RESOLVED FIXED 208192
[Curl] Add TLS debugging feature to log encryption keys
https://bugs.webkit.org/show_bug.cgi?id=208192
Summary [Curl] Add TLS debugging feature to log encryption keys
Takashi Komori
Reported 2020-02-25 06:08:43 PST
Chrome has a debugging feature which enables people to record keys which is used for TLS encryption. In this ticket we will append almost the same feature to Curl port.
Attachments
Add TLS debugging feature. (5.89 KB, patch)
2020-02-25 06:13 PST, Takashi Komori
no flags
Patch (8.73 KB, patch)
2020-02-25 23:47 PST, Takashi Komori
no flags
Patch (6.81 KB, patch)
2020-02-26 00:59 PST, Takashi Komori
no flags
Patch (8.73 KB, patch)
2020-02-26 01:32 PST, Takashi Komori
no flags
Patch (9.57 KB, patch)
2020-02-27 06:12 PST, Takashi Komori
no flags
Patch (9.50 KB, patch)
2020-02-28 00:53 PST, Takashi Komori
no flags
[Patch] Changed the default ENABLE_TLS_DEBUG to OFF (2.11 KB, patch)
2020-03-01 16:39 PST, Fujii Hironori
no flags
Takashi Komori
Comment 1 2020-02-25 06:13:18 PST
Created attachment 391645 [details] Add TLS debugging feature.
Takashi Komori
Comment 2 2020-02-25 06:17:27 PST
This patch adds TLS debugging feature which writes TLS key log to the file which is specified by environment variable "WEBKIT_CURL_TLS_KEY_LOG_FILE" If we have the key log file and packet dump, we can decrypt the TLS packets which browser sent/received. Outputted key log file follows the NSS key log format, and it supports less or equal to TLS version 1.2 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format This feature is enabled when only we enable ENABLE_TLS_DEBUG flag on build time as below. >perl .\Tools\Scripts\build-webkit --wincairo --cmakeargs="-DENABLE_TLS_DEBUG=1" Chrome also has the almost the same feature, it outputs the key log file to the path which is specified by environment variable "SSLKEYLOGFILE"
Takashi Komori
Comment 3 2020-02-25 06:21:57 PST
Usage: 1) Build wincairo with ENABLE_TLS_DEBUG=1 2) Set environment variable WEBKIT_CURL_TLS_KEY_LOG_FILE to a path which you have write privilege. 3) Start WireShark and start capturing packets. 4) Start MiniBrowser and brows some https sites. 5) Stop capturing packets. 6) Open Setting -> preference -> Protocols -> tls on WireShark 7) Set the path you specified to WEBKIT_CURLL_TLS_KEY_LOG_FILE to (Pre)=Master-Secret log filename. 8) You can see decrypted packets on WireShark.
Fujii Hironori
Comment 4 2020-02-25 06:50:24 PST
Can we include this feature in release builds like Firefox and Chrome? Firefox and Chrome are using same name env bar. Can we use the same name?
Fujii Hironori
Comment 5 2020-02-25 07:05:16 PST
Comment on attachment 391645 [details] Add TLS debugging feature. View in context: https://bugs.webkit.org/attachment.cgi?id=391645&action=review > Source/WebCore/platform/network/curl/CurlContext.h:131 > + bool shouldLogTlsKey() const { return !m_tlsKeyLogFilePath.isEmpty(); } ‘Tls’ seems to violate WebKit coding style. https://webkit.org/code-style-guidelines/#names-basic TLS is better? > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:123 > + String line("CLIENT_RANDOM "); do you need this temporary string? Why don’t you output by using fprintf?
Fujii Hironori
Comment 6 2020-02-25 16:21:45 PST
(In reply to Fujii Hironori from comment #4) > Can we include this feature in release builds like Firefox and Chrome? I meant production builds.
Takashi Komori
Comment 7 2020-02-25 23:47:48 PST
Takashi Komori
Comment 8 2020-02-25 23:50:23 PST
(In reply to Fujii Hironori from comment #4) > Can we include this feature in release builds like Firefox and Chrome? > Firefox and Chrome are using same name env bar. Can we use the same name? Included in production build and changed the environment variable name to SSLKEYLOGFILE.
Takashi Komori
Comment 9 2020-02-25 23:50:54 PST
(In reply to Fujii Hironori from comment #5) > Comment on attachment 391645 [details] > Add TLS debugging feature. > > View in context: > https://bugs.webkit.org/attachment.cgi?id=391645&action=review > > > Source/WebCore/platform/network/curl/CurlContext.h:131 > > + bool shouldLogTlsKey() const { return !m_tlsKeyLogFilePath.isEmpty(); } > > ‘Tls’ seems to violate WebKit coding style. > https://webkit.org/code-style-guidelines/#names-basic > TLS is better? Fixed. > > > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:123 > > + String line("CLIENT_RANDOM "); > > do you need this temporary string? Why don’t you output by using fprintf? Fixed.
Fujii Hironori
Comment 10 2020-02-26 00:00:31 PST
Comment on attachment 391724 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=391724&action=review > Source/cmake/OptionsWinCairo.cmake:56 > +WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) Do you want to disable this feature? If not, remove all #if ENABLE(TLS_DEBUG).
Takashi Komori
Comment 11 2020-02-26 00:59:00 PST
Takashi Komori
Comment 12 2020-02-26 00:59:50 PST
(In reply to Fujii Hironori from comment #10) > Comment on attachment 391724 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=391724&action=review > > > Source/cmake/OptionsWinCairo.cmake:56 > > +WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) > > Do you want to disable this feature? If not, remove all #if > ENABLE(TLS_DEBUG). Removed.
Takashi Komori
Comment 13 2020-02-26 01:11:31 PST
(In reply to Takashi Komori from comment #12) > (In reply to Fujii Hironori from comment #10) > > Comment on attachment 391724 [details] > > Patch > > > > View in context: > > https://bugs.webkit.org/attachment.cgi?id=391724&action=review > > > > > Source/cmake/OptionsWinCairo.cmake:56 > > > +WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) > > > > Do you want to disable this feature? If not, remove all #if > > ENABLE(TLS_DEBUG). > > Removed. Removed but some platform might want disabling option for a security perspective.
Takashi Komori
Comment 14 2020-02-26 01:32:55 PST
Takashi Komori
Comment 15 2020-02-26 01:33:53 PST
Logging encryption keys feature could be a great security hole. Some developers who use WebKit for example for some embedded system might concern that there is no way to disable the feature. Considering that, we would better offer the disabling option.
Fujii Hironori
Comment 16 2020-02-26 02:25:49 PST
How do Chrome and Firefox deal with the great security hole?
Takashi Komori
Comment 17 2020-02-26 03:21:34 PST
(In reply to Fujii Hironori from comment #16) > How do Chrome and Firefox deal with the great security hole? Other browsers don't seem to have a strong safety guard for this feature. In other words just setting the environment variable makes browsers start recording encryption keys into local PC. If the recorded keys is secure and not stolen, the feature itself is secure too. But we shouldn't assume all systems which use WebKit are implemented right and secure. So I think offering developers the disabling option is reasonable. Also I'm concerning browsers don't have any explicit way to reset or remove recorded keys.
Fujii Hironori
Comment 18 2020-02-26 12:25:34 PST
(In reply to Takashi Komori from comment #17) > (In reply to Fujii Hironori from comment #16) > > How do Chrome and Firefox deal with the great security hole? > > Other browsers don't seem to have a strong safety guard for this feature. > In other words just setting the environment variable makes browsers start > recording encryption keys into local PC. > > If the recorded keys is secure and not stolen, the feature itself is secure > too. > But we shouldn't assume all systems which use WebKit are implemented right > and secure. > So I think offering developers the disabling option is reasonable. If it's possible for someone to steal file from PC, it's impossible to make the browser safe. > Also I'm concerning browsers don't have any explicit way to reset or remove > recorded keys. I think it's enough to invoke command `rm $SSLKEYLOGFILE`.
Alex Christensen
Comment 19 2020-02-26 12:41:37 PST
Comment on attachment 391729 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=391729&action=review > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:122 > + auto fp = fopen(CurlContext::singleton().tlsKeyLogFilePath().utf8().data(), "a"); Are you sure you want all this file I/O on the main thread? Is there an advantage to using wtf/FileSystem.h? > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:126 > + fprintf(fp, "CLIENT_RANDOM "); Do you care about the return code? > Source/cmake/OptionsWinCairo.cmake:56 > +WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) You probably want to have this off by default.
Fujii Hironori
Comment 20 2020-02-26 15:53:21 PST
Comment on attachment 391729 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=391729&action=review > ChangeLog:16 > + * Source/cmake/OptionsWinCairo.cmake: PlayStation port is also using curl. Don't you change OptionsPlayStation.cmake, too?
Takashi Komori
Comment 21 2020-02-27 06:12:12 PST
Takashi Komori
Comment 22 2020-02-27 06:25:24 PST
(In reply to Alex Christensen from comment #19) > Comment on attachment 391729 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=391729&action=review > > > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:122 > > + auto fp = fopen(CurlContext::singleton().tlsKeyLogFilePath().utf8().data(), "a"); > > Are you sure you want all this file I/O on the main thread? > Is there an advantage to using wtf/FileSystem.h? No, CurlSSLVerifier::infoCallback is invoked as a callback function in sub thread. > > > Source/WebCore/platform/network/curl/CurlSSLVerifier.cpp:126 > > + fprintf(fp, "CLIENT_RANDOM "); > > Do you care about the return code? > I think it doesn't seem to be necessary caring the return code. Other parts using fprintf in WebKit also doesn't care. > > Source/cmake/OptionsWinCairo.cmake:56 > > +WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) > > You probably want to have this off by default. Yes. Even if the ON is preferable by default, disabling option could be useful for some developers.
Takashi Komori
Comment 23 2020-02-27 06:25:58 PST
(In reply to Fujii Hironori from comment #20) > Comment on attachment 391729 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=391729&action=review > > > ChangeLog:16 > > + * Source/cmake/OptionsWinCairo.cmake: > > PlayStation port is also using curl. Don't you change > OptionsPlayStation.cmake, too? Added.
Takashi Komori
Comment 24 2020-02-27 06:44:34 PST
(In reply to Alex Christensen from comment #19) > Comment on attachment 391729 [details] > Patch > > Are you sure you want all this file I/O on the main thread? > Is there an advantage to using wtf/FileSystem.h? > wtf/FileSystem.h doesn't have a mode which appends at tail of a file. If we use FileSystem.h for logging, we have to keep open PlatformFileHandle as we don't have append mode. On Windows platform, it means the key log file remains open until the browser exits, and we can't access the log file until the browser exits. We might have to consider adding appending mode in another ticket.
Fujii Hironori
Comment 25 2020-02-27 12:15:10 PST
Comment on attachment 391853 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=391853&action=review LGTM > Source/cmake/OptionsWinCairo.cmake:58 > +WEBKIT_OPTION_END() WEBKIT_OPTION_END is already called in OptionsWin.cmake for WinCairo. It seems that WEBKIT_OPTION_END shouldn't be called twice because FEATURE_DEFINES will get duplicated entries. I think it should be moved into OptionsWin.cmake. if (WTF_PLATFORM_WIN_CAIRO) WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) endif ()
Takashi Komori
Comment 26 2020-02-28 00:53:27 PST
Takashi Komori
Comment 27 2020-02-28 00:54:13 PST
(In reply to Fujii Hironori from comment #25) > WEBKIT_OPTION_END is already called in OptionsWin.cmake for WinCairo. > It seems that WEBKIT_OPTION_END shouldn't be called twice because > FEATURE_DEFINES will get duplicated entries. > I think it should be moved into OptionsWin.cmake. > > if (WTF_PLATFORM_WIN_CAIRO) > WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" > PRIVATE ON) > endif () Fixed.
WebKit Commit Bot
Comment 28 2020-02-28 13:35:14 PST
Comment on attachment 391968 [details] Patch Clearing flags on attachment: 391968 Committed r257656: <https://trac.webkit.org/changeset/257656>
WebKit Commit Bot
Comment 29 2020-02-28 13:35:17 PST
All reviewed patches have been landed. Closing bug.
Radar WebKit Bug Importer
Comment 30 2020-02-28 13:36:15 PST
Alex Christensen
Comment 31 2020-02-28 14:45:10 PST
Comment on attachment 391968 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=391968&action=review > Source/cmake/OptionsWin.cmake:76 > + WEBKIT_OPTION_DEFINE(ENABLE_TLS_DEBUG "Enable TLS key log support" PRIVATE ON) Again, this should really be off by default. Please change it. If someone who isn't an expert in TLS or WebKit builds WebKit, we want them to be safe.
Fujii Hironori
Comment 32 2020-03-01 16:39:01 PST
Reopening to attach new patch.
Fujii Hironori
Comment 33 2020-03-01 16:39:03 PST
Created attachment 392109 [details] [Patch] Changed the default ENABLE_TLS_DEBUG to OFF
WebKit Commit Bot
Comment 34 2020-03-03 16:30:18 PST
Comment on attachment 392109 [details] [Patch] Changed the default ENABLE_TLS_DEBUG to OFF Clearing flags on attachment: 392109 Committed r257813: <https://trac.webkit.org/changeset/257813>
WebKit Commit Bot
Comment 35 2020-03-03 16:30:20 PST
All reviewed patches have been landed. Closing bug.
Note You need to log in before you can comment on or make changes to this bug.