沙塔免私钥SSL加速解决方案的私钥服务器代码。
This repository contains a reference implementation of ShataCloud’s keyless
SSL server.
The ShataCloud Keyless SSL client communicates to the server via a binary
protocol over a mutually authenticated TLS 1.2 tunnel. Messages are in binary
format and identified by a unique ID.
Messages consist of a fixed length header, and a variable length body. The
body of the message consists of a sequence of items in TLV (tag, length,
value) messages.
All messages with major version 1 will conform to the following
format. The minor version is currently set to 0 and is reserved for
communicating policy information.
Header:
0 - - 1 - - 2 - - 3 - - 4 - - - - 6 - - 7 - - 8
| Maj | Min | Length | ID |
| Body |
| Body | <- 8 + Length
Item:
0 - - 1 - - 2 - - 3 - - 4 - - - - 6 - - 7 - - 8
| Tag | Length | Data |
| Data | <- 3 + Length
All numbers are in network byte order (big endian).
The following tag values are possible for items:
0x01 - Certificate Digest,
0x02 - Server Name Indication,
0x03 - Client's IP address,
0x11 - Opcode,
0x12 - Payload,
A requests contains a header and the following items:
0x01 - length: 32 bytes, data: SHA256 of RSA modulus
0x02 - length: variable, data: SNI string
0x03 - length: 4 or 16 bytes, data: IPv4/6 address
0x11 - length: 1, data: opcode describing operation
0x12 - length: variable, data: payload to sign or encrypt
The following opcodes are supported in the opcode item:
0x01 - operation: RSA decrypt payload
0x02 - operation: RSA sign MD5SHA1
0x03 - operation: RSA sign SHA1
0x04 - operation: RSA sign SHA224
0x05 - operation: RSA sign SHA256
0x06 - operation: RSA sign SHA384
0x07 - operation: RSA sign SHA512
0x08 - operation: RSA raw decrypt payload
0x12 - operation: ECDSA sign MD5SHA1
0x13 - operation: ECDSA sign SHA1
0x14 - operation: ECDSA sign SHA224
0x15 - operation: ECDSA sign SHA256
0x16 - operation: ECDSA sign SHA384
0x17 - operation: ECDSA sign SHA512
Responses contain a header with a matching ID and only two items:
0x11 - length: 1, data: opcode describing operation status
0x12 - length: variable, data: payload response
The following opcodes are supported in the opcode item:
0xF0 - operation: success, payload: modified payload
0xFF - operation: RSA decrypt payload, payload:
On an error, these are the possible 1-byte payloads:
0x01 - cryptography failure
0x02 - key not found - no matching certificate ID
0x03 - read error - disk read failure
0x04 - version mismatch - unsupported version incorrect
0x05 - bad opcode - use of unknown opcode in request
0x06 - unexpected opcode - use of response opcode in request
0x07 - format error - malformed message
0x08 - internal error - memory or other internal error
Defines and further details of the protocol can be found in kssl.h
The Keyless SSL server is a TLS server and therefore requires cryptographic
keys. All requests are mutually authenticated, so both the client and the
server need a TLS 1.2 compatible key pair. The client must present a client
certificate that can be verified against the CA that the keyless server is
configured to use.
The server will need a valid key and certificate pair in PEM format. The
following options are required and take a path to these files. These two
parameters set up the certificate (and associated private key) that will be
presented by the server when a client connects.
--server-cert
--server-key
The private keys that this server is able to use should be stored in
PEM format in a directory denoted by the option:
--private-key-directory
In order to authenticate the client’s certificate, a custom CA file is
required. This CA file available is provided by ShataCloud and specified
with:
--ca-file
Use Git to get the latest development version from our repository:
git clone https://github.com/shatacloud/keyless.git
cd keyless
make && make install
Alternatively you can just
download the
bleeding edge code directly.
A typical invocation of keyless
might look like:
keyless --port=2412 --server-cert=server-cert/cert.pem \
--server-key=server-cert/key.pem \
--private-key-directory=keys \
--ca-file=CA/cacert.pem \
--pid-file=keyless.pid \
--num-workers=4 --daemon --silent \
--user nobody:nobody
That runs the keyless
server as a daemon process (and outputs the
parent PID in keyless.pid
) after changing to the user nobody
in
group nobody
.
It sets up four workers (threads) which will process connections from
ShataCloud handling cryptographic requests using the private keys from
a directory called keys
.
This is the keyserver for Keyless SSL. It consists of a single binary file
‘kssl_server’ that has the following command-line options:
--port
(optional) The TCP port on which to listen for connections. These--ip
(optional) The IP address of the interface to bind to. If missing--ca-file
Path to a PEM-encoded file containing the CA certificate used to--server-cert
, --server-key
Path to PEM-encoded files containing the--private-key-directory
Path to a directory containing private keys which--silent
Prevents keyserver from producing any log output. Fatal start up--verbose
Enables verbose logging. When enabled access log data is sent to--num-workers
(optional) The number of worker threads to start. Each--pid-file
(optional) Path to a file into which the PID of the--test
(optional) Run through program start up and check that the keylessThe following options are not available on Windows systems:
--user
(optional) user and group to switch to. Can be in the formuser:group
or just user
(in which case user:user
is implied) (root--daemon
(optional) Forks and abandons the parent process.--syslog
(optional) Log lines are sent to syslog (instead of stdout orThe code is split into several files by function in order to enable
swapping with custom implementations.
kssl.h contains the shared constants and structures
kssl_core.h APIs for performing the keyless operation
kssl_helpers.h APIs for serialization and parsing functions
kssl_private_key.h APIs for storing and matching private keys
kssl_log.h APIs for writing logs
keyless.c Sample server implementation with OpenSSL and libuv
testclient.c Client implementation with OpenSSL
The following files are reference implementations of the APIs above.
kssl_core.c Implementation of v1.0 policy for keyless operation
kssl_helpers.c Implementation of v1.0 serialization and parsing
kssl_private_key.c Implementation of reading, storage and operations of
private keys using OpenSSL
kssl_log.c Implementation of logging
On Debian-based Linuxes:
sudo apt-get install gcc automake libtool
sudo apt-get install rubygems # only required for packages
sudo gem install fpm --no-ri --no-rdoc # only required for packages
On Centos:
sudo yum install gcc automake libtool
sudo yum install rpm-build rubybgems ruby-devel # only required for packages
sudo gem install fpm --no-ri --no-rdoc # only required for packages
On OS X (homebrew):
sudo gem install fpm
The Makefile has the following useful targets:
all
- The default target that builds both the keyless server and theclean
- Deletes the keyless server, testclient and related object filesinstall
- Install the keyless serverrun
- Runs the keyless server with a configuration suitable for testingkill
- Stops the keyless server started by ‘make run’test
- Runs the testclient against the keyless serverrelease
- Increment the minor version number and generate an updatedpackage
- build and make app package for specific OS. e.g. deb for DebianThe Keyless SSL server implementation has two external dependencies,
OpenSSL and
libuv. These are open source and available
for most platforms. For ease of deployment and consistency these dependencies
are statically compiled by default.
For Unix-based systems, the server and test suite are built with a GNU make
makefile.
To build:
make
This will create the files o/testclient
, o/keyless
after downloading and
building OpenSSL and libuv.