]> arthur.barton.de Git - ngircd-alex.git/commitdiff
Support for server certificate validation on server links [S2S-TLS]
authorChristoph Biedl <ngircd.anoy@manchmal.in-ulm.de>
Sun, 2 Nov 2014 13:48:34 +0000 (14:48 +0100)
committerAlexander Barton <alex@barton.de>
Sat, 23 Mar 2024 19:19:01 +0000 (20:19 +0100)
This patch provides code to validate the server certificate in
server links, defeating nasty man-in-the-middle attacks on server
links.

Features:

- Check whether the certificate is signed by a trusted certificate
  authority (CA).
- Check the host name, including wildcard certificates and Subject
  Alternative Names.
- Optionally check against a certificate revocation list (CRL).
- Implementation for both OpenSSL and GnuTLS linkage.

Left for another day:

- Parameterize the TLS parameter of an outbound connection. Currently,
  it's hardcoded to disable all versions before TLSv1.1.
- Using certificate as CA-certificate. They work for GnuTLS only but
  perhaps this should rather raise an error there, too.
- Optional OCSP checking.
- Checking client certificates. Code is there but this first needs some
  consideration about the use cases. This could replace all other
  authentication methods, for both client-server and server-server
  connections.

This patch is based on a patch by Florian Westphal from 2009, which
implemented this for OpenSSL only:

  From: Florian Westphal <fw@strlen.de>
  Date: Mon, 18 May 2009 00:29:02 +0200
  Subject: SSL/TLS: Add initial certificate support to OpenSSL backend

Commit message modified by Alex Barton.

Closes #120, "Server links using TLS/SSL need certificate validation".
Supersedes PR #8, "Options for verifying and requiring SSL client
certificates", which had (incomplete?) code for OpenSSL, no GnuTLS.

doc/sample-ngircd.conf.tmpl
man/ngircd.conf.5.tmpl
src/ngircd/conf.c
src/ngircd/conf.h
src/ngircd/conn-ssl.c
src/ngircd/conn.c
src/ngircd/conn.h

index d59b139b17e7967f83d1247763775dd2a6030ba2..5f9cb9eb2a40ae8e36715f5967b4f295d490118f 100644 (file)
        # is only available when ngIRCd is compiled with support for SSL!
        # So don't forget to remove the ";" above if this is the case ...
 
+       # SSL Trusted CA Certificates File (for verifying peer certificates)
+       ;CAFile = /etc/ssl/CA/cacert.pem
+
+       # Certificate Revocation File (for marking otherwise valid
+       # certficates as invalid)
+       ;CRLFile = /etc/ssl/CA/crl.pem
+
        # SSL Server Key Certificate
        ;CertFile = :ETCDIR:/ssl/server-cert.pem
 
        # Connect to the remote server using TLS/SSL (Default: false)
        ;SSLConnect = yes
 
+       # Verify the TLS certificate presented by the remote server
+       # (Default: yes)
+       ;SSLVerify = yes
+
        # Define a (case insensitive) list of masks matching nicknames that
        # should be treated as IRC services when introduced via this remote
        # server, separated by commas (",").
index 9d37e5fad1efd5d35d433fd97c21640feb3a90d4..23c98fa97353ed1dfa5d20f719323577ab5d424b 100644 (file)
@@ -397,6 +397,13 @@ All SSL-related configuration variables are located in the
 section. Please note that this whole section is only recognized by ngIRCd
 when it is compiled with support for SSL using OpenSSL or GnuTLS!
 .TP
+\fBCAFile (string)\fR
+Filename pointing to the Trusted CA Certificates. This is required for
+verifying peer certificates.
+.TP
+\fBCRLFile (string)\fR
+Filename of Certificate Revocation List.
+.TP
 \fBCertFile\fR (string)
 SSL Certificate file of the private server key.
 .TP
@@ -491,6 +498,9 @@ You can use the IRC Operator command CONNECT later on to create the link.
 \fBSSLConnect\fR (boolean)
 Connect to the remote server using TLS/SSL. Default: false.
 .TP
+\fBSSLVerify\fR (boolean)
+Verify the TLS certificate presented by the remote server. Default: yes.
+.TP
 \fBServiceMask\fR (string)
 Define a (case insensitive) list of masks matching nicknames that should be
 treated as IRC services when introduced via this remote server, separated
index 534a63060bd37be07c8ad89f2b9795ac055baa83..3174c88d504693faf1ec4e1ebf02c107dccd2047 100644 (file)
@@ -113,6 +113,12 @@ ConfSSL_Init(void)
        free(Conf_SSLOptions.CertFile);
        Conf_SSLOptions.CertFile = NULL;
 
+       free(Conf_SSLOptions.CAFile);
+       Conf_SSLOptions.CAFile = NULL;
+
+       free(Conf_SSLOptions.CRLFile);
+       Conf_SSLOptions.CRLFile = NULL;
+
        free(Conf_SSLOptions.DHFile);
        Conf_SSLOptions.DHFile = NULL;
        array_free_wipe(&Conf_SSLOptions.KeyFilePassword);
@@ -465,7 +471,10 @@ Conf_Test( void )
                printf( "  Host = %s\n", Conf_Server[i].host );
                printf( "  Port = %u\n", (unsigned int)Conf_Server[i].port );
 #ifdef SSL_SUPPORT
-               printf( "  SSLConnect = %s\n", yesno_to_str(Conf_Server[i].SSLConnect));
+               printf("  SSLConnect = %s\n",
+                      yesno_to_str(Conf_Server[i].SSLConnect));
+               printf("  SSLVerify = %s\n",
+                      yesno_to_str(Conf_Server[i].SSLVerify));
 #endif
                printf( "  MyPassword = %s\n", Conf_Server[i].pwd_in );
                printf( "  PeerPassword = %s\n", Conf_Server[i].pwd_out );
@@ -1797,6 +1806,16 @@ Handle_SSL(const char *File, int Line, char *Var, char *Arg)
                Conf_SSLOptions.CipherList = strdup_warn(Arg);
                return;
        }
+       if (strcasecmp(Var, "CAFile") == 0) {
+               assert(Conf_SSLOptions.CAFile == NULL);
+               Conf_SSLOptions.CAFile = strdup_warn(Arg);
+               return;
+       }
+       if (strcasecmp(Var, "CRLFile") == 0) {
+               assert(Conf_SSLOptions.CRLFile == NULL);
+               Conf_SSLOptions.CRLFile = strdup_warn(Arg);
+               return;
+       }
 
        Config_Error_Section(File, Line, Var, "SSL");
 }
@@ -1927,7 +1946,11 @@ Handle_SERVER(const char *File, int Line, char *Var, char *Arg )
        if( strcasecmp( Var, "SSLConnect" ) == 0 ) {
                New_Server.SSLConnect = Check_ArgIsTrue(Arg);
                return;
-        }
+       }
+       if (strcasecmp(Var, "SSLVerify") == 0) {
+               New_Server.SSLVerify = Check_ArgIsTrue(Arg);
+               return;
+       }
 #endif
        if( strcasecmp( Var, "Group" ) == 0 ) {
                /* Server group */
index 789d3de7f38385bcac66e91ab2ca7482511684e5..9378d17c35f9c27436f6c885c141aed68fbbcbed 100644 (file)
@@ -61,6 +61,7 @@ typedef struct _Conf_Server
        ng_ipaddr_t dst_addr[2];        /**< List of addresses to connect to */
 #ifdef SSL_SUPPORT
        bool SSLConnect;                /**< Establish connection using SSL? */
+       bool SSLVerify;                 /**< Verify server certificate using CA? */
 #endif
        char svs_mask[CLIENT_ID_LEN];   /**< Mask of nicknames that should be
                                             treated and counted as services */
@@ -76,6 +77,8 @@ struct SSLOptions {
        array ListenPorts;              /**< Array of listening SSL ports */
        array KeyFilePassword;          /**< Key file password */
        char *CipherList;               /**< Set SSL cipher list to use */
+       char *CAFile;                   /**< Trusted CA certificates file */
+       char *CRLFile;                  /**< Certificate revocation file */
 };
 #endif
 
index cb066dab98c391c5ea9455cb35e5a63a4106a3f5..649c0e6257ee53f4da7ec2767c5ae80987b2b3f3 100644 (file)
@@ -43,13 +43,17 @@ extern struct SSLOptions Conf_SSLOptions;
 #include <openssl/err.h>
 #include <openssl/rand.h>
 #include <openssl/dh.h>
+#include <openssl/x509v3.h>
 
 static SSL_CTX * ssl_ctx;
 static DH *dh_params;
 
 static bool ConnSSL_LoadServerKey_openssl PARAMS(( SSL_CTX *c ));
+static bool ConnSSL_SetVerifyProperties_openssl PARAMS((SSL_CTX * c));
 #endif
 
+#define MAX_CERT_CHAIN_LENGTH  10      /* XXX: do not hardcode */
+
 #ifdef HAVE_LIBGNUTLS
 #include <sys/types.h>
 #include <sys/stat.h>
@@ -74,6 +78,7 @@ static size_t x509_cred_idx;
 static gnutls_dh_params_t dh_params;
 static gnutls_priority_t priorities_cache = NULL;
 static bool ConnSSL_LoadServerKey_gnutls PARAMS(( void ));
+static bool ConnSSL_SetVerifyProperties_gnutls PARAMS((void));
 #endif
 
 #define SHA256_STRING_LEN      (32 * 2 + 1)
@@ -131,9 +136,37 @@ out:
 /**
  * Log OpenSSL error message.
  *
+ * @param level The log level
  * @param msg The error message.
  * @param info Additional information text or NULL.
  */
+static void
+LogOpenSSL_CertInfo(int level, X509 * cert, const char *msg)
+{
+       BIO *mem;
+       char *memptr;
+       long len;
+
+       assert(cert);
+       assert(msg);
+
+       if (!cert)
+               return;
+       mem = BIO_new(BIO_s_mem());
+       if (!mem)
+               return;
+       X509_NAME_print_ex(mem, X509_get_subject_name(cert), 4,
+                          XN_FLAG_ONELINE);
+       X509_NAME_print_ex(mem, X509_get_issuer_name(cert), 4, XN_FLAG_ONELINE);
+       if (BIO_write(mem, "", 1) == 1) {
+               len = BIO_get_mem_data(mem, &memptr);
+               if (memptr && len > 0)
+                       Log(level, "%s: \"%s\"", msg, memptr);
+       }
+       (void)BIO_set_close(mem, BIO_CLOSE);
+       BIO_free(mem);
+}
+
 static void
 LogOpenSSLError(const char *error, const char *info)
 {
@@ -176,9 +209,16 @@ pem_passwd_cb(char *buf, int size, int rwflag, void *password)
 
 
 static int
-Verify_openssl(UNUSED int preverify_ok, UNUSED X509_STORE_CTX *x509_ctx)
+Verify_openssl(int preverify_ok, X509_STORE_CTX * ctx)
 {
-       return 1;
+       int err;
+
+       if (!preverify_ok) {
+               err = X509_STORE_CTX_get_error(ctx);
+               Log(LOG_ERR, "Certificate validation failed: %s",
+                   X509_verify_cert_error_string(err));
+       }
+       return preverify_ok;
 }
 #endif
 
@@ -354,7 +394,12 @@ ConnSSL_InitLibrary( void )
        }
 
        SSL_CTX_set_session_id_context(newctx, (unsigned char *)"ngircd", 6);
-       SSL_CTX_set_options(newctx, SSL_OP_SINGLE_DH_USE|SSL_OP_NO_SSLv2);
+       if (!ConnSSL_SetVerifyProperties_openssl(newctx))
+               goto out;
+       SSL_CTX_set_options(newctx,
+                           SSL_OP_SINGLE_DH_USE | SSL_OP_NO_SSLv2 |
+                           SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 |
+                           SSL_OP_NO_COMPRESSION);
        SSL_CTX_set_mode(newctx, SSL_MODE_ENABLE_PARTIAL_WRITE);
        SSL_CTX_set_verify(newctx, SSL_VERIFY_PEER|SSL_VERIFY_CLIENT_ONCE,
                           Verify_openssl);
@@ -394,6 +439,9 @@ out:
                goto out;
        }
 
+       if (!ConnSSL_SetVerifyProperties_gnutls())
+               goto out;
+
        Log(LOG_INFO, "GnuTLS %s initialized.", gnutls_check_version(NULL));
        initialized = true;
        return true;
@@ -405,6 +453,37 @@ out:
 
 
 #ifdef HAVE_LIBGNUTLS
+static bool
+ConnSSL_SetVerifyProperties_gnutls(void)
+{
+       int err;
+
+       if (!Conf_SSLOptions.CAFile)
+               return true;
+
+       err = gnutls_certificate_set_x509_trust_file(x509_cred,
+                                                    Conf_SSLOptions.CAFile,
+                                                    GNUTLS_X509_FMT_PEM);
+       if (err < 0) {
+               Log(LOG_ERR, "Failed to load x509 trust file %s: %s",
+                   Conf_SSLOptions.CAFile, gnutls_strerror(err));
+               return false;
+       }
+       if (Conf_SSLOptions.CRLFile) {
+               err =
+                   gnutls_certificate_set_x509_crl_file(x509_cred,
+                                                        Conf_SSLOptions.CRLFile,
+                                                        GNUTLS_X509_FMT_PEM);
+               if (err < 0) {
+                       Log(LOG_ERR, "Failed to load x509 crl file %s: %s",
+                           Conf_SSLOptions.CRLFile, gnutls_strerror(err));
+                       return false;
+               }
+       }
+       return true;
+}
+
+
 static bool
 ConnSSL_LoadServerKey_gnutls(void)
 {
@@ -531,6 +610,56 @@ ConnSSL_LoadServerKey_openssl(SSL_CTX *ctx)
 }
 
 
+static bool
+ConnSSL_SetVerifyProperties_openssl(SSL_CTX * ctx)
+{
+       X509_STORE *store = NULL;
+       X509_LOOKUP *lookup;
+       int verify_flags = SSL_VERIFY_PEER;
+       bool ret = false;
+
+       if (!Conf_SSLOptions.CAFile)
+               return true;
+
+       if (SSL_CTX_load_verify_locations(ctx, Conf_SSLOptions.CAFile, NULL) !=
+           1) {
+               LogOpenSSLError("SSL_CTX_load_verify_locations", NULL);
+               goto out;
+       }
+
+       if (Conf_SSLOptions.CRLFile) {
+               X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
+               X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
+               SSL_CTX_set1_param(ctx, param);
+
+               store = SSL_CTX_get_cert_store(ctx);
+               assert(store);
+               lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
+               if (!lookup) {
+                       LogOpenSSLError("X509_STORE_add_lookup",
+                                       Conf_SSLOptions.CRLFile);
+                       goto out;
+               }
+
+               if (X509_load_crl_file
+                   (lookup, Conf_SSLOptions.CRLFile, X509_FILETYPE_PEM) != 1) {
+                       LogOpenSSLError("X509_load_crl_file",
+                                       Conf_SSLOptions.CRLFile);
+                       goto out;
+               }
+       }
+
+       SSL_CTX_set_verify(ctx, verify_flags, Verify_openssl);
+       SSL_CTX_set_verify_depth(ctx, MAX_CERT_CHAIN_LENGTH);
+       ret = true;
+out:
+       if (Conf_SSLOptions.CRLFile)
+               free(Conf_SSLOptions.CRLFile);
+       Conf_SSLOptions.CRLFile = NULL;
+       return ret;
+}
+
+
 #endif
 static bool
 ConnSSL_Init_SSL(CONNECTION *c)
@@ -602,7 +731,7 @@ ConnSSL_Init_SSL(CONNECTION *c)
 
 
 bool
-ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
+ConnSSL_PrepareConnect(CONNECTION * c, CONF_SERVER * s)
 {
        bool ret;
 #ifdef HAVE_LIBGNUTLS
@@ -613,7 +742,7 @@ ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
                Log(LOG_ERR, "Failed to initialize new SSL session: %s",
                    gnutls_strerror(err));
                return false;
-        }
+       }
 #endif
        ret = ConnSSL_Init_SSL(c);
        if (!ret)
@@ -621,7 +750,23 @@ ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
        Conn_OPTION_ADD(c, CONN_SSL_CONNECT);
 #ifdef HAVE_LIBSSL
        assert(c->ssl_state.ssl);
-       SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_NONE, NULL);
+       if (s->SSLVerify) {
+               X509_VERIFY_PARAM *param = NULL;
+               param = SSL_get0_param(c->ssl_state.ssl);
+               X509_VERIFY_PARAM_set_hostflags(param,
+                                               X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
+Log(LOG_ERR, "DEBUG: Setting up hostname verification for '%s'", s->host);
+               int err = X509_VERIFY_PARAM_set1_host(param, s->host, 0);
+               if (err != 1) {
+                       Log(LOG_ERR,
+                           "Cannot set up hostname verification for '%s': %u",
+                           s->host, err);
+                       return false;
+               }
+               SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_PEER,
+                              Verify_openssl);
+       } else
+               SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_NONE, NULL);
 #endif
        return true;
 }
@@ -720,18 +865,102 @@ ConnSSL_HandleError(CONNECTION * c, const int code, const char *fname)
 }
 
 
+#ifdef HAVE_LIBGNUTLS
+static void *
+LogMalloc(size_t s)
+{
+       void *mem = malloc(s);
+       if (!mem)
+               Log(LOG_ERR, "Out of memory: Could not allocate %lu byte",
+                   (unsigned long)s);
+       return mem;
+}
+
+
 static void
-ConnSSL_LogCertInfo( CONNECTION *c )
+LogGnuTLS_CertInfo(int level, gnutls_x509_crt_t cert, const char *msg)
 {
+       char *dn, *issuer_dn;
+       size_t size = 0;
+       int err = gnutls_x509_crt_get_dn(cert, NULL, &size);
+       if (size == 0) {
+               Log(LOG_ERR, "gnutls_x509_crt_get_dn: size == 0");
+               return;
+       }
+       if (err && err != GNUTLS_E_SHORT_MEMORY_BUFFER)
+               goto err_crt_get;
+       dn = LogMalloc(size);
+       if (!dn)
+               return;
+       err = gnutls_x509_crt_get_dn(cert, dn, &size);
+       if (err)
+               goto err_crt_get;
+       gnutls_x509_crt_get_issuer_dn(cert, NULL, &size);
+       assert(size);
+       issuer_dn = LogMalloc(size);
+       if (!issuer_dn) {
+               Log(level, "%s: Distinguished Name: %s", msg, dn);
+               free(dn);
+               return;
+       }
+       gnutls_x509_crt_get_issuer_dn(cert, issuer_dn, &size);
+       Log(level, "%s: Distinguished Name: \"%s\", Issuer \"%s\"", msg, dn,
+           issuer_dn);
+       free(dn);
+       free(issuer_dn);
+       return;
+
+      err_crt_get:
+       Log(LOG_ERR, "gnutls_x509_crt_get_dn: %s", gnutls_strerror(err));
+       return;
+}
+#endif
+
+
+static void
+ConnSSL_LogCertInfo( CONNECTION * c, bool connect)
+{
+       bool cert_seen = false, cert_ok = false;
+       char msg[128];
 #ifdef HAVE_LIBSSL
+       const char *comp_alg = "no compression";
+       const void *comp;
+       X509 *peer_cert = NULL;
        SSL *ssl = c->ssl_state.ssl;
 
        assert(ssl);
 
-       Log(LOG_INFO, "Connection %d: initialized %s using cipher %s.",
-               c->sock, SSL_get_version(ssl), SSL_get_cipher(ssl));
+       comp = SSL_get_current_compression(ssl);
+       if (comp)
+               comp_alg = SSL_COMP_get_name(comp);
+       Log(LOG_INFO, "Connection %d: initialized %s using cipher %s, %s.",
+           c->sock, SSL_get_version(ssl), SSL_get_cipher(ssl), comp_alg);
+       peer_cert = SSL_get_peer_certificate(ssl);
+       if (peer_cert && connect) {
+               cert_seen = true;
+               /* Client: Check server certificate */
+               int err = SSL_get_verify_result(ssl);
+               if (err == X509_V_OK) {
+                       const char *peername = SSL_get0_peername(ssl);
+                       if (peername != NULL)
+                               cert_ok = true;
+
+                       Log(LOG_ERR, "X509_V_OK, peername = '%s'", peername);
+
+               } else
+                       Log(LOG_ERR, "Certificate validation failed: %s",
+                           X509_verify_cert_error_string(err));
+               snprintf(msg, sizeof(msg), "%svalid peer certificate",
+                        cert_ok ? "" : "in");
+               LogOpenSSL_CertInfo(cert_ok ? LOG_DEBUG : LOG_ERR, peer_cert,
+                                   msg);
+
+               X509_free(peer_cert);
+       }
 #endif
 #ifdef HAVE_LIBGNUTLS
+       unsigned int status;
+       gnutls_credentials_type_t cred;
        gnutls_session_t sess = c->ssl_state.gnutls_session;
        gnutls_cipher_algorithm_t cipher = gnutls_cipher_get(sess);
 
@@ -740,7 +969,81 @@ ConnSSL_LogCertInfo( CONNECTION *c )
            gnutls_protocol_get_name(gnutls_protocol_get_version(sess)),
            gnutls_cipher_get_name(cipher),
            gnutls_mac_get_name(gnutls_mac_get(sess)));
+       cred = gnutls_auth_get_type(c->ssl_state.gnutls_session);
+       if (cred == GNUTLS_CRD_CERTIFICATE && connect) {
+               cert_seen = true;
+               int verify =
+                   gnutls_certificate_verify_peers2(c->
+                                                    ssl_state.gnutls_session,
+                                                    &status);
+Log(LOG_ERR, "DEBUG: verify = %d", verify);
+               if (verify < 0) {
+                       Log(LOG_ERR,
+                           "gnutls_certificate_verify_peers2 failed: %s",
+                           gnutls_strerror(verify));
+                       goto done_cn_validation;
+               } else if (status) {
+                       gnutls_datum_t out;
+
+                       if (gnutls_certificate_verification_status_print
+                           (status, gnutls_certificate_type_get(sess), &out,
+                            0) == GNUTLS_E_SUCCESS) {
+                               Log(LOG_ERR,
+                                   "Certificate validation failed: %s",
+                                   out.data);
+                               gnutls_free(out.data);
+                       }
+               }
+Log(LOG_ERR, "DEBUG: status = %d", status);
+
+               gnutls_x509_crt_t cert;
+               unsigned cert_list_size;
+               const gnutls_datum_t *cert_list =
+                   gnutls_certificate_get_peers(sess, &cert_list_size);
+               if (!cert_list || cert_list_size == 0) {
+                       Log(LOG_ERR, "No certificates found");
+                       goto done_cn_validation;
+               }
+               int err = gnutls_x509_crt_init(&cert);
+               if (err < 0) {
+                       Log(LOG_ERR,
+                           "Failed to initialize x509 certificate: %s",
+                           gnutls_strerror(err));
+                       goto done_cn_validation;
+               }
+               err = gnutls_x509_crt_import(cert, cert_list,
+                                          GNUTLS_X509_FMT_DER);
+               if (err < 0) {
+                       Log(LOG_ERR, "Failed to parse the certificate: %s",
+                           gnutls_strerror(err));
+                       goto done_cn_validation;
+               }
+               err = gnutls_x509_crt_check_hostname(cert, c->host);
+               if (err == 0)
+                       Log(LOG_ERR,
+                           "Failed to verify the hostname, expected \"%s\"",
+                           c->host);
+               else
+                       cert_ok = verify == 0 && status == 0;
+
+               snprintf(msg, sizeof(msg), "%svalid peer certificate",
+                       cert_ok ? "" : "in");
+               LogGnuTLS_CertInfo(cert_ok ? LOG_DEBUG : LOG_ERR, cert, msg);
+
+               gnutls_x509_crt_deinit(cert);
+done_cn_validation:
+               ;
+       }
 #endif
+       /*
+        * can be used later to check if connection was authenticated, e.g.
+        * if inbound connection tries to register itself as server.
+        * Could also restrict /OPER to authenticated connections, etc.
+        */
+       if (cert_ok)
+               Conn_OPTION_ADD(c, CONN_SSL_PEERCERT_OK);
+       if (!cert_seen)
+               Log(LOG_INFO, "Peer did not present a certificate");
 }
 
 
@@ -879,7 +1182,7 @@ ConnectAccept( CONNECTION *c, bool connect)
        (void)ConnSSL_InitCertFp(c);
 
        Conn_OPTION_DEL(c, (CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ|CONN_SSL_CONNECT));
-       ConnSSL_LogCertInfo(c);
+       ConnSSL_LogCertInfo(c, connect);
 
        Conn_StartLogin(CONNECTION2ID(c));
        return 1;
index ae442b4ddbd5abf9820f804397d057a9082af59e..3882899f4406b85829d0f5e0ce04f0008aff093a 100644 (file)
@@ -2563,6 +2563,7 @@ static void
 cb_connserver_login_ssl(int sock, short unused)
 {
        CONN_ID idx = Socket2Index(sock);
+       int serveridx;
 
        (void) unused;
 
@@ -2581,10 +2582,30 @@ cb_connserver_login_ssl(int sock, short unused)
                        return;
        }
 
+       serveridx = Conf_GetServer(idx);
+       assert(serveridx >= 0);
+       if (serveridx < 0)
+               goto err;
+
        Log( LOG_INFO, "SSL connection %d with \"%s:%d\" established.", idx,
            My_Connections[idx].host, Conf_Server[Conf_GetServer( idx )].port );
 
+       if (!Conn_OPTION_ISSET(&My_Connections[idx], CONN_SSL_PEERCERT_OK)) {
+               if (Conf_Server[serveridx].SSLVerify) {
+                       Log(LOG_ERR,
+                               "SSLVerify enabled for %d, but peer certificate check failed",
+                               idx);
+                       goto err;
+               }
+               Log(LOG_WARNING,
+                       "Peer certificate check failed for %d, but SSLVerify is disabled, continuing",
+                       idx);
+       }
        server_login(idx);
+       return;
+      err:
+       Log(LOG_ERR, "SSL connection on socket %d failed!", sock);
+       Conn_Close(idx, "Can't connect!", NULL, false);
 }
 
 
index ca64ad205e6f3595d4f5a7c1b0b0cca2e3e3706b..d53cb0c6685555c2b1f5337f920c87e4c25e375e 100644 (file)
@@ -40,7 +40,8 @@
 #define CONN_SSL               32      /* this connection is SSL encrypted */
 #define CONN_SSL_WANT_WRITE    64      /* SSL/TLS library needs to write protocol data */
 #define CONN_SSL_WANT_READ     128     /* SSL/TLS library needs to read protocol data */
-#define CONN_SSL_FLAGS_ALL     (CONN_SSL_CONNECT|CONN_SSL|CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ)
+#define CONN_SSL_PEERCERT_OK   256     /* peer presented a valid certificate (used to check inbound server auth */
+#define CONN_SSL_FLAGS_ALL     (CONN_SSL_CONNECT|CONN_SSL|CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ|CONN_SSL_PEERCERT_OK)
 #endif
 typedef int CONN_ID;