Checking the server certificate
David Woodhouse
dwmw2 at infradead.org
Thu Feb 4 07:09:00 EST 2010
On Wed, 2010-02-03 at 07:32 +0000, David Woodhouse wrote:
> it doesn't check the server name against the subject of the
> certificate. I'll look at fixing the latter.
It probably looks something like this. I'm kind of unhappy that there
isn't an OpenSSL function I can just use for this, but I really don't
see one -- NAME_CONSTRAINTS_check() looks close but isn't what I want
AFAICT. Another reason for me to be upset that I have to use OpenSSL
directly and can't use cURL...
There's still some work to be done -- I've added FIXMEs where I know
I've cut corners, and it also wants to be vetted by someone who's more
clueful than I am.
We also need to extend the GUI to show _reasons_ that certificates were
rejected, and the GConf storage to associate hostnames with each
'exempted' certificate. And we'll want a command-line option to override
certain (or all) checks, too.
If anyone feels like working on this, it would be much appreciated. I'm
not going to get to it until next month, otherwise.
diff --git a/ssl.c b/ssl.c
index 26a5bfe..1d13ccb 100644
--- a/ssl.c
+++ b/ssl.c
@@ -406,19 +406,118 @@ static int check_server_cert(struct openconnect_info *vpninfo, X509 *cert)
return 0;
}
-static int verify_peer(struct openconnect_info *vpninfo, SSL *https_ssl)
+static int match_hostname(struct openconnect_info *vpninfo, const char *match)
{
- X509 *peer_cert;
+ /* FIXME: Handle wildcards properly */
+ return strcasecmp(vpninfo->hostname, match);
+}
- if (vpninfo->cafile) {
- int vfy = SSL_get_verify_result(https_ssl);
+/* cf. RFC2818 and RFC2459 */
+int match_cert_hostname(struct openconnect_info *vpninfo, X509 *peer_cert)
+{
+ STACK_OF(GENERAL_NAME) *altnames;
+ X509_NAME *subjname;
+ ASN1_STRING *subjasn1;
+ char *subjstr = NULL;
+ int i, altdns = 0;
+ int ret;
- if (vfy != X509_V_OK) {
- vpninfo->progress(vpninfo, PRG_ERR, "Server certificate verify failed: %s\n",
- X509_verify_cert_error_string(vfy));
- return -EINVAL;
+ altnames = X509_get_ext_d2i(peer_cert, NID_subject_alt_name,
+ NULL, NULL);
+ for (i = 0; i < sk_GENERAL_NAME_num(altnames); i++) {
+ const GENERAL_NAME *this = sk_GENERAL_NAME_value(altnames, i);
+ const char *str = (char *)ASN1_STRING_data(this->d.ia5);
+ size_t len = ASN1_STRING_length(this->d.ia5);
+
+ /* We don't like names with embedded NUL */
+ if (strlen(str) != len)
+ continue;
+
+ switch(this->type) {
+ case GEN_DNS:
+ altdns = 1;
+
+ if (!match_hostname(vpninfo, str)) {
+ vpninfo->progress(vpninfo, PRG_TRACE,
+ "Matched DNS altname '%s'\n",
+ str);
+ GENERAL_NAMES_free(altnames);
+ return 0;
+ } else {
+ vpninfo->progress(vpninfo, PRG_TRACE,
+ "No match for altname '%s'\n",
+ str);
+ }
+ break;
+ case GEN_IPADD:
+ /* FIXME: use getaddrinfo() with AI_NUMERICHOST and be
+ careful of the [] around IPv6 literals, then compare. */
+ break;
+ case GEN_URI:
+ /* FIXME */
+ break;
}
- return 0;
+ }
+ GENERAL_NAMES_free(altnames);
+
+ /* According to RFC2818, we don't use the legacy subject name if
+ there was an altname with DNS type. */
+ if (altdns) {
+ vpninfo->progress(vpninfo, PRG_ERR, "No altname in peer cert matched '%s'\n",
+ vpninfo->hostname);
+ return -EINVAL;
+ }
+
+ subjname = X509_get_subject_name(peer_cert);
+ if (!subjname) {
+ vpninfo->progress(vpninfo, PRG_ERR, "No subject name in peer cert!\n");
+ return -EINVAL;
+ }
+
+ /* Find the _last_ (most specific) commonName */
+ i = -1;
+ while (1) {
+ int j = X509_NAME_get_index_by_NID(subjname, NID_commonName, i);
+ if (j >= 0)
+ i = j;
+ else
+ break;
+ }
+
+ subjasn1 = X509_NAME_ENTRY_get_data(X509_NAME_get_entry(subjname, i));
+
+ i = ASN1_STRING_to_UTF8((unsigned char **)&subjstr, subjasn1);
+
+ if (!subjstr || strlen(subjstr) != i) {
+ vpninfo->progress(vpninfo, PRG_ERR,
+ "Failed to parse subject name in peer cert\n");
+ return -EINVAL;
+ }
+ ret = 0;
+
+ if (match_hostname(vpninfo, subjstr)) {
+ vpninfo->progress(vpninfo, PRG_ERR, "Peer cert subject mismatch ('%s' != '%s')\n",
+ subjstr, vpninfo->hostname);
+ ret = -EINVAL;
+ } else {
+ vpninfo->progress(vpninfo, PRG_TRACE,
+ "Matched peer certificate subject name '%s'\n",
+ subjstr);
+ }
+
+ OPENSSL_free(subjstr);
+ return ret;
+}
+
+static int verify_peer(struct openconnect_info *vpninfo, SSL *https_ssl)
+{
+ X509 *peer_cert;
+ int vfy = SSL_get_verify_result(https_ssl);
+
+ if (vfy != X509_V_OK) {
+ vpninfo->progress(vpninfo, PRG_ERR, "Server certificate verify failed: %s\n",
+ X509_verify_cert_error_string(vfy));
+ return -EINVAL;
}
peer_cert = SSL_get_peer_certificate(https_ssl);
@@ -426,11 +525,14 @@ static int verify_peer(struct openconnect_info *vpninfo, SSL *https_ssl)
if (vpninfo->servercert)
return check_server_cert(vpninfo, peer_cert);
+ if (!match_cert_hostname(vpninfo, peer_cert) && vfy == X509_V_OK)
+ return 0;
+
+ /* FIXME: Pass information to this function about what went wrong */
if (vpninfo->validate_peer_cert)
return vpninfo->validate_peer_cert(vpninfo, peer_cert);
- /* If no validation function, just let it succeed */
- return 0;
+ return -EINVAL;
}
void workaround_openssl_certchain_bug(struct openconnect_info *vpninfo,
--
David Woodhouse Open Source Technology Centre
David.Woodhouse at intel.com Intel Corporation
More information about the openconnect-devel
mailing list