ranch_ssl.erl 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. %% Copyright (c) 2011-2015, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. -module(ranch_ssl).
  15. -behaviour(ranch_transport).
  16. -export([name/0]).
  17. -export([secure/0]).
  18. -export([messages/0]).
  19. -export([listen/1]).
  20. -export([listen_options/0]).
  21. -export([accept/2]).
  22. -export([accept_ack/2]).
  23. -export([connect/3]).
  24. -export([connect/4]).
  25. -export([recv/3]).
  26. -export([send/2]).
  27. -export([sendfile/2]).
  28. -export([sendfile/4]).
  29. -export([sendfile/5]).
  30. -export([setopts/2]).
  31. -export([controlling_process/2]).
  32. -export([peername/1]).
  33. -export([sockname/1]).
  34. -export([shutdown/2]).
  35. -export([close/1]).
  36. -type ssl_opt() :: {alpn_preferred_protocols, [binary()]}
  37. | {cacertfile, string()}
  38. | {cacerts, [public_key:der_encoded()]}
  39. | {cert, public_key:der_encoded()}
  40. | {certfile, string()}
  41. | {ciphers, [ssl:erl_cipher_suite()] | string()}
  42. | {client_renegotiation, boolean()}
  43. | {crl_cache, {module(), {internal | any(), list()}}}
  44. | {crl_check, boolean() | peer | best_effort}
  45. | {depth, 0..255}
  46. | {dh, public_key:der_encoded()}
  47. | {dhfile, string()}
  48. | {fail_if_no_peer_cert, boolean()}
  49. | {hibernate_after, integer() | undefined}
  50. | {honor_cipher_order, boolean()}
  51. | {key, {'RSAPrivateKey' | 'DSAPrivateKey' | 'PrivateKeyInfo', public_key:der_encoded()}}
  52. | {keyfile, string()}
  53. | {log_alert, boolean()}
  54. | {next_protocols_advertised, [binary()]}
  55. | {partial_chain, fun(([public_key:der_encoded()]) -> {trusted_ca, public_key:der_encoded()} | unknown_ca)}
  56. | {password, string()}
  57. | {psk_identity, string()}
  58. | {reuse_session, fun()}
  59. | {reuse_sessions, boolean()}
  60. | {secure_renegotiate, boolean()}
  61. | {sni_fun, fun()}
  62. | {sni_hosts, [{string(), ssl_opt()}]}
  63. | {user_lookup_fun, {fun(), any()}}
  64. | {verify, ssl:verify_type()}
  65. | {verify_fun, {fun(), any()}}
  66. | {versions, [atom()]}.
  67. -export_type([ssl_opt/0]).
  68. -type opt() :: ranch_tcp:opt() | ssl_opt().
  69. -export_type([opt/0]).
  70. -type opts() :: [opt()].
  71. -export_type([opts/0]).
  72. name() -> ssl.
  73. -spec secure() -> boolean().
  74. secure() ->
  75. true.
  76. messages() -> {ssl, ssl_closed, ssl_error}.
  77. -spec listen(opts()) -> {ok, ssl:sslsocket()} | {error, atom()}.
  78. listen(Opts) ->
  79. ranch:require([crypto, asn1, public_key, ssl]),
  80. true = lists:keymember(cert, 1, Opts)
  81. orelse lists:keymember(certfile, 1, Opts),
  82. Opts2 = ranch:set_option_default(Opts, backlog, 1024),
  83. Opts3 = ranch:set_option_default(Opts2, ciphers, unbroken_cipher_suites()),
  84. Opts4 = ranch:set_option_default(Opts3, nodelay, true),
  85. Opts5 = ranch:set_option_default(Opts4, send_timeout, 30000),
  86. Opts6 = ranch:set_option_default(Opts5, send_timeout_close, true),
  87. %% We set the port to 0 because it is given in the Opts directly.
  88. %% The port in the options takes precedence over the one in the
  89. %% first argument.
  90. ssl:listen(0, ranch:filter_options(Opts6, listen_options(),
  91. [binary, {active, false}, {packet, raw},
  92. {reuseaddr, true}, {nodelay, true}])).
  93. listen_options() ->
  94. [alpn_preferred_protocols, cacertfile, cacerts, cert, certfile,
  95. ciphers, client_renegotiation, crl_cache, crl_check, depth,
  96. dh, dhfile, fail_if_no_peer_cert, hibernate_after, honor_cipher_order,
  97. key, keyfile, log_alert, next_protocols_advertised, partial_chain,
  98. password, psk_identity, reuse_session, reuse_sessions, secure_renegotiate,
  99. sni_fun, sni_hosts, user_lookup_fun, verify, verify_fun, versions
  100. |ranch_tcp:listen_options()].
  101. -spec accept(ssl:sslsocket(), timeout())
  102. -> {ok, ssl:sslsocket()} | {error, closed | timeout | atom()}.
  103. accept(LSocket, Timeout) ->
  104. ssl:transport_accept(LSocket, Timeout).
  105. -spec accept_ack(ssl:sslsocket(), timeout()) -> ok.
  106. accept_ack(CSocket, Timeout) ->
  107. case ssl:ssl_accept(CSocket, Timeout) of
  108. ok ->
  109. ok;
  110. %% Garbage was most likely sent to the socket, don't error out.
  111. {error, {tls_alert, _}} ->
  112. ok = close(CSocket),
  113. exit(normal);
  114. %% Socket most likely stopped responding, don't error out.
  115. {error, Reason} when Reason =:= timeout; Reason =:= closed ->
  116. ok = close(CSocket),
  117. exit(normal);
  118. {error, Reason} ->
  119. ok = close(CSocket),
  120. error(Reason)
  121. end.
  122. %% @todo Probably filter Opts?
  123. -spec connect(inet:ip_address() | inet:hostname(),
  124. inet:port_number(), any())
  125. -> {ok, inet:socket()} | {error, atom()}.
  126. connect(Host, Port, Opts) when is_integer(Port) ->
  127. ssl:connect(Host, Port,
  128. Opts ++ [binary, {active, false}, {packet, raw}]).
  129. %% @todo Probably filter Opts?
  130. -spec connect(inet:ip_address() | inet:hostname(),
  131. inet:port_number(), any(), timeout())
  132. -> {ok, inet:socket()} | {error, atom()}.
  133. connect(Host, Port, Opts, Timeout) when is_integer(Port) ->
  134. ssl:connect(Host, Port,
  135. Opts ++ [binary, {active, false}, {packet, raw}],
  136. Timeout).
  137. -spec recv(ssl:sslsocket(), non_neg_integer(), timeout())
  138. -> {ok, any()} | {error, closed | atom()}.
  139. recv(Socket, Length, Timeout) ->
  140. ssl:recv(Socket, Length, Timeout).
  141. -spec send(ssl:sslsocket(), iodata()) -> ok | {error, atom()}.
  142. send(Socket, Packet) ->
  143. ssl:send(Socket, Packet).
  144. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd())
  145. -> {ok, non_neg_integer()} | {error, atom()}.
  146. sendfile(Socket, Filename) ->
  147. sendfile(Socket, Filename, 0, 0, []).
  148. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd(),
  149. non_neg_integer(), non_neg_integer())
  150. -> {ok, non_neg_integer()} | {error, atom()}.
  151. sendfile(Socket, File, Offset, Bytes) ->
  152. sendfile(Socket, File, Offset, Bytes, []).
  153. %% Unlike with TCP, no syscall can be used here, so sending files
  154. %% through SSL will be much slower in comparison. Note that unlike
  155. %% file:sendfile/5 this function accepts either a file or a file name.
  156. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd(),
  157. non_neg_integer(), non_neg_integer(), ranch_transport:sendfile_opts())
  158. -> {ok, non_neg_integer()} | {error, atom()}.
  159. sendfile(Socket, File, Offset, Bytes, Opts) ->
  160. ranch_transport:sendfile(?MODULE, Socket, File, Offset, Bytes, Opts).
  161. %% @todo Probably filter Opts?
  162. -spec setopts(ssl:sslsocket(), list()) -> ok | {error, atom()}.
  163. setopts(Socket, Opts) ->
  164. ssl:setopts(Socket, Opts).
  165. -spec controlling_process(ssl:sslsocket(), pid())
  166. -> ok | {error, closed | not_owner | atom()}.
  167. controlling_process(Socket, Pid) ->
  168. ssl:controlling_process(Socket, Pid).
  169. -spec peername(ssl:sslsocket())
  170. -> {ok, {inet:ip_address(), inet:port_number()}} | {error, atom()}.
  171. peername(Socket) ->
  172. ssl:peername(Socket).
  173. -spec sockname(ssl:sslsocket())
  174. -> {ok, {inet:ip_address(), inet:port_number()}} | {error, atom()}.
  175. sockname(Socket) ->
  176. ssl:sockname(Socket).
  177. -spec shutdown(ssl:sslsocket(), read | write | read_write)
  178. -> ok | {error, atom()}.
  179. shutdown(Socket, How) ->
  180. ssl:shutdown(Socket, How).
  181. -spec close(ssl:sslsocket()) -> ok.
  182. close(Socket) ->
  183. ssl:close(Socket).
  184. %% Internal.
  185. %% Unfortunately the implementation of elliptic-curve ciphers that has
  186. %% been introduced in R16B01 is incomplete. Depending on the particular
  187. %% client, this can cause the TLS handshake to break during key
  188. %% agreement. Depending on the ssl application version, this function
  189. %% returns a list of all cipher suites that are supported by default,
  190. %% minus the elliptic-curve ones.
  191. -spec unbroken_cipher_suites() -> [ssl:erl_cipher_suite()].
  192. unbroken_cipher_suites() ->
  193. case proplists:get_value(ssl_app, ssl:versions()) of
  194. Version when Version =:= "5.3"; Version =:= "5.3.1" ->
  195. lists:filter(fun(Suite) ->
  196. string:left(atom_to_list(element(1, Suite)), 4) =/= "ecdh"
  197. end, ssl:cipher_suites());
  198. _ ->
  199. ssl:cipher_suites()
  200. end.