[gnutls-dev] GnuTLS Fix: Decrypting PKCS#8 privkey with invalid password has same error as parse failure

Simon Josefsson simon at josefsson.org
Sat May 26 22:17:30 CEST 2007


Nate Nielsen <nielsen-list at memberwebs.com> writes:

> I'm working on using gnutls to parse certificates and keys in
> gnome-keyring.
>
> I've come across a problem where a invalid password for a PKCS#8
> encrypted key produces the same error as a ASN.1 parse failure.
>
> Attached is a patch which fixes the problem in a way that I hope makes
> sense. Any ASN.1 parse failures that late in the game, and immediately
> after decryption are treated as an invalid password.
>
> Given the terseness of DER encoded data, I don't think that there is a
> reliable (and quick) way of guaranteeing this in all extreme corner
> cases. However I believe that the fix makes gnutls more correct.
>
> Attached are test cases and patch.

Patch installed on 1.6.x branch, even though it is close to the ~10
lines limit that would require copyright assignments.  The self-test is
longer than 10 lines, though, and papers are required for it.  I'd like
to include it in 1.7.x with your co-operation, see the response to your
other report.

Thanks,
Simon

> In order for this to work, the patch from my earlier bug report (about
> PKCS#8 key parsing not reporting parse failures) will need to be applied.
>
> Cheers,
> Nate Nielsen
>
> /* gcc -g -O0 -o gnutls-test `pkg-config --libs --cflags gnutls` gnutls-test-pkcs8-password.c */
>
> #include <stdio.h>
> #include <stdlib.h>
> #include <unistd.h>
>
> #include <gnutls/gnutls.h>
> #include <gnutls/x509.h>
> #include <gcrypt.h>
>
> static void
> read_file (const char *file, gnutls_datum_t *datum)
> {
> 	FILE *f = fopen (file, "rb");
> 	if (f) {
> 		datum->data = malloc (8192);
> 		datum->size = fread (datum->data, 1, 8192, f);
> 	}
> 	if (!f || ferror (f))
> 		err (1, "couldn't read from file: %s", file);
> 	fclose (f);
> }
>
> int
> main (int argc, char **argv)
> {
> 	gnutls_x509_privkey_t privkey;
> 	gnutls_datum_t datum;
> 	int gerr;
>
> 	if (argc < 2)
> 		errx (1, "specify key to parse");
>
> 	gcry_check_version (GCRYPT_VERSION);
> 	gnutls_global_init ();
>
> 	read_file (argv[1], &datum);
> 				
> 	gnutls_x509_privkey_init (&privkey);
>
> 	gerr = gnutls_x509_privkey_import_pkcs8 (privkey, &datum, 
> 			GNUTLS_X509_FMT_DER, "test", GNUTLS_PKCS_PLAIN);
> 	printf ("no password: %d\n", gerr);
> 	printf ("       algo: %d\n", gnutls_x509_privkey_get_pk_algorithm (privkey));		
>
>
> 	gerr = gnutls_x509_privkey_import_pkcs8 (privkey, &datum, 
> 			GNUTLS_X509_FMT_DER, "test", GNUTLS_PKCS_USE_PBES2_3DES);
> 	printf ("pasword 'test': %d\n", gerr);		
> 	printf ("          algo: %d\n", gnutls_x509_privkey_get_pk_algorithm (privkey));		
>
> 	gerr = gnutls_x509_privkey_import_pkcs8 (privkey, &datum, 
> 			GNUTLS_X509_FMT_DER, "bork", GNUTLS_PKCS_USE_PBES2_3DES);
> 	printf ("pasword 'bork': %d\n", gerr);		
> 	printf ("          algo: %d\n", gnutls_x509_privkey_get_pk_algorithm (privkey));		
> 	
> 	gnutls_global_deinit ();
> 	return 0;
> }
>
> --- lib/x509/privkey_pkcs8.c.orig	2007-05-23 22:11:51.000000000 -0000
> +++ lib/x509/privkey_pkcs8.c	2007-05-23 22:43:49.000000000 -0000
> @@ -739,6 +739,25 @@
>  
>    if (result < 0)
>      {
> +      /* We've gotten this far. In the real world it's almost certain
> +       * that we're dealing with a good file, but wrong password. 
> +       * Sadly like 90% of random data is somehow valid DER for the 
> +       * a first small number of bytes, so no easy way to guarantee. */
> +      if (result == GNUTLS_E_ASN1_ELEMENT_NOT_FOUND ||
> +          result == GNUTLS_E_ASN1_IDENTIFIER_NOT_FOUND ||
> +          result == GNUTLS_E_ASN1_DER_ERROR ||
> +          result == GNUTLS_E_ASN1_VALUE_NOT_FOUND ||
> +          result == GNUTLS_E_ASN1_GENERIC_ERROR ||
> +          result == GNUTLS_E_ASN1_VALUE_NOT_VALID ||
> +          result == GNUTLS_E_ASN1_TAG_ERROR || 
> +          result == GNUTLS_E_ASN1_TAG_IMPLICIT ||
> +          result == GNUTLS_E_ASN1_TYPE_ANY_ERROR ||
> +          result == GNUTLS_E_ASN1_SYNTAX_ERROR ||
> +          result == GNUTLS_E_ASN1_DER_OVERFLOW)
> +        {
> +           result = GNUTLS_E_DECRYPTION_FAILED;
> +        }
> +
>        gnutls_assert ();
>        goto error;
>      }



More information about the Gnutls-dev mailing list