828e7396d6c2c6f918360f40496eebe90b4371a1
[strongswan.git] / src / libcharon / sa / ikev2 / tasks / ike_rekey.c
1 /*
2 * Copyright (C) 2015-2016 Tobias Brunner
3 * Copyright (C) 2005-2008 Martin Willi
4 * Copyright (C) 2005 Jan Hutter
5 * HSR Hochschule fuer Technik Rapperswil
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2 of the License, or (at your
10 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
14 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
15 * for more details.
16 */
17
18 #include "ike_rekey.h"
19
20 #include <daemon.h>
21 #include <encoding/payloads/notify_payload.h>
22 #include <sa/ikev2/tasks/ike_init.h>
23 #include <sa/ikev2/tasks/ike_delete.h>
24 #include <processing/jobs/delete_ike_sa_job.h>
25 #include <processing/jobs/rekey_ike_sa_job.h>
26 #include <processing/jobs/initiate_tasks_job.h>
27
28
29 typedef struct private_ike_rekey_t private_ike_rekey_t;
30
31 /**
32 * Private members of a ike_rekey_t task.
33 */
34 struct private_ike_rekey_t {
35
36 /**
37 * Public methods and task_t interface.
38 */
39 ike_rekey_t public;
40
41 /**
42 * Assigned IKE_SA.
43 */
44 ike_sa_t *ike_sa;
45
46 /**
47 * New IKE_SA which replaces the current one
48 */
49 ike_sa_t *new_sa;
50
51 /**
52 * Are we the initiator?
53 */
54 bool initiator;
55
56 /**
57 * the TASK_IKE_INIT task which is reused to simplify rekeying
58 */
59 ike_init_t *ike_init;
60
61 /**
62 * IKE_DELETE task to delete the old IKE_SA after rekeying was successful
63 */
64 ike_delete_t *ike_delete;
65
66 /**
67 * colliding task detected by the task manager
68 */
69 task_t *collision;
70
71 /**
72 * TRUE if rekeying can't be handled temporarily
73 */
74 bool failed_temporarily;
75 };
76
77 /**
78 * Schedule a retry if rekeying temporary failed
79 */
80 static void schedule_delayed_rekey(private_ike_rekey_t *this)
81 {
82 uint32_t retry;
83 job_t *job;
84
85 retry = RETRY_INTERVAL - (random() % RETRY_JITTER);
86 job = (job_t*)rekey_ike_sa_job_create(
87 this->ike_sa->get_id(this->ike_sa), FALSE);
88 DBG1(DBG_IKE, "IKE_SA rekeying failed, trying again in %d seconds", retry);
89 this->ike_sa->set_state(this->ike_sa, IKE_ESTABLISHED);
90 lib->scheduler->schedule_job(lib->scheduler, job, retry);
91 }
92
93 /**
94 * Check if an IKE_SA has any queued tasks, return initiation job
95 */
96 static job_t* check_queued_tasks(ike_sa_t *ike_sa)
97 {
98 enumerator_t *enumerator;
99 task_t *task;
100 job_t *job = NULL;
101
102 enumerator = ike_sa->create_task_enumerator(ike_sa, TASK_QUEUE_QUEUED);
103 if (enumerator->enumerate(enumerator, &task))
104 {
105 job = (job_t*)initiate_tasks_job_create(ike_sa->get_id(ike_sa));
106 }
107 enumerator->destroy(enumerator);
108 return job;
109 }
110
111 /**
112 * Establish the new replacement IKE_SA
113 */
114 static void establish_new(private_ike_rekey_t *this)
115 {
116 if (this->new_sa)
117 {
118 job_t *job;
119
120 this->new_sa->set_state(this->new_sa, IKE_ESTABLISHED);
121 DBG0(DBG_IKE, "IKE_SA %s[%d] rekeyed between %H[%Y]...%H[%Y]",
122 this->new_sa->get_name(this->new_sa),
123 this->new_sa->get_unique_id(this->new_sa),
124 this->ike_sa->get_my_host(this->ike_sa),
125 this->ike_sa->get_my_id(this->ike_sa),
126 this->ike_sa->get_other_host(this->ike_sa),
127 this->ike_sa->get_other_id(this->ike_sa));
128
129 this->new_sa->inherit_post(this->new_sa, this->ike_sa);
130 charon->bus->ike_rekey(charon->bus, this->ike_sa, this->new_sa);
131 job = check_queued_tasks(this->new_sa);
132 /* don't queue job before checkin(), as the IKE_SA is not yet
133 * registered at the manager */
134 charon->ike_sa_manager->checkin(charon->ike_sa_manager, this->new_sa);
135 if (job)
136 {
137 lib->processor->queue_job(lib->processor, job);
138 }
139 this->new_sa = NULL;
140 charon->bus->set_sa(charon->bus, this->ike_sa);
141
142 this->ike_sa->set_state(this->ike_sa, IKE_REKEYED);
143 }
144 }
145
146 METHOD(task_t, build_i_delete, status_t,
147 private_ike_rekey_t *this, message_t *message)
148 {
149 /* update exchange type to INFORMATIONAL for the delete */
150 message->set_exchange_type(message, INFORMATIONAL);
151
152 return this->ike_delete->task.build(&this->ike_delete->task, message);
153 }
154
155 METHOD(task_t, process_i_delete, status_t,
156 private_ike_rekey_t *this, message_t *message)
157 {
158 return this->ike_delete->task.process(&this->ike_delete->task, message);
159 }
160
161 METHOD(task_t, build_i, status_t,
162 private_ike_rekey_t *this, message_t *message)
163 {
164 ike_version_t version;
165
166 /* create new SA only on first try */
167 if (this->new_sa == NULL)
168 {
169 version = this->ike_sa->get_version(this->ike_sa);
170 this->new_sa = charon->ike_sa_manager->checkout_new(
171 charon->ike_sa_manager, version, TRUE);
172 if (!this->new_sa)
173 { /* shouldn't happen */
174 return FAILED;
175 }
176 this->new_sa->inherit_pre(this->new_sa, this->ike_sa);
177 this->ike_init = ike_init_create(this->new_sa, TRUE, this->ike_sa);
178 this->ike_sa->set_state(this->ike_sa, IKE_REKEYING);
179 }
180 this->ike_init->task.build(&this->ike_init->task, message);
181
182 return NEED_MORE;
183 }
184
185 METHOD(task_t, process_r, status_t,
186 private_ike_rekey_t *this, message_t *message)
187 {
188 enumerator_t *enumerator;
189 child_sa_t *child_sa;
190
191 if (this->ike_sa->get_state(this->ike_sa) == IKE_DELETING)
192 {
193 DBG1(DBG_IKE, "peer initiated rekeying, but we are deleting");
194 this->failed_temporarily = TRUE;
195 return NEED_MORE;
196 }
197
198 enumerator = this->ike_sa->create_child_sa_enumerator(this->ike_sa);
199 while (enumerator->enumerate(enumerator, (void**)&child_sa))
200 {
201 switch (child_sa->get_state(child_sa))
202 {
203 case CHILD_CREATED:
204 case CHILD_REKEYING:
205 case CHILD_RETRYING:
206 case CHILD_DELETING:
207 /* we do not allow rekeying while we have children in-progress */
208 DBG1(DBG_IKE, "peer initiated rekeying, but a child is half-open");
209 enumerator->destroy(enumerator);
210 this->failed_temporarily = TRUE;
211 return NEED_MORE;
212 default:
213 break;
214 }
215 }
216 enumerator->destroy(enumerator);
217
218 this->new_sa = charon->ike_sa_manager->checkout_new(charon->ike_sa_manager,
219 this->ike_sa->get_version(this->ike_sa), FALSE);
220 if (!this->new_sa)
221 { /* shouldn't happen */
222 return FAILED;
223 }
224 this->new_sa->inherit_pre(this->new_sa, this->ike_sa);
225 this->ike_init = ike_init_create(this->new_sa, FALSE, this->ike_sa);
226 this->ike_init->task.process(&this->ike_init->task, message);
227
228 return NEED_MORE;
229 }
230
231 METHOD(task_t, build_r, status_t,
232 private_ike_rekey_t *this, message_t *message)
233 {
234 if (this->failed_temporarily)
235 {
236 message->add_notify(message, TRUE, TEMPORARY_FAILURE, chunk_empty);
237 return SUCCESS;
238 }
239 if (this->new_sa == NULL)
240 {
241 /* IKE_SA/a CHILD_SA is in an inacceptable state, deny rekeying */
242 message->add_notify(message, TRUE, NO_PROPOSAL_CHOSEN, chunk_empty);
243 return SUCCESS;
244 }
245
246 if (this->ike_init->task.build(&this->ike_init->task, message) == FAILED)
247 {
248 charon->bus->set_sa(charon->bus, this->ike_sa);
249 return SUCCESS;
250 }
251 charon->bus->set_sa(charon->bus, this->ike_sa);
252
253 if (this->ike_sa->get_state(this->ike_sa) != IKE_REKEYING)
254 { /* in case of a collision we let the initiating task handle this */
255 establish_new(this);
256 /* make sure the IKE_SA is gone in case the peer fails to delete it */
257 lib->scheduler->schedule_job(lib->scheduler, (job_t*)
258 delete_ike_sa_job_create(this->ike_sa->get_id(this->ike_sa), TRUE),
259 90);
260 }
261 return SUCCESS;
262 }
263
264 METHOD(task_t, process_i, status_t,
265 private_ike_rekey_t *this, message_t *message)
266 {
267 if (message->get_notify(message, NO_ADDITIONAL_SAS))
268 {
269 DBG1(DBG_IKE, "peer seems to not support IKE rekeying, "
270 "starting reauthentication");
271 this->ike_sa->set_state(this->ike_sa, IKE_ESTABLISHED);
272 lib->processor->queue_job(lib->processor,
273 (job_t*)rekey_ike_sa_job_create(
274 this->ike_sa->get_id(this->ike_sa), TRUE));
275 return SUCCESS;
276 }
277 if (message->get_notify(message, TEMPORARY_FAILURE))
278 {
279 schedule_delayed_rekey(this);
280 return SUCCESS;
281 }
282
283 switch (this->ike_init->task.process(&this->ike_init->task, message))
284 {
285 case FAILED:
286 /* rekeying failed, fallback to old SA */
287 if (!(this->collision && (
288 this->collision->get_type(this->collision) == TASK_IKE_DELETE ||
289 this->collision->get_type(this->collision) == TASK_IKE_REAUTH)))
290 {
291 schedule_delayed_rekey(this);
292 }
293 return SUCCESS;
294 case NEED_MORE:
295 /* bad dh group, try again */
296 this->ike_init->task.migrate(&this->ike_init->task, this->new_sa);
297 return NEED_MORE;
298 default:
299 break;
300 }
301
302 /* check for collisions */
303 if (this->collision &&
304 this->collision->get_type(this->collision) == TASK_IKE_REKEY)
305 {
306 private_ike_rekey_t *other = (private_ike_rekey_t*)this->collision;
307
308 /* ike_init can be NULL, if child_sa is half-open */
309 if (other->ike_init)
310 {
311 host_t *host;
312 chunk_t this_nonce, other_nonce;
313
314 this_nonce = this->ike_init->get_lower_nonce(this->ike_init);
315 other_nonce = other->ike_init->get_lower_nonce(other->ike_init);
316
317 /* if we have the lower nonce, delete rekeyed SA. If not, delete
318 * the redundant. */
319 if (memcmp(this_nonce.ptr, other_nonce.ptr,
320 min(this_nonce.len, other_nonce.len)) > 0)
321 {
322 /* peer should delete this SA. Add a timeout just in case. */
323 job_t *job = (job_t*)delete_ike_sa_job_create(
324 other->new_sa->get_id(other->new_sa), TRUE);
325 lib->scheduler->schedule_job(lib->scheduler, job,
326 HALF_OPEN_IKE_SA_TIMEOUT);
327 DBG1(DBG_IKE, "IKE_SA rekey collision won, waiting for delete "
328 "for redundant IKE_SA %s[%d]",
329 other->new_sa->get_name(other->new_sa),
330 other->new_sa->get_unique_id(other->new_sa));
331 other->new_sa->set_state(other->new_sa, IKE_REKEYED);
332 charon->ike_sa_manager->checkin(charon->ike_sa_manager,
333 other->new_sa);
334 other->new_sa = NULL;
335 }
336 else
337 {
338 DBG1(DBG_IKE, "IKE_SA rekey collision lost, deleting redundant "
339 "IKE_SA %s[%d]", this->new_sa->get_name(this->new_sa),
340 this->new_sa->get_unique_id(this->new_sa));
341 /* apply host for a proper delete */
342 host = this->ike_sa->get_my_host(this->ike_sa);
343 this->new_sa->set_my_host(this->new_sa, host->clone(host));
344 host = this->ike_sa->get_other_host(this->ike_sa);
345 this->new_sa->set_other_host(this->new_sa, host->clone(host));
346 /* IKE_SAs in state IKE_REKEYED are silently deleted, so we use
347 * IKE_REKEYING */
348 this->new_sa->set_state(this->new_sa, IKE_REKEYING);
349 if (this->new_sa->delete(this->new_sa) == DESTROY_ME)
350 {
351 this->new_sa->destroy(this->new_sa);
352 }
353 else
354 {
355 charon->ike_sa_manager->checkin(charon->ike_sa_manager,
356 this->new_sa);
357 }
358 charon->bus->set_sa(charon->bus, this->ike_sa);
359 this->new_sa = NULL;
360 establish_new(other);
361 return SUCCESS;
362 }
363 }
364 charon->bus->set_sa(charon->bus, this->ike_sa);
365 }
366
367 establish_new(this);
368
369 /* rekeying successful, delete the IKE_SA using a subtask */
370 this->ike_delete = ike_delete_create(this->ike_sa, TRUE);
371 this->public.task.build = _build_i_delete;
372 this->public.task.process = _process_i_delete;
373
374 return NEED_MORE;
375 }
376
377 METHOD(task_t, get_type, task_type_t,
378 private_ike_rekey_t *this)
379 {
380 return TASK_IKE_REKEY;
381 }
382
383 METHOD(ike_rekey_t, collide, void,
384 private_ike_rekey_t* this, task_t *other)
385 {
386 DBG1(DBG_IKE, "detected %N collision with %N", task_type_names,
387 TASK_IKE_REKEY, task_type_names, other->get_type(other));
388 DESTROY_IF(this->collision);
389 this->collision = other;
390 }
391
392 /**
393 * Cleanup the task
394 */
395 static void cleanup(private_ike_rekey_t *this)
396 {
397 ike_sa_t *cur_sa;
398
399 if (this->ike_init)
400 {
401 this->ike_init->task.destroy(&this->ike_init->task);
402 }
403 if (this->ike_delete)
404 {
405 this->ike_delete->task.destroy(&this->ike_delete->task);
406 }
407 cur_sa = charon->bus->get_sa(charon->bus);
408 DESTROY_IF(this->new_sa);
409 charon->bus->set_sa(charon->bus, cur_sa);
410 DESTROY_IF(this->collision);
411 }
412
413 METHOD(task_t, migrate, void,
414 private_ike_rekey_t *this, ike_sa_t *ike_sa)
415 {
416 cleanup(this);
417 this->collision = NULL;
418 this->ike_sa = ike_sa;
419 this->new_sa = NULL;
420 this->ike_init = NULL;
421 this->ike_delete = NULL;
422 }
423
424 METHOD(task_t, destroy, void,
425 private_ike_rekey_t *this)
426 {
427 cleanup(this);
428 free(this);
429 }
430
431 /*
432 * Described in header.
433 */
434 ike_rekey_t *ike_rekey_create(ike_sa_t *ike_sa, bool initiator)
435 {
436 private_ike_rekey_t *this;
437
438 INIT(this,
439 .public = {
440 .task = {
441 .get_type = _get_type,
442 .build = _build_r,
443 .process = _process_r,
444 .migrate = _migrate,
445 .destroy = _destroy,
446 },
447 .collide = _collide,
448 },
449 .ike_sa = ike_sa,
450 .initiator = initiator,
451 );
452 if (initiator)
453 {
454 this->public.task.build = _build_i;
455 this->public.task.process = _process_i;
456 }
457
458 return &this->public;
459 }