From: Guus Sliepen Date: Sun, 7 Jan 2001 17:08:03 +0000 (+0000) Subject: - Description of protocol and authentication updated. X-Git-Tag: import-tinc-1.1~785^2~609 X-Git-Url: https://git.meshlink.io/?a=commitdiff_plain;h=96b6f958bc733c3963dd164caacd42513be47a86;p=meshlink - Description of protocol and authentication updated. --- diff --git a/doc/PROTOCOL b/doc/PROTOCOL index 8d7007a4..3ceff075 100644 --- a/doc/PROTOCOL +++ b/doc/PROTOCOL @@ -1,7 +1,7 @@ This is the protocol documentation for tinc, a Virtual Private Network daemon. - Copyright 2000 Guus Sliepen , - 2000 Ivo Timmmermans + Copyright 2000,2001 Guus Sliepen , + 2000,2001 Ivo Timmmermans Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this @@ -12,7 +12,7 @@ This is the protocol documentation for tinc, a Virtual Private Network daemon. provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. - $Id: PROTOCOL,v 1.1.2.3 2000/09/10 15:07:41 zarq Exp $ + $Id: PROTOCOL,v 1.1.2.4 2001/01/07 17:08:02 guus Exp $ 1. Protocols used in tinc @@ -24,28 +24,21 @@ makes TCP connections to other tinc daemons. It uses the "meta protocol" for these connections. To exchange packets on the virtual network, UDP connections are made and the "packet protocol" is used. Tinc also needs to exchange network packets with the kernel. This is -done using the ethertap device in Linux. Also planned is a generic -PPP interface, because it is supported on virtually all UNIX flavours. -The protocols for those interfaces will not be described in this -document. +done using the ethertap device or the universal TUN/TAP device that +can be found in various UNIX flavours. 2. Packet protocol ------------------ Normal packets are sent without any state information, so the layout -is pretty basic. An exception to this are the connections which only -use TCP (configured with the directive `TCPonly=yes'). An explanation -of this type of packet is given in the next chapter, when we explain -the meta protocol. +is pretty basic. A data packet can only be sent if the encryption key is known to both -parties, and the connection is activated. Normally, tinc opens a UDP -connection when it receives an acknowledgement that the newly set up -connection is properly initiated, and has been verified. +parties, and the connection is activated. If the encryption key is not +known, a request is sent to the destination using the meta connection +to retreive it. 0 1 2 3 -| SOURCE IP | -| SEQUENCE ID | | LEN | DATA : \ : DATA . } encrypted . : / @@ -66,32 +59,61 @@ possible to use tools such as telnet or netcat to connect to a tinc daemon and to read and write requests by hand, provided that one understands the numeric codes sent. -When tinc daemons connect to each other, they will have to -authenticate each other first. This is done by exchanging BASIC_INFO, -PASSPHRASE, PUBLIC_KEY and ACK requests. BASIC_INFO requests contain -the virtual address and netmask of the tinc daemon, protocol version, -port number and flags. This identifies that tinc daemon, though it -still has to be verified. To that end, passphrases and public keys are -exchanged. The passphrases are known at both ends, but they are -encrypted with the public key before transmission. This way, nobody -that sniffs the network can see what the passphrase actually was, and -at the same time this ensures that the other host really knows the -secret key that belongs to the public key it sends. If both hosts are -satisfied, the connection is activated, the contents of each other's -connection lists are exchanged and other requests may be sent. The -following diagram shows how authentication is done: - -Client Server ----------------------------------------------------------------- - - ----------------------------------------------------------------- - -The client must never make a connection to a server that is already in -it's connection list. Not only would it corrupt the connection list, -but it would also violate the tree property. The meta connections must -always be so that there are no loops. This is very important, because -certain requests are broadcast over the entire network of tinc -daemons. If there were loops in the network topology, some packets -would be forwarded in a ring until the end of times (or until the ring -breaks, which probably happens before time ends). +The authentication scheme is described in the SECURITY file. After a +succesful authentication, the server and the client will exchange all the +information about other tinc daemons and subnets they know of, so that both +sides (and all the other tinc daemons behind them) have their information +synchronised. + +daemon message +-------------------------------------------------------------------------- +origin ADD_HOST daemon a329e18c:655 0 + | | +--> options + | +---------> real address:port + +-------------------> name of new tinc daemon +origin ADD_SUBNET daemon 1,0a010100/ffffff00 + | | | +--> netmask + | | +----------> vpn IPv4 network address + | +----------------> subnet type (1=IPv4) + +--------------------> owner of this subnet +-------------------------------------------------------------------------- + +In case daemons leave the VPN, DEL_HOST and DEL_SUBNET messages with exactly +the same syntax are sent to inform the other daemons of the departure. + +The keys used to encrypt VPN packets are not sent out directly. This is +because it would generate a lot of traffic on VPNs with many daemons, and +chances are that not every tinc daemon will ever send a packet to every +other daemon. Instead, if a daemon needs a key it sends a request for it +via the meta connection of the nearest hop in the direction of the +destination. If any hop on the way has already learned the key, it will +act as a proxy and forward it's copy back to the requestor. + +daemon message +-------------------------------------------------------------------------- +daemon REQ_KEY origin destination + | +--> name of the tinc daemon it wants the key from + +----------> name of the daemon that wants the key +daemon ANS_KEY origin destination e4ae0b0a82d6e0078179b5290c62c7d0 + | | \______________________________/ + | | +--> 128 bits key + | +--> name of the daemon that wants the key + +----------> name of the daemon that uses this key +daemon KEY_CHANGED origin + +--> daemon that has changed it's packet key +-------------------------------------------------------------------------- + +There is also a mechanism to check if hosts are still alive. Since network +failures or a crash can cause a daemon to be killed without properly +shutting down the TCP connection, this is necessary to keep an up to date +connection list. Pings are sent at regular intervals, except when there +is also some other traffic. + +daemon message +-------------------------------------------------------------------------- +origin PING +dest. PONG +-------------------------------------------------------------------------- + +This basically covers everything that is sent over the meta connection by +tinc. diff --git a/doc/SECURITY b/doc/SECURITY index 5dce6397..670135c7 100644 --- a/doc/SECURITY +++ b/doc/SECURITY @@ -1,7 +1,7 @@ This is the security documentation for tinc, a Virtual Private Network daemon. - Copyright 2000 Guus Sliepen , - 2000 Ivo Timmmermans + Copyright 2000,2001 Guus Sliepen , + 2000,2001 Ivo Timmmermans Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this @@ -12,7 +12,7 @@ This is the security documentation for tinc, a Virtual Private Network daemon. provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. - $Id: SECURITY,v 1.1.2.3 2000/09/25 20:08:50 guus Exp $ + $Id: SECURITY,v 1.1.2.4 2001/01/07 17:08:03 guus Exp $ 1. Authentication @@ -27,10 +27,8 @@ The authentication protocol (see protocol.c for the up-to-date version) is: send_id(u) send_challenge(R) send_chal_reply(H) - --------------------------------------- - Any negotations about the meta protocol - encryption go here(u). - --------------------------------------- + send_metakey(R) + send_metakey(R) send_ack(u) send_ack(u) --------------------------------------- @@ -76,49 +74,6 @@ made, both sides have to agree on a key for this block cipher. To make sure that this key exchange is also done securely, and no man-in-the-middle attack is possible, RSA would be the best choice for exchanging keys. -Instead of doing RSA encryption again, tinc will use a part of the random -string that was exchanged during the authentication phase as the key for the -symmetric cipher. Some symmetric ciphers require a random initialisation vector -for improved security. This vector can be taken from the random string as well. - -Is this secure? I (Guus Sliepen) think at this moment that it is: - -- Since the random string cannot be decrypted by anyone eavesdropping or - playing man-in-the-middle, the symmetric key cannot be known by sniffing. -- The unencrypted returned hash value is supposed to be cryptographically - secure. Furthermore, it can only at most give a way 160 bits of information - from the complete random string which is longer than the key for the - symmetric cipher, so very few bits will actualy contain information about - the symmetric cipher key alone, if any. -- If the RSA encryption is cracked, the rest of the communications can be - decrypted anyway. -- If the symmetric cipher encryption is cracked without using the information - from the encrypted random strings or the hash values, this still won't give - the full plaintext for the random string, so it won't facilitate a known- - plaintext attack on the RSA encryption. -- RSA and symmetric ciphers are fundamentally different. It is very unlikely - that the overlap of both will create any interference that will facilitate - an easier-than-brute-force attack. - -Other options for key exchange could be: - -* A second exchange of RSA encrypted random strings. - This is equal to the former scheme just without knowing the hash value of - the unecrypted random string. Information theory tells that two seperate - RSA messages are as secure as one if the total amount of bits sent is the - same, so enlarging the challenge will make one exchange just as secure as - two seperate exchanges. - -* Diffie-Hellman with RSA signing. - This should be very secure, but there are a lot of pitfalls with using both - encryption with public keys and private keys together with the same keypair. - -* Diffie-Hellman with passphrases. - This is what tinc <= 1.0pre2 used to do. Passphrases are secret, exchanging - them must be done with great care, nobody may eavesdrop. Exchanging public - keys on the other hand is much safer, everybody may eavesdrop, just as long - as you are sure that the public key itself belongs to the right owner. - 3. Symmetric cipher -------------------- @@ -136,8 +91,9 @@ connections) and a client (a tinc daemon that is trying to connect to the tinc daemon playing server). The message strings here are kept short for clarity. The real length of the -exchanged messages is indicated. The capital words ID, CHALLENGE, CHAL_REPLY -and ACK are in reality replaced by the numbers 1, 2, 3 and 4 respectively. +exchanged messages is indicated. The capital words ID, CHALLENGE, CHAL_REPLY, +META_KEY and ACK are in reality replaced by the numbers 0, 1, 2, 3 and 4 +respectively. daemon message -------------------------------------------------------------------------- @@ -149,12 +105,8 @@ client ID client 8 0 | +---> version +-------> name of tinc daemon server CHALLENGE 57fb4b2ccd70d6bb35a64c142f47e61d - \________/\__/ - | +----> 64 bits initial vector and - +-----------> 448 bits symmetric cipher key for meta - data sent to the server \______________________________/ - +-> 2048 bits totally random string, encrypted + +-> KEYLENGTH bits totally random string, encrypted with client's public RSA key client CHAL_REPLY 191e23 +-> 160 bits SHA1 value of the complete decrypted @@ -164,22 +116,36 @@ server ID server 8 0 | +---> version +-------> name of tinc daemon client CHALLENGE da02add1817c1920989ba6ae2a49cecb - \________/\__/ - | +----> 64 bits initial vector and - +-----------> 448 bits symmetric cipher key for meta - data sent to the client \______________________________/ - +-> 2048 bits totally random string, encrypted + +-> KEYLENGTH bits totally random string, encrypted with server's public RSA key server CHAL_REPLY 2bdeed +-> 160 bits SHA1 value of the complete decrypted CHALLENGE sent by the client +client META_KEY 5f0823a93e35b69e7086ec7866ce582b + \______________________________/ + +-> KEYLENGTH bits totally random string, encrypted + with server's public RSA key +server META_KEY 6ab9c1640388f8f045d1a07f8a672630 + \______________________________/ + +-> KEYLENGTH bits totally random string, encrypted + with client's public RSA key client ACK server ACK -------------------------------------------------------------------------- When the server receives the ACK from the client, it should prepare itself for the fact that any subsequent data will be encrypted with the key the server -sent itself in the CHALLENGE. Ofcourse, this key is taken from the decrypted -version of that CHALLENGE, so that we will know for sure only the real client +sent itself in the META_KEY. Ofcourse, this key is taken from the decrypted +version of that META_KEY, so that we will know for sure only the real client can send us messages. The same goes for the client when it receives an ACK. + +5. Encryption of VPN packets +----------------------------- + +The VPN packets are also encrypted, but with a different key than the one used +for the meta connection. The reason is that VPN packets can also come from +other clients which do not have a meta connection with server. Each tinc daemon +propagates (on request) a separate key for packets that it receives. This key +is a random string, generated on the fly. Since it is exchanged using the meta +connection, this key itself will be encrypted.