mirror of
https://github.com/tailscale/tailscale.git
synced 2025-06-08 16:58:35 +00:00

To authenticate mesh keys, the DERP servers used a simple == comparison, which is susceptible to a side channel timing attack. By extracting the mesh key for a DERP server, an attacker could DoS it by forcing disconnects using derp.Client.ClosePeer. They could also enumerate the public Wireguard keys, IP addresses and ports for nodes connected to that DERP server. DERP servers configured without mesh keys deny all such requests. This patch also extracts the mesh key logic into key.DERPMesh, to prevent this from happening again. Security bulletin: https://tailscale.com/security-bulletins#ts-2025-003 Fixes tailscale/corp#28720 Signed-off-by: Simon Law <sfllaw@tailscale.com>
69 lines
1.9 KiB
Go
69 lines
1.9 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
||
// SPDX-License-Identifier: BSD-3-Clause
|
||
|
||
package key
|
||
|
||
import (
|
||
"crypto/subtle"
|
||
"encoding/hex"
|
||
"errors"
|
||
"fmt"
|
||
"strings"
|
||
|
||
"go4.org/mem"
|
||
"tailscale.com/types/structs"
|
||
)
|
||
|
||
var ErrInvalidMeshKey = errors.New("invalid mesh key")
|
||
|
||
// DERPMesh is a mesh key, used for inter-DERP-node communication and for
|
||
// privileged DERP clients.
|
||
type DERPMesh struct {
|
||
_ structs.Incomparable // == isn't constant-time
|
||
k [32]byte // 64-digit hexadecimal numbers fit in 32 bytes
|
||
}
|
||
|
||
// DERPMeshFromRaw32 parses a 32-byte raw value as a DERP mesh key.
|
||
func DERPMeshFromRaw32(raw mem.RO) DERPMesh {
|
||
if raw.Len() != 32 {
|
||
panic("input has wrong size")
|
||
}
|
||
var ret DERPMesh
|
||
raw.Copy(ret.k[:])
|
||
return ret
|
||
}
|
||
|
||
// ParseDERPMesh parses a DERP mesh key from a string.
|
||
// This function trims whitespace around the string.
|
||
// If the key is not a 64-digit hexadecimal number, ErrInvalidMeshKey is returned.
|
||
func ParseDERPMesh(key string) (DERPMesh, error) {
|
||
key = strings.TrimSpace(key)
|
||
if len(key) != 64 {
|
||
return DERPMesh{}, fmt.Errorf("%w: must be 64-digit hexadecimal number", ErrInvalidMeshKey)
|
||
}
|
||
decoded, err := hex.DecodeString(key)
|
||
if err != nil {
|
||
return DERPMesh{}, fmt.Errorf("%w: %v", ErrInvalidMeshKey, err)
|
||
}
|
||
return DERPMeshFromRaw32(mem.B(decoded)), nil
|
||
}
|
||
|
||
// IsZero reports whether k is the zero value.
|
||
func (k DERPMesh) IsZero() bool {
|
||
return k.Equal(DERPMesh{})
|
||
}
|
||
|
||
// Equal reports whether k and other are the same key.
|
||
func (k DERPMesh) Equal(other DERPMesh) bool {
|
||
// Compare mesh keys in constant time to prevent timing attacks.
|
||
// Since mesh keys are a fixed length, we don’t need to be concerned
|
||
// about timing attacks on client mesh keys that are the wrong length.
|
||
// See https://github.com/tailscale/corp/issues/28720
|
||
return subtle.ConstantTimeCompare(k.k[:], other.k[:]) == 1
|
||
}
|
||
|
||
// String returns k as a hex-encoded 64-digit number.
|
||
func (k DERPMesh) String() string {
|
||
return hex.EncodeToString(k.k[:])
|
||
}
|