-metrics"
2015-03-05 21:27:35 +00:00
"github.com/hashicorp/vault/physical"
)
const (
// keyEpoch is the hard coded key epoch. Eventually, when
// a key ring is supported for online key rotation, the epoch
// will be incremented and represents the encryption key to use.
keyEpoch = 1
// epochSize is the number of bytes used for the key epoch.
epochSize = 4
2015-03-05 21:27:35 +00:00
// aesgcmVersionByte is prefixed to a message to allow for
// future versioning of barrier implementations.
aesgcmVersionByte = 0x1
)
2015-03-05 21:57:45 +00:00
// barrierInit is the JSON encoded value stored
type barrierInit struct {
Version int // Version is the current format version
Key []byte // Key is the primary encryption key
}
// AESGCMBarrier is a SecurityBarrier implementation that uses the AES
// cipher core and the Galois Counter Mode block mode. It defaults to
// the golang NONCE default value of 12 and a key size of 256
// bit. AES-GCM is high performance, and provides both confidentiality
2015-03-05 21:27:35 +00:00
// and integrity.
type AESGCMBarrier struct {
backend physical.Backend
l sync.RWMutex
sealed bool
// primary is the AEAD keyed from the encryption key.
// This is the cipher that should be used to encrypt/decrypt
// all the underlying values. It will be available if the
// barrier is unsealed.
primary cipher.AEAD
}
// NewAESGCMBarrier is used to construct a new barrier that uses
// the provided physical backend for storage.
func NewAESGCMBarrier(physical physical.Backend) (*AESGCMBarrier, error) {
b := &AESGCMBarrier{
backend: physical,
sealed: true,
}
return b, nil
}
// Initialized checks if the barrier has been initialized
// and has a master key set.
func (b *AESGCMBarrier) Initialized() (bool, error) {
// Read the init sentinel file
out, err := b.backend.Get(barrierInitPath)
if err != nil {
return false, fmt.Errorf("failed to check for initialization: %v", err)
}
return out != nil, nil
}
// Initialize works only if the barrier has not been initialized
// and makes use of the given master key.
func (b *AESGCMBarrier) Initialize(key []byte) error {
// Verify the key size
min, max := b.KeyLength()
if len(key) < min || len(key) > max {
return fmt.Errorf("Key size must be %d or %d", min, max)
2015-03-05 21:27:35 +00:00
}
// Check if already initialized
if alreadyInit, err := b.Initialized(); err != nil {
return err
} else if alreadyInit {
return ErrBarrierAlreadyInit
}
// Create the AES-GCM
gcm, err := b.aeadFromKey(key)
if err != nil {
return err
}
// Generate encryption key
encrypt, err := b.GenerateKey()
if err != nil {
return fmt.Errorf("failed to generate encryption key: %v", err)
}
defer memzero(encrypt)
2015-03-05 21:57:45 +00:00
// Create the barrier init entry
init := barrierInit{
Version: 1,
Key: encrypt,
}
buf, err := json.Marshal(init)
if err != nil {
return fmt.Errorf("failed to create barrier entry: %v", err)
}
defer memzero(buf)
// Encrypt the barrier init value
value := b.encrypt(gcm, buf)
2015-03-05 21:27:35 +00:00
// Create the barrierInitPath
2015-03-05 21:57:45 +00:00
pe := &physical.Entry{
2015-03-05 21:27:35 +00:00
Key: barrierInitPath,
Value: value,
}
2015-03-05 21:57:45 +00:00
if err := b.backend.Put(pe); err != nil {
2015-03-05 21:27:35 +00:00
return fmt.Errorf("failed to create initialization key: %v", err)
}
return nil
}
// GenerateKey is used to generate a new key
func (b *AESGCMBarrier) GenerateKey() ([]byte, error) {
2015-04-15 20:33:40 +00:00
// Generate a 256bit key
buf := make([]byte, 2*aes.BlockSize)
2015-03-05 21:27:35 +00:00
_, err := rand.Read(buf)
return buf, err
}
2015-03-12 18:20:27 +00:00
// KeyLength is used to sanity check a key
func (b *AESGCMBarrier) KeyLength() (int, int) {
return aes.BlockSize, 2 * aes.BlockSize
2015-03-12 18:20:27 +00:00
}
2015-03-05 21:27:35 +00:00
// Sealed checks if the barrier has been unlocked yet. The Barrier
// is not expected to be able to perform any CRUD until it is unsealed.
func (b *AESGCMBarrier) Sealed() (bool, error) {
b.l.RLock()
defer b.l.RUnlock()
return b.sealed, nil
}
// Unseal is used to provide the master key which permits the barrier
// to be unsealed. If the key is not correct, the barrier remains sealed.
func (b *AESGCMBarrier) Unseal(key []byte) error {
b.l.Lock()
defer b.l.Unlock()
// Do nothing if already unsealed
if !b.sealed {
return nil
}
// Read the barrier initialization key
out, err := b.backend.Get(barrierInitPath)
if err != nil {
return fmt.Errorf("failed to check for initialization: %v", err)
}
if out == nil {
return ErrBarrierNotInit
}
// Create the AES-GCM
gcm, err := b.aeadFromKey(key)
if err != nil {
return err
}
// Decrypt the barrier init key
2015-03-05 21:57:45 +00:00
plain, err := b.decrypt(gcm, out.Value)
2015-03-05 21:27:35 +00:00
if err != nil {
if strings.Contains(err.Error(), "message authentication failed") {
return ErrBarrierInvalidKey
}
2015-03-05 21:27:35 +00:00
return err
}
2015-03-05 21:57:45 +00:00
defer memzero(plain)
// Unmarshal the barrier init
var init barrierInit
if err := json.Unmarshal(plain, &init); err != nil {
return fmt.Errorf("failed to unmarshal barrier init file")
}
defer memzero(init.Key)
2015-03-05 21:27:35 +00:00
// Initialize the master encryption key
2015-03-05 21:57:45 +00:00
b.primary, err = b.aeadFromKey(init.Key)
2015-03-05 21:27:35 +00:00
if err != nil {
return err
}
// Set the vault as unsealed
b.sealed = false
return nil
}
// Seal is used to re-seal the barrier. This requires the barrier to
// be unsealed again to perform any further operations.
func (b *AESGCMBarrier) Seal() error {
b.l.Lock()
defer b.l.Unlock()
// Remove the primary key, and seal the vault
b.primary = nil
b.sealed = true
return nil
}
// Put is used to insert or update an entry
func (b *AESGCMBarrier) Put(entry *Entry) error {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"barrier", "put"}, time.Now())
2015-03-05 21:27:35 +00:00
b.l.RLock()
defer b.l.RUnlock()
primary := b.primary
if primary == nil {
return ErrBarrierSealed
}
pe := &physical.Entry{
Key: entry.Key,
Value: b.encrypt(primary, entry.Value),
}
return b.backend.Put(pe)
}
// Get is used to fetch an entry
func (b *AESGCMBarrier) Get(key string) (*Entry, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"barrier", "get"}, time.Now())
2015-03-05 21:27:35 +00:00
b.l.RLock()
defer b.l.RUnlock()
primary := b.primary
if primary == nil {
return nil, ErrBarrierSealed
}
// Read the key from the backend
pe, err := b.backend.Get(key)
if err != nil {
return nil, err
} else if pe == nil {
return nil, nil
}
// Decrypt the ciphertext
plain, err := b.decrypt(primary, pe.Value)
if err != nil {
return nil, fmt.Errorf("decryption failed: %v", err)
}
// Wrap in a logical entry
entry := &Entry{
Key: key,
Value: plain,
}
return entry, nil
}
// Delete is used to permanently delete an entry
func (b *AESGCMBarrier) Delete(key string) error {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"barrier", "delete"}, time.Now())
2015-03-05 21:27:35 +00:00
b.l.RLock()
defer b.l.RUnlock()
if b.sealed {
return ErrBarrierSealed
}
return b.backend.Delete(key)
}
// List is used ot list all the keys under a given
// prefix, up to the next prefix.
func (b *AESGCMBarrier) List(prefix string) ([]string, error) {
2015-04-08 23:43:17 +00:00
defer metrics.MeasureSince([]string{"barrier", "list"}, time.Now())
2015-03-05 21:27:35 +00:00
b.l.RLock()
defer b.l.RUnlock()
if b.sealed {
return nil, ErrBarrierSealed
}
return b.backend.List(prefix)
}
// aeadFromKey returns an AES-GCM AEAD using the given key.
func (b *AESGCMBarrier) aeadFromKey(key []byte) (cipher.AEAD, error) {
// Create the AES cipher
aesCipher, err := aes.NewCipher(key)
if err != nil {
return nil, fmt.Errorf("failed to create cipher: %v", err)
}
// Create the GCM mode AEAD
gcm, err := cipher.NewGCM(aesCipher)
if err != nil {
return nil, fmt.Errorf("failed to initialize GCM mode")
}
return gcm, nil
}
// encrypt is used to encrypt a value
func (b *AESGCMBarrier) encrypt(gcm cipher.AEAD, plain []byte) []byte {
// Allocate the output buffer with room for epoch, version byte,
2015-03-05 21:27:35 +00:00
// nonce, GCM tag and the plaintext
capacity := epochSize + 1 + gcm.NonceSize() + gcm.Overhead() + len(plain)
size := epochSize + 1 + gcm.NonceSize()
2015-03-05 21:27:35 +00:00
out := make([]byte, size, capacity)
// Set the epoch to 1
out[3] = keyEpoch
2015-03-05 21:27:35 +00:00
// Set the version byte
out[4] = aesgcmVersionByte
2015-03-05 21:27:35 +00:00
// Generate a random nonce
nonce := out[5 : 5+gcm.NonceSize()]
2015-03-05 21:27:35 +00:00
rand.Read(nonce)
// Seal the output
out = gcm.Seal(out, nonce, plain, nil)
return out
}
// decrypt is used to decrypt a value
func (b *AESGCMBarrier) decrypt(gcm cipher.AEAD, cipher []byte) ([]byte, error) {
// Verify the epoch
if cipher[0] != 0 || cipher[1] != 0 || cipher[2] != 0 || cipher[3] != keyEpoch {
return nil, fmt.Errorf("epoch mis-match")
}
2015-03-05 21:27:35 +00:00
// Verify the version byte
if cipher[4] != aesgcmVersionByte {
2015-03-05 21:27:35 +00:00
return nil, fmt.Errorf("version bytes mis-match")
}
// Capture the parts
nonce := cipher[5 : 5+gcm.NonceSize()]
raw := cipher[5+gcm.NonceSize():]
2015-03-05 21:27:35 +00:00
out := make([]byte, 0, len(raw)-gcm.NonceSize())
// Attempt to open
return gcm.Open(out, nonce, raw, nil)
}