mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
1497 lines
42 KiB
C++
1497 lines
42 KiB
C++
// OpenVPN -- An application to securely tunnel IP networks
|
|
// over a single port, with support for SSL/TLS-based
|
|
// session authentication and key exchange,
|
|
// packet encryption, packet authentication, and
|
|
// packet compression.
|
|
//
|
|
// Copyright (C) 2012-2017 OpenVPN Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License Version 3
|
|
// as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program in the COPYING file.
|
|
// If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Wrap the OpenSSL SSL API as defined in <openssl/ssl.h>
|
|
// so that it can be used as the SSL layer by the OpenVPN core.
|
|
|
|
#ifndef OPENVPN_OPENSSL_SSL_SSLCTX_H
|
|
#define OPENVPN_OPENSSL_SSL_SSLCTX_H
|
|
|
|
#include <string>
|
|
#include <cstring>
|
|
#include <sstream>
|
|
#include <utility>
|
|
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/x509v3.h>
|
|
|
|
#include <openvpn/common/size.hpp>
|
|
#include <openvpn/common/exception.hpp>
|
|
#include <openvpn/common/mode.hpp>
|
|
#include <openvpn/common/options.hpp>
|
|
#include <openvpn/common/base64.hpp>
|
|
#include <openvpn/common/string.hpp>
|
|
#include <openvpn/common/uniqueptr.hpp>
|
|
#include <openvpn/common/hexstr.hpp>
|
|
#include <openvpn/common/to_string.hpp>
|
|
#include <openvpn/frame/frame.hpp>
|
|
#include <openvpn/buffer/buffer.hpp>
|
|
#include <openvpn/pki/cclist.hpp>
|
|
#include <openvpn/pki/epkibase.hpp>
|
|
#include <openvpn/ssl/kuparse.hpp>
|
|
#include <openvpn/ssl/nscert.hpp>
|
|
#include <openvpn/ssl/tlsver.hpp>
|
|
#include <openvpn/ssl/tls_remote.hpp>
|
|
#include <openvpn/ssl/sslconsts.hpp>
|
|
#include <openvpn/ssl/sslapi.hpp>
|
|
#include <openvpn/ssl/ssllog.hpp>
|
|
#include <openvpn/openssl/util/error.hpp>
|
|
#include <openvpn/openssl/pki/x509.hpp>
|
|
#include <openvpn/openssl/pki/crl.hpp>
|
|
#include <openvpn/openssl/pki/pkey.hpp>
|
|
#include <openvpn/openssl/pki/dh.hpp>
|
|
#include <openvpn/openssl/pki/x509store.hpp>
|
|
#include <openvpn/openssl/bio/bio_memq_stream.hpp>
|
|
|
|
// An SSL Context is essentially a configuration that can be used
|
|
// to generate an arbitrary number of actual SSL connections objects.
|
|
|
|
// OpenSSLContext is an SSL Context implementation that uses the
|
|
// OpenSSL library as a backend.
|
|
|
|
namespace openvpn {
|
|
|
|
// Represents an SSL configuration that can be used
|
|
// to instantiate actual SSL sessions.
|
|
class OpenSSLContext : public SSLFactoryAPI
|
|
{
|
|
public:
|
|
typedef RCPtr<OpenSSLContext> Ptr;
|
|
typedef CertCRLListTemplate<OpenSSLPKI::X509List, OpenSSLPKI::CRLList> CertCRLList;
|
|
|
|
enum {
|
|
MAX_CIPHERTEXT_IN = 64 // maximum number of queued input ciphertext packets
|
|
};
|
|
|
|
// The data needed to construct an OpenSSLContext.
|
|
class Config : public SSLConfigAPI
|
|
{
|
|
friend class OpenSSLContext;
|
|
|
|
public:
|
|
typedef RCPtr<Config> Ptr;
|
|
|
|
Config() : external_pki(nullptr),
|
|
ssl_debug_level(0),
|
|
flags(0),
|
|
ns_cert_type(NSCert::NONE),
|
|
tls_version_min(TLSVersion::UNDEF),
|
|
tls_cert_profile(TLSCertProfile::UNDEF),
|
|
local_cert_enabled(true),
|
|
force_aes_cbc_ciphersuites(false),
|
|
enable_renegotiation(false) {}
|
|
|
|
virtual SSLFactoryAPI::Ptr new_factory()
|
|
{
|
|
return SSLFactoryAPI::Ptr(new OpenSSLContext(this));
|
|
}
|
|
|
|
virtual void set_mode(const Mode& mode_arg)
|
|
{
|
|
mode = mode_arg;
|
|
}
|
|
|
|
virtual const Mode& get_mode() const
|
|
{
|
|
return mode;
|
|
}
|
|
|
|
// if this callback is defined, no private key needs to be loaded
|
|
virtual void set_external_pki_callback(ExternalPKIBase* external_pki_arg)
|
|
{
|
|
external_pki = external_pki_arg;
|
|
}
|
|
|
|
virtual void set_private_key_password(const std::string& pwd)
|
|
{
|
|
pkey.set_private_key_password(pwd);
|
|
}
|
|
|
|
virtual void load_ca(const std::string& ca_txt, bool strict)
|
|
{
|
|
ca.parse_pem(ca_txt, "ca");
|
|
}
|
|
|
|
virtual void load_crl(const std::string& crl_txt)
|
|
{
|
|
throw ssl_options_error("CRL not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual void load_cert(const std::string& cert_txt)
|
|
{
|
|
cert.parse_pem(cert_txt, "cert");
|
|
}
|
|
|
|
virtual void load_cert(const std::string& cert_txt, const std::string& extra_certs_txt)
|
|
{
|
|
load_cert(cert_txt);
|
|
if (!extra_certs_txt.empty())
|
|
CertCRLList::from_string(extra_certs_txt, "extra-certs", &extra_certs, nullptr);
|
|
}
|
|
|
|
virtual void load_private_key(const std::string& key_txt)
|
|
{
|
|
pkey.parse_pem(key_txt, "private key");
|
|
}
|
|
|
|
virtual void load_dh(const std::string& dh_txt)
|
|
{
|
|
dh.parse_pem(dh_txt);
|
|
}
|
|
|
|
virtual std::string extract_ca() const
|
|
{
|
|
throw ssl_options_error("extract_ca not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual std::string extract_crl() const
|
|
{
|
|
throw ssl_options_error("CRL not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual std::string extract_cert() const
|
|
{
|
|
throw ssl_options_error("extract_cert not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual std::vector<std::string> extract_extra_certs() const
|
|
{
|
|
throw ssl_options_error("extract_extra_certs not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual std::string extract_private_key() const
|
|
{
|
|
throw ssl_options_error("extract_priv_key not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual std::string extract_dh() const
|
|
{
|
|
throw ssl_options_error("extract_dh not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual PKType private_key_type() const
|
|
{
|
|
throw ssl_options_error("private_key_type not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual size_t private_key_length() const
|
|
{
|
|
throw ssl_options_error("private_key_length not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual void set_frame(const Frame::Ptr& frame_arg)
|
|
{
|
|
frame = frame_arg;
|
|
}
|
|
|
|
virtual void set_debug_level(const int debug_level)
|
|
{
|
|
ssl_debug_level = debug_level;
|
|
}
|
|
|
|
virtual void set_flags(const unsigned int flags_arg)
|
|
{
|
|
flags = flags_arg;
|
|
}
|
|
|
|
virtual void set_ns_cert_type(const NSCert::Type ns_cert_type_arg)
|
|
{
|
|
ns_cert_type = ns_cert_type_arg;
|
|
}
|
|
|
|
virtual void set_remote_cert_tls(const KUParse::TLSWebType wt)
|
|
{
|
|
KUParse::remote_cert_tls(wt, ku, eku);
|
|
}
|
|
|
|
virtual void set_tls_remote(const std::string& tls_remote_arg)
|
|
{
|
|
tls_remote = tls_remote_arg;
|
|
}
|
|
|
|
virtual void set_tls_version_min(const TLSVersion::Type tvm)
|
|
{
|
|
tls_version_min = tvm;
|
|
}
|
|
|
|
virtual void set_tls_version_min_override(const std::string& override)
|
|
{
|
|
TLSVersion::apply_override(tls_version_min, override);
|
|
}
|
|
|
|
virtual void set_tls_cert_profile(const TLSCertProfile::Type type)
|
|
{
|
|
tls_cert_profile = type;
|
|
}
|
|
|
|
virtual void set_tls_cert_profile_override(const std::string& override)
|
|
{
|
|
TLSCertProfile::apply_override(tls_cert_profile, override);
|
|
}
|
|
|
|
virtual void set_local_cert_enabled(const bool v)
|
|
{
|
|
local_cert_enabled = v;
|
|
}
|
|
|
|
virtual void set_enable_renegotiation(const bool v)
|
|
{
|
|
enable_renegotiation = v;
|
|
}
|
|
|
|
virtual void set_force_aes_cbc_ciphersuites(const bool v)
|
|
{
|
|
force_aes_cbc_ciphersuites = v;
|
|
}
|
|
|
|
virtual void set_x509_track(X509Track::ConfigSet x509_track_config_arg)
|
|
{
|
|
x509_track_config = std::move(x509_track_config_arg);
|
|
}
|
|
|
|
virtual void set_rng(const RandomAPI::Ptr& rng_arg)
|
|
{
|
|
// Not implemented (other than assert_crypto check)
|
|
// because OpenSSL is hardcoded to use its own RNG.
|
|
rng_arg->assert_crypto();
|
|
}
|
|
|
|
virtual std::string validate_cert(const std::string& cert_txt) const
|
|
{
|
|
OpenSSLPKI::X509 cert(cert_txt, "cert");
|
|
return cert.render_pem();
|
|
}
|
|
|
|
virtual std::string validate_cert_list(const std::string& certs_txt) const
|
|
{
|
|
CertCRLList certs(certs_txt, "cert list");
|
|
return certs.render_pem();
|
|
}
|
|
|
|
virtual std::string validate_private_key(const std::string& key_txt) const
|
|
{
|
|
OpenSSLPKI::PKey pkey(key_txt, "private key");
|
|
return pkey.render_pem();
|
|
}
|
|
|
|
virtual std::string validate_dh(const std::string& dh_txt) const
|
|
{
|
|
OpenSSLPKI::DH dh(dh_txt);
|
|
return dh.render_pem();
|
|
}
|
|
|
|
virtual std::string validate_crl(const std::string& crl_txt) const
|
|
{
|
|
throw ssl_options_error("CRL not implemented yet in OpenSSL driver"); // fixme
|
|
}
|
|
|
|
virtual void load(const OptionList& opt, const unsigned int lflags)
|
|
{
|
|
// client/server
|
|
if (lflags & LF_PARSE_MODE)
|
|
mode = opt.exists("client") ? Mode(Mode::CLIENT) : Mode(Mode::SERVER);
|
|
|
|
// possibly disable peer cert verification
|
|
if ((lflags & LF_ALLOW_CLIENT_CERT_NOT_REQUIRED)
|
|
&& opt.exists("client-cert-not-required"))
|
|
flags |= SSLConst::NO_VERIFY_PEER;
|
|
|
|
// ca
|
|
{
|
|
std::string ca_txt = opt.cat("ca");
|
|
if (lflags & LF_RELAY_MODE)
|
|
ca_txt += opt.cat("relay-extra-ca");
|
|
load_ca(ca_txt, true);
|
|
}
|
|
|
|
// local cert/key
|
|
if (local_cert_enabled)
|
|
{
|
|
// cert
|
|
{
|
|
const std::string& cert_txt = opt.get("cert", 1, Option::MULTILINE);
|
|
const std::string ec_txt = opt.cat("extra-certs");
|
|
load_cert(cert_txt, ec_txt);
|
|
}
|
|
|
|
// private key
|
|
if (!external_pki)
|
|
{
|
|
const std::string& key_txt = opt.get("key", 1, Option::MULTILINE);
|
|
load_private_key(key_txt);
|
|
}
|
|
}
|
|
|
|
// DH
|
|
if (mode.is_server())
|
|
{
|
|
const std::string& dh_txt = opt.get("dh", 1, Option::MULTILINE);
|
|
load_dh(dh_txt);
|
|
}
|
|
|
|
// relay mode
|
|
std::string relay_prefix;
|
|
if (lflags & LF_RELAY_MODE)
|
|
relay_prefix = "relay-";
|
|
|
|
// ns-cert-type
|
|
ns_cert_type = NSCert::ns_cert_type(opt, relay_prefix);
|
|
|
|
// parse remote-cert-x options
|
|
KUParse::remote_cert_tls(opt, relay_prefix, ku, eku);
|
|
KUParse::remote_cert_ku(opt, relay_prefix, ku);
|
|
KUParse::remote_cert_eku(opt, relay_prefix, eku);
|
|
|
|
// parse tls-remote
|
|
tls_remote = opt.get_optional(relay_prefix + "tls-remote", 1, 256);
|
|
|
|
// Parse tls-version-min option.
|
|
// Assume that presence of SSL_OP_NO_TLSvX macro indicates
|
|
// that local OpenSSL library implements TLSvX.
|
|
{
|
|
# if defined(SSL_OP_NO_TLSv1_2)
|
|
const TLSVersion::Type maxver = TLSVersion::V1_2;
|
|
# elif defined(SSL_OP_NO_TLSv1_1)
|
|
const TLSVersion::Type maxver = TLSVersion::V1_1;
|
|
# else
|
|
const TLSVersion::Type maxver = TLSVersion::V1_0;
|
|
# endif
|
|
tls_version_min = TLSVersion::parse_tls_version_min(opt, relay_prefix, maxver);
|
|
}
|
|
|
|
// parse tls-cert-profile
|
|
tls_cert_profile = TLSCertProfile::parse_tls_cert_profile(opt, relay_prefix);
|
|
|
|
// unsupported cert checkers
|
|
{
|
|
}
|
|
}
|
|
|
|
private:
|
|
Mode mode;
|
|
CertCRLList ca; // from OpenVPN "ca" option
|
|
OpenSSLPKI::X509 cert; // from OpenVPN "cert" option
|
|
OpenSSLPKI::X509List extra_certs; // from OpenVPN "extra-certs" option
|
|
OpenSSLPKI::PKey pkey; // private key
|
|
OpenSSLPKI::DH dh; // diffie-hellman parameters (only needed in server mode)
|
|
ExternalPKIBase* external_pki;
|
|
Frame::Ptr frame;
|
|
int ssl_debug_level;
|
|
unsigned int flags; // defined in sslconsts.hpp
|
|
NSCert::Type ns_cert_type;
|
|
std::vector<unsigned int> ku; // if defined, peer cert X509 key usage must match one of these values
|
|
std::string eku; // if defined, peer cert X509 extended key usage must match this OID/string
|
|
std::string tls_remote;
|
|
TLSVersion::Type tls_version_min; // minimum TLS version that we will negotiate
|
|
TLSCertProfile::Type tls_cert_profile;
|
|
X509Track::ConfigSet x509_track_config;
|
|
bool local_cert_enabled;
|
|
bool force_aes_cbc_ciphersuites;
|
|
bool enable_renegotiation;
|
|
};
|
|
|
|
// Represents an actual SSL session.
|
|
// Normally instantiated by OpenSSLContext::ssl().
|
|
class SSL : public SSLAPI
|
|
{
|
|
friend class OpenSSLContext;
|
|
|
|
public:
|
|
typedef RCPtr<SSL> Ptr;
|
|
|
|
virtual void start_handshake()
|
|
{
|
|
SSL_do_handshake(ssl);
|
|
}
|
|
|
|
virtual ssize_t write_cleartext_unbuffered(const void *data, const size_t size)
|
|
{
|
|
const int status = BIO_write(ssl_bio, data, size);
|
|
if (status < 0)
|
|
{
|
|
if (status == -1 && BIO_should_retry(ssl_bio))
|
|
return SSLConst::SHOULD_RETRY;
|
|
else
|
|
OPENVPN_THROW(OpenSSLException, "OpenSSLContext::SSL::write_cleartext: BIO_write failed, size=" << size << " status=" << status);
|
|
}
|
|
else
|
|
return status;
|
|
}
|
|
|
|
virtual ssize_t read_cleartext(void *data, const size_t capacity)
|
|
{
|
|
if (!overflow)
|
|
{
|
|
const int status = BIO_read(ssl_bio, data, capacity);
|
|
if (status < 0)
|
|
{
|
|
if (status == -1 && BIO_should_retry(ssl_bio))
|
|
return SSLConst::SHOULD_RETRY;
|
|
else
|
|
OPENVPN_THROW(OpenSSLException, "OpenSSLContext::SSL::read_cleartext: BIO_read failed, cap=" << capacity << " status=" << status);
|
|
}
|
|
else
|
|
return status;
|
|
}
|
|
else
|
|
throw ssl_ciphertext_in_overflow();
|
|
}
|
|
|
|
virtual bool read_cleartext_ready() const
|
|
{
|
|
return !bmq_stream::memq_from_bio(ct_in)->empty() || SSL_pending(ssl) > 0;
|
|
}
|
|
|
|
virtual void write_ciphertext(const BufferPtr& buf)
|
|
{
|
|
bmq_stream::MemQ* in = bmq_stream::memq_from_bio(ct_in);
|
|
if (in->size() < MAX_CIPHERTEXT_IN)
|
|
in->write_buf(buf);
|
|
else
|
|
overflow = true;
|
|
}
|
|
|
|
virtual void write_ciphertext_unbuffered(const unsigned char *data, const size_t size)
|
|
{
|
|
bmq_stream::MemQ* in = bmq_stream::memq_from_bio(ct_in);
|
|
if (in->size() < MAX_CIPHERTEXT_IN)
|
|
in->write(data, size);
|
|
else
|
|
overflow = true;
|
|
}
|
|
|
|
virtual bool read_ciphertext_ready() const
|
|
{
|
|
return !bmq_stream::memq_from_bio(ct_out)->empty();
|
|
}
|
|
|
|
virtual BufferPtr read_ciphertext()
|
|
{
|
|
return bmq_stream::memq_from_bio(ct_out)->read_buf();
|
|
}
|
|
|
|
virtual std::string ssl_handshake_details() const
|
|
{
|
|
return ssl_handshake_details(ssl);
|
|
}
|
|
|
|
virtual const AuthCert::Ptr& auth_cert() const
|
|
{
|
|
return authcert;
|
|
}
|
|
|
|
~SSL()
|
|
{
|
|
ssl_erase();
|
|
}
|
|
|
|
static void init_static()
|
|
{
|
|
mydata_index = SSL_get_ex_new_index(0, (char *)"OpenSSLContext::SSL", nullptr, nullptr, nullptr);
|
|
|
|
// We actually override some of the OpenSSL SSLv23 methods here,
|
|
// in particular the ssl_pending method. We want ssl_pending
|
|
// to return 0 until the SSL negotiation establishes the
|
|
// actual method. The default OpenSSL SSLv23 ssl_pending method
|
|
// (ssl_undefined_const_function) triggers an OpenSSL error condition
|
|
// which is not what we want.
|
|
|
|
ssl23_method_client_ = *SSLv23_client_method();
|
|
ssl23_method_client_.ssl_pending = ssl_pending_override;
|
|
|
|
ssl23_method_server_ = *SSLv23_server_method();
|
|
ssl23_method_server_.ssl_pending = ssl_pending_override;
|
|
}
|
|
|
|
private:
|
|
SSL(const OpenSSLContext& ctx, const char *hostname)
|
|
{
|
|
ssl_clear();
|
|
try {
|
|
// init SSL objects
|
|
ssl = SSL_new(ctx.ctx);
|
|
if (!ssl)
|
|
throw OpenSSLException("OpenSSLContext::SSL: SSL_new failed");
|
|
|
|
// release unneeded buffers
|
|
SSL_set_mode(ssl, SSL_MODE_RELEASE_BUFFERS);
|
|
|
|
// verify hostname
|
|
if (hostname)
|
|
{
|
|
X509_VERIFY_PARAM *param = SSL_get0_param(ssl);
|
|
X509_VERIFY_PARAM_set_hostflags(param, 0);
|
|
X509_VERIFY_PARAM_set1_host(param, hostname, 0);
|
|
}
|
|
|
|
// init BIOs
|
|
ssl_bio = BIO_new(BIO_f_ssl());
|
|
if (!ssl_bio)
|
|
throw OpenSSLException("OpenSSLContext::SSL: BIO_new BIO_f_ssl failed");
|
|
ct_in = mem_bio(ctx.config->frame);
|
|
ct_out = mem_bio(ctx.config->frame);
|
|
|
|
// set client/server mode
|
|
if (ctx.config->mode.is_server())
|
|
{
|
|
SSL_set_accept_state(ssl);
|
|
authcert.reset(new AuthCert());
|
|
if (!ctx.config->x509_track_config.empty())
|
|
authcert->x509_track.reset(new X509Track::Set);
|
|
}
|
|
else if (ctx.config->mode.is_client())
|
|
{
|
|
SSL_set_connect_state(ssl);
|
|
if (ctx.config->flags & SSLConst::ENABLE_SNI)
|
|
if (SSL_set_tlsext_host_name(ssl, hostname) != 1)
|
|
throw OpenSSLException("OpenSSLContext::SSL: SSL_set_tlsext_host_name failed");
|
|
}
|
|
else
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext::SSL: unknown client/server mode");
|
|
|
|
// effect SSL/BIO linkage
|
|
ssl_bio_linkage = true; // after this point, no need to explicitly BIO_free ct_in/ct_out
|
|
SSL_set_bio (ssl, ct_in, ct_out);
|
|
BIO_set_ssl (ssl_bio, ssl, BIO_NOCLOSE);
|
|
|
|
if (mydata_index < 0)
|
|
throw ssl_context_error("OpenSSLContext::SSL: mydata_index is uninitialized");
|
|
SSL_set_ex_data (ssl, mydata_index, this);
|
|
}
|
|
catch (...)
|
|
{
|
|
ssl_erase();
|
|
throw;
|
|
}
|
|
}
|
|
|
|
// Indicate no data available for our custom SSLv23 method
|
|
static int ssl_pending_override(const ::SSL *)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
// Print a one line summary of SSL/TLS session handshake.
|
|
static std::string ssl_handshake_details (const ::SSL *c_ssl)
|
|
{
|
|
std::ostringstream os;
|
|
|
|
const SSL_CIPHER *ciph = SSL_get_current_cipher (c_ssl);
|
|
os << SSL_get_version (c_ssl) << ", cipher " << SSL_CIPHER_get_version (ciph) << ' ' << SSL_CIPHER_get_name (ciph);
|
|
|
|
::X509 *cert = SSL_get_peer_certificate (c_ssl);
|
|
if (cert != nullptr)
|
|
{
|
|
EVP_PKEY *pkey = X509_get_pubkey (cert);
|
|
if (pkey != nullptr)
|
|
{
|
|
if (pkey->type == EVP_PKEY_RSA && pkey->pkey.rsa != nullptr && pkey->pkey.rsa->n != nullptr)
|
|
os << ", " << BN_num_bits (pkey->pkey.rsa->n) << " bit RSA";
|
|
#ifndef OPENSSL_NO_DSA
|
|
else if (pkey->type == EVP_PKEY_DSA && pkey->pkey.dsa != nullptr && pkey->pkey.dsa->p != nullptr)
|
|
os << ", " << BN_num_bits (pkey->pkey.dsa->p) << " bit DSA";
|
|
#endif
|
|
EVP_PKEY_free (pkey);
|
|
}
|
|
X509_free (cert);
|
|
}
|
|
return os.str();
|
|
}
|
|
|
|
void ssl_clear()
|
|
{
|
|
ssl_bio_linkage = false;
|
|
ssl = nullptr;
|
|
ssl_bio = nullptr;
|
|
ct_in = nullptr;
|
|
ct_out = nullptr;
|
|
overflow = false;
|
|
}
|
|
|
|
void ssl_erase()
|
|
{
|
|
if (!ssl_bio_linkage)
|
|
{
|
|
if (ct_in)
|
|
BIO_free(ct_in);
|
|
if (ct_out)
|
|
BIO_free(ct_out);
|
|
}
|
|
if (ssl_bio)
|
|
BIO_free_all(ssl_bio);
|
|
if (ssl)
|
|
SSL_free(ssl);
|
|
openssl_clear_error_stack();
|
|
ssl_clear();
|
|
}
|
|
|
|
static BIO* mem_bio(const Frame::Ptr& frame)
|
|
{
|
|
BIO *bio = BIO_new(bmq_stream::BIO_s_memq());
|
|
if (!bio)
|
|
throw OpenSSLException("OpenSSLContext::SSL: BIO_new failed on bmq_stream");
|
|
bmq_stream::memq_from_bio(bio)->set_frame(frame);
|
|
return bio;
|
|
}
|
|
|
|
/*
|
|
* Return modified OpenSSL SSLv23 methods,
|
|
* as configured in init_static().
|
|
*/
|
|
|
|
static const SSL_METHOD* ssl23_method_client()
|
|
{
|
|
return &ssl23_method_client_;
|
|
}
|
|
|
|
static const SSL_METHOD* ssl23_method_server()
|
|
{
|
|
return &ssl23_method_server_;
|
|
}
|
|
|
|
::SSL *ssl; // OpenSSL SSL object
|
|
BIO *ssl_bio; // read/write cleartext from here
|
|
BIO *ct_in; // write ciphertext to here
|
|
BIO *ct_out; // read ciphertext from here
|
|
AuthCert::Ptr authcert;
|
|
bool ssl_bio_linkage;
|
|
bool overflow;
|
|
|
|
// Helps us to store pointer to self in ::SSL object
|
|
static int mydata_index;
|
|
|
|
// Modified SSLv23 methods
|
|
static SSL_METHOD ssl23_method_client_;
|
|
static SSL_METHOD ssl23_method_server_;
|
|
};
|
|
|
|
private:
|
|
class ExternalPKIImpl {
|
|
public:
|
|
ExternalPKIImpl(SSL_CTX* ssl_ctx, ::X509* cert, ExternalPKIBase* external_pki_arg)
|
|
: external_pki(external_pki_arg), n_errors(0)
|
|
{
|
|
RSA *rsa = nullptr;
|
|
RSA_METHOD *rsa_meth = nullptr;
|
|
RSA *pub_rsa = nullptr;
|
|
const char *errtext = "";
|
|
|
|
/* allocate custom RSA method object */
|
|
rsa_meth = new RSA_METHOD;
|
|
std::memset(rsa_meth, 0, sizeof(RSA_METHOD));
|
|
rsa_meth->name = "OpenSSLContext::ExternalPKIImpl private key RSA Method";
|
|
rsa_meth->rsa_pub_enc = rsa_pub_enc;
|
|
rsa_meth->rsa_pub_dec = rsa_pub_dec;
|
|
rsa_meth->rsa_priv_enc = rsa_priv_enc;
|
|
rsa_meth->rsa_priv_dec = rsa_priv_dec;
|
|
rsa_meth->init = nullptr;
|
|
rsa_meth->finish = rsa_finish;
|
|
rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK;
|
|
rsa_meth->app_data = (char *)this;
|
|
|
|
/* allocate RSA object */
|
|
rsa = RSA_new();
|
|
if (rsa == nullptr)
|
|
{
|
|
SSLerr(SSL_F_SSL_USE_PRIVATEKEY, ERR_R_MALLOC_FAILURE);
|
|
errtext = "RSA_new";
|
|
goto err;
|
|
}
|
|
|
|
/* get the public key */
|
|
if (cert->cert_info->key->pkey == nullptr) /* nullptr before SSL_CTX_use_certificate() is called */
|
|
{
|
|
errtext = "pkey is NULL";
|
|
goto err;
|
|
}
|
|
pub_rsa = cert->cert_info->key->pkey->pkey.rsa;
|
|
|
|
/* initialize RSA object */
|
|
rsa->n = BN_dup(pub_rsa->n);
|
|
rsa->flags |= RSA_FLAG_EXT_PKEY;
|
|
if (!RSA_set_method(rsa, rsa_meth))
|
|
{
|
|
errtext = "RSA_set_method";
|
|
goto err;
|
|
}
|
|
|
|
/* bind our custom RSA object to ssl_ctx */
|
|
if (!SSL_CTX_use_RSAPrivateKey(ssl_ctx, rsa))
|
|
{
|
|
errtext = "SSL_CTX_use_RSAPrivateKey";
|
|
goto err;
|
|
}
|
|
|
|
RSA_free(rsa); /* doesn't necessarily free, just decrements refcount */
|
|
return;
|
|
|
|
err:
|
|
if (rsa)
|
|
RSA_free(rsa);
|
|
else
|
|
{
|
|
if (rsa_meth)
|
|
free(rsa_meth);
|
|
}
|
|
OPENVPN_THROW(OpenSSLException, "OpenSSLContext::ExternalPKIImpl: " << errtext);
|
|
}
|
|
|
|
unsigned int get_n_errors() const { return n_errors; }
|
|
|
|
private:
|
|
OPENVPN_EXCEPTION(openssl_external_pki);
|
|
|
|
/* called at RSA_free */
|
|
static int rsa_finish(RSA *rsa)
|
|
{
|
|
free ((void*)rsa->meth);
|
|
rsa->meth = nullptr;
|
|
return 1;
|
|
}
|
|
|
|
/* sign arbitrary data */
|
|
static int rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding)
|
|
{
|
|
ExternalPKIImpl* self = (ExternalPKIImpl*)rsa->meth->app_data;
|
|
|
|
try {
|
|
if (padding != RSA_PKCS1_PADDING)
|
|
{
|
|
RSAerr (RSA_F_RSA_EAY_PRIVATE_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE);
|
|
throw ssl_external_pki("OpenSSL: bad padding size");
|
|
}
|
|
|
|
/* convert 'from' to base64 */
|
|
ConstBuffer from_buf(from, flen, true);
|
|
const std::string from_b64 = base64->encode(from_buf);
|
|
|
|
/* get signature */
|
|
std::string sig_b64;
|
|
const bool status = self->external_pki->sign(from_b64, sig_b64);
|
|
if (!status)
|
|
throw ssl_external_pki("OpenSSL: could not obtain signature");
|
|
|
|
/* decode base64 signature to binary */
|
|
const int len = RSA_size(rsa);
|
|
Buffer sig(to, len, false);
|
|
base64->decode(sig, sig_b64);
|
|
|
|
/* verify length */
|
|
if (sig.size() != len)
|
|
throw ssl_external_pki("OpenSSL: incorrect signature length");
|
|
|
|
/* return length of signature */
|
|
return len;
|
|
}
|
|
catch (const std::exception& e)
|
|
{
|
|
OPENVPN_LOG("OpenSSLContext::ExternalPKIImpl::rsa_priv_enc exception: " << e.what());
|
|
++self->n_errors;
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
static void not_implemented(RSA *rsa)
|
|
{
|
|
ExternalPKIImpl* self = (ExternalPKIImpl*)rsa->meth->app_data;
|
|
++self->n_errors;
|
|
}
|
|
|
|
/* encrypt */
|
|
static int rsa_pub_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding)
|
|
{
|
|
not_implemented(rsa);
|
|
return -1;
|
|
}
|
|
|
|
/* verify arbitrary data */
|
|
static int
|
|
rsa_pub_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding)
|
|
{
|
|
not_implemented(rsa);
|
|
return -1;
|
|
}
|
|
|
|
/* decrypt */
|
|
static int
|
|
rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding)
|
|
{
|
|
not_implemented(rsa);
|
|
return -1;
|
|
}
|
|
|
|
ExternalPKIBase* external_pki;
|
|
unsigned int n_errors;
|
|
};
|
|
|
|
/////// start of main class implementation
|
|
|
|
OpenSSLContext(Config* config_arg)
|
|
: config(config_arg),
|
|
ctx(nullptr),
|
|
epki(nullptr)
|
|
{
|
|
try
|
|
{
|
|
// Create new SSL_CTX for server or client mode
|
|
const bool ssl23 = (config->force_aes_cbc_ciphersuites || (config->tls_version_min > TLSVersion::UNDEF));
|
|
if (config->mode.is_server())
|
|
{
|
|
ctx = SSL_CTX_new(ssl23 ? SSL::ssl23_method_server() : TLSv1_server_method());
|
|
if (ctx == nullptr)
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_new failed for server method");
|
|
|
|
// Set DH object
|
|
if (!config->dh.defined())
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: DH not defined");
|
|
if (!SSL_CTX_set_tmp_dh(ctx, config->dh.obj()))
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_set_tmp_dh failed");
|
|
if (config->enable_renegotiation)
|
|
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_SERVER);
|
|
if (config->flags & SSLConst::SERVER_TO_SERVER)
|
|
SSL_CTX_set_purpose(ctx, X509_PURPOSE_SSL_SERVER);
|
|
}
|
|
else if (config->mode.is_client())
|
|
{
|
|
ctx = SSL_CTX_new(ssl23 ? SSL::ssl23_method_client() : TLSv1_client_method());
|
|
if (ctx == nullptr)
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_new failed for client method");
|
|
if (config->enable_renegotiation)
|
|
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT); // note: SSL_set_session must be called as well
|
|
}
|
|
else
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: unknown config->mode");
|
|
|
|
// Set SSL options
|
|
if (!config->enable_renegotiation)
|
|
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
|
|
if (!(config->flags & SSLConst::NO_VERIFY_PEER))
|
|
{
|
|
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
|
|
config->mode.is_client() ? verify_callback_client : verify_callback_server);
|
|
SSL_CTX_set_verify_depth(ctx, 16);
|
|
}
|
|
long sslopt = SSL_OP_SINGLE_DH_USE | SSL_OP_SINGLE_ECDH_USE | SSL_OP_NO_COMPRESSION;
|
|
if (!config->enable_renegotiation)
|
|
sslopt |= SSL_OP_NO_TICKET;
|
|
if (ssl23)
|
|
{
|
|
sslopt |= SSL_OP_NO_SSLv2;
|
|
if (!config->force_aes_cbc_ciphersuites || config->tls_version_min > TLSVersion::UNDEF)
|
|
{
|
|
sslopt |= SSL_OP_NO_SSLv3;
|
|
if (config->tls_version_min > TLSVersion::V1_0)
|
|
sslopt |= SSL_OP_NO_TLSv1;
|
|
# ifdef SSL_OP_NO_TLSv1_1
|
|
if (config->tls_version_min > TLSVersion::V1_1)
|
|
sslopt |= SSL_OP_NO_TLSv1_1;
|
|
# endif
|
|
# ifdef SSL_OP_NO_TLSv1_2
|
|
if (config->tls_version_min > TLSVersion::V1_2)
|
|
sslopt |= SSL_OP_NO_TLSv1_2;
|
|
# endif
|
|
}
|
|
}
|
|
SSL_CTX_set_options(ctx, sslopt);
|
|
|
|
if (config->force_aes_cbc_ciphersuites)
|
|
{
|
|
if (!SSL_CTX_set_cipher_list(ctx, "DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA"))
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: SSL_CTX_set_cipher_list failed for force_aes_cbc_ciphersuites");
|
|
}
|
|
else
|
|
{
|
|
if (!SSL_CTX_set_cipher_list(ctx, "DEFAULT:!EXP:!PSK:!SRP:!LOW:!RC4:!kRSA:!MD5:!SSLv2"))
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: SSL_CTX_set_cipher_list failed");
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
|
|
SSL_CTX_set_ecdh_auto(ctx, 1);
|
|
#endif
|
|
}
|
|
|
|
// tls-cert-profile is not implemented yet in OpenSSL (fixme),
|
|
// so throw exception if the setting is anything other than LEGACY.
|
|
if (TLSCertProfile::default_if_undef(config->tls_cert_profile) != TLSCertProfile::LEGACY)
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: tls-cert-profile not implemented yet");
|
|
|
|
if (config->local_cert_enabled)
|
|
{
|
|
// Set certificate
|
|
if (!config->cert.defined())
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: cert not defined");
|
|
if (SSL_CTX_use_certificate(ctx, config->cert.obj()) != 1)
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_use_certificate failed");
|
|
|
|
// Set private key
|
|
if (config->external_pki)
|
|
{
|
|
epki = new ExternalPKIImpl(ctx, config->cert.obj(), config->external_pki);
|
|
}
|
|
else
|
|
{
|
|
if (!config->pkey.defined())
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: private key not defined");
|
|
if (SSL_CTX_use_PrivateKey(ctx, config->pkey.obj()) != 1)
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_use_PrivateKey failed");
|
|
|
|
// Check cert/private key compatibility
|
|
if (!SSL_CTX_check_private_key(ctx))
|
|
throw OpenSSLException("OpenSSLContext: private key does not match the certificate");
|
|
}
|
|
|
|
// Set extra certificates that are part of our own certificate
|
|
// chain but shouldn't be included in the verify chain.
|
|
if (config->extra_certs.defined())
|
|
{
|
|
for (OpenSSLPKI::X509List::const_iterator i = config->extra_certs.begin(); i != config->extra_certs.end(); ++i)
|
|
{
|
|
if (SSL_CTX_add_extra_chain_cert(ctx, (*i)->obj_dup()) != 1)
|
|
throw OpenSSLException("OpenSSLContext: SSL_CTX_add_extra_chain_cert failed");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Set CAs/CRLs
|
|
if (config->ca.certs.defined())
|
|
update_trust(config->ca);
|
|
else if (!(config->flags & SSLConst::NO_VERIFY_PEER))
|
|
OPENVPN_THROW(ssl_context_error, "OpenSSLContext: CA not defined");
|
|
|
|
// keep a reference to this in ctx, for use by verify callback
|
|
ctx->app_verify_arg = this;
|
|
|
|
// Show handshake debugging info
|
|
if (config->ssl_debug_level)
|
|
SSL_CTX_set_info_callback (ctx, info_callback);
|
|
}
|
|
catch (...)
|
|
{
|
|
erase();
|
|
throw;
|
|
}
|
|
}
|
|
|
|
public:
|
|
// create a new SSL instance
|
|
virtual SSLAPI::Ptr ssl()
|
|
{
|
|
return SSL::Ptr(new SSL(*this, nullptr));
|
|
}
|
|
|
|
// like ssl() above but verify hostname against cert CommonName and/or SubjectAltName
|
|
virtual SSLAPI::Ptr ssl(const std::string& hostname)
|
|
{
|
|
return SSL::Ptr(new SSL(*this, hostname.c_str()));
|
|
}
|
|
|
|
void update_trust(const CertCRLList& cc)
|
|
{
|
|
OpenSSLPKI::X509Store store(cc);
|
|
SSL_CTX_set_cert_store(ctx, store.move());
|
|
}
|
|
|
|
~OpenSSLContext()
|
|
{
|
|
erase();
|
|
}
|
|
|
|
virtual const Mode& mode() const
|
|
{
|
|
return config->mode;
|
|
}
|
|
|
|
private:
|
|
// ns-cert-type verification
|
|
|
|
bool ns_cert_type_defined() const
|
|
{
|
|
return config->ns_cert_type != NSCert::NONE;
|
|
}
|
|
|
|
bool verify_ns_cert_type(const ::X509* cert) const
|
|
{
|
|
if (config->ns_cert_type == NSCert::SERVER)
|
|
return (cert->ex_flags & EXFLAG_NSCERT) && (cert->ex_nscert & NS_SSL_SERVER);
|
|
else if (config->ns_cert_type == NSCert::CLIENT)
|
|
return (cert->ex_flags & EXFLAG_NSCERT) && (cert->ex_nscert & NS_SSL_CLIENT);
|
|
else
|
|
return true;
|
|
}
|
|
|
|
// remote-cert-ku verification
|
|
|
|
bool x509_cert_ku_defined() const
|
|
{
|
|
return config->ku.size() > 0;
|
|
}
|
|
|
|
bool verify_x509_cert_ku(::X509 *cert) const
|
|
{
|
|
bool found = false;
|
|
ASN1_BIT_STRING *ku = (ASN1_BIT_STRING *)X509_get_ext_d2i(cert, NID_key_usage, nullptr, nullptr);
|
|
|
|
if (ku)
|
|
{
|
|
// Extract key usage bits
|
|
unsigned int nku = 0;
|
|
{
|
|
for (int i = 0; i < 8; i++)
|
|
{
|
|
if (ASN1_BIT_STRING_get_bit(ku, i))
|
|
nku |= 1 << (7 - i);
|
|
}
|
|
}
|
|
|
|
// Fixup if no LSB bits
|
|
if ((nku & 0xff) == 0)
|
|
nku >>= 8;
|
|
|
|
// Validating certificate key usage
|
|
{
|
|
for (std::vector<unsigned int>::const_iterator i = config->ku.begin(); i != config->ku.end(); ++i)
|
|
{
|
|
if (nku == *i)
|
|
{
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
ASN1_BIT_STRING_free(ku);
|
|
}
|
|
return found;
|
|
}
|
|
|
|
// remote-cert-eku verification
|
|
|
|
bool x509_cert_eku_defined() const
|
|
{
|
|
return !config->eku.empty();
|
|
}
|
|
|
|
bool verify_x509_cert_eku(::X509 *cert) const
|
|
{
|
|
bool found = false;
|
|
EXTENDED_KEY_USAGE *eku = (EXTENDED_KEY_USAGE *)X509_get_ext_d2i(cert, NID_ext_key_usage, nullptr, nullptr);
|
|
|
|
if (eku)
|
|
{
|
|
// Validating certificate extended key usage
|
|
for (int i = 0; !found && i < sk_ASN1_OBJECT_num(eku); i++)
|
|
{
|
|
ASN1_OBJECT *oid = sk_ASN1_OBJECT_value(eku, i);
|
|
char oid_str[256];
|
|
|
|
if (!found && OBJ_obj2txt(oid_str, sizeof(oid_str), oid, 0) != -1)
|
|
{
|
|
// Compare EKU against string
|
|
if (config->eku == oid_str)
|
|
found = true;
|
|
}
|
|
|
|
if (!found && OBJ_obj2txt(oid_str, sizeof(oid_str), oid, 1) != -1)
|
|
{
|
|
// Compare EKU against OID
|
|
if (config->eku == oid_str)
|
|
found = true;
|
|
}
|
|
}
|
|
|
|
sk_ASN1_OBJECT_pop_free(eku, ASN1_OBJECT_free);
|
|
}
|
|
return found;
|
|
}
|
|
|
|
|
|
static std::string x509_get_subject(::X509 *cert)
|
|
{
|
|
unique_ptr_del<char> subject(X509_NAME_oneline(X509_get_subject_name(cert), nullptr, 0),
|
|
[](char* p) { OPENSSL_free(p); });
|
|
if (subject)
|
|
return std::string(subject.get());
|
|
else
|
|
return std::string("");
|
|
}
|
|
|
|
static std::string x509_get_field(::X509 *cert, const int nid)
|
|
{
|
|
static const char nullc = '\0';
|
|
std::string ret;
|
|
X509_NAME *x509_name = X509_get_subject_name(cert);
|
|
int i = X509_NAME_get_index_by_NID(x509_name, nid, -1);
|
|
if (i >= 0)
|
|
{
|
|
X509_NAME_ENTRY *ent = X509_NAME_get_entry(x509_name, i);
|
|
if (ent)
|
|
{
|
|
ASN1_STRING *val = X509_NAME_ENTRY_get_data(ent);
|
|
unsigned char *buf;
|
|
buf = (unsigned char *)1; // bug in OpenSSL 0.9.6b ASN1_STRING_to_UTF8 requires this workaround
|
|
const int len = ASN1_STRING_to_UTF8(&buf, val);
|
|
if (len > 0)
|
|
{
|
|
if (std::strlen((char *)buf) == len)
|
|
ret = (char *)buf;
|
|
OPENSSL_free(buf);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
i = X509_get_ext_by_NID(cert, nid, -1);
|
|
if (i >= 0)
|
|
{
|
|
X509_EXTENSION *ext = X509_get_ext(cert, i);
|
|
if (ext)
|
|
{
|
|
BIO *bio = BIO_new(BIO_s_mem());
|
|
if (bio)
|
|
{
|
|
if (X509V3_EXT_print(bio, ext, 0, 0))
|
|
{
|
|
if (BIO_write(bio, &nullc, 1) == 1)
|
|
{
|
|
char *str;
|
|
const long len = BIO_get_mem_data(bio, &str);
|
|
if (std::strlen(str) == len)
|
|
ret = str;
|
|
}
|
|
}
|
|
BIO_free(bio);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static std::string x509_get_serial(::X509 *cert)
|
|
{
|
|
ASN1_INTEGER *asn1_i;
|
|
BIGNUM *bignum;
|
|
char *openssl_serial;
|
|
|
|
asn1_i = X509_get_serialNumber(cert);
|
|
bignum = ASN1_INTEGER_to_BN(asn1_i, NULL);
|
|
openssl_serial = BN_bn2dec(bignum);
|
|
|
|
const std::string ret = openssl_serial;
|
|
|
|
BN_free(bignum);
|
|
OPENSSL_free(openssl_serial);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static std::string x509_get_serial_hex(::X509 *cert)
|
|
{
|
|
const ASN1_INTEGER *asn1_i = X509_get_serialNumber(cert);
|
|
return render_hex_sep(asn1_i->data, asn1_i->length, ':', false);
|
|
}
|
|
|
|
static void x509_track_extract_nid(const X509Track::Type xt_type,
|
|
const int nid,
|
|
::X509 *cert,
|
|
const int depth,
|
|
X509Track::Set& xts)
|
|
{
|
|
const std::string value = x509_get_field(cert, nid);
|
|
if (!value.empty())
|
|
xts.emplace_back(xt_type, depth, x509_get_field(cert, nid));
|
|
}
|
|
|
|
static void x509_track_extract_from_cert(::X509 *cert,
|
|
const int depth,
|
|
const X509Track::ConfigSet& cs,
|
|
X509Track::Set& xts)
|
|
{
|
|
for (auto &c : cs)
|
|
{
|
|
if (c.depth_match(depth))
|
|
{
|
|
switch (c.type)
|
|
{
|
|
case X509Track::SERIAL:
|
|
xts.emplace_back(X509Track::SERIAL,
|
|
depth,
|
|
x509_get_serial(cert));
|
|
break;
|
|
case X509Track::SERIAL_HEX:
|
|
xts.emplace_back(X509Track::SERIAL_HEX,
|
|
depth,
|
|
x509_get_serial_hex(cert));
|
|
break;
|
|
case X509Track::SHA1:
|
|
xts.emplace_back(X509Track::SHA1,
|
|
depth,
|
|
render_hex_sep(cert->sha1_hash, SHA_DIGEST_LENGTH, ':', true));
|
|
break;
|
|
case X509Track::CN:
|
|
x509_track_extract_nid(X509Track::CN, NID_commonName, cert, depth, xts);
|
|
break;
|
|
case X509Track::C:
|
|
x509_track_extract_nid(X509Track::C, NID_countryName, cert, depth, xts);
|
|
break;
|
|
case X509Track::L:
|
|
x509_track_extract_nid(X509Track::L, NID_localityName, cert, depth, xts);
|
|
break;
|
|
case X509Track::ST:
|
|
x509_track_extract_nid(X509Track::ST, NID_stateOrProvinceName, cert, depth, xts);
|
|
break;
|
|
case X509Track::O:
|
|
x509_track_extract_nid(X509Track::O, NID_organizationName, cert, depth, xts);
|
|
break;
|
|
case X509Track::OU:
|
|
x509_track_extract_nid(X509Track::OU, NID_organizationalUnitName, cert, depth, xts);
|
|
break;
|
|
case X509Track::EMAIL:
|
|
x509_track_extract_nid(X509Track::EMAIL, NID_pkcs9_emailAddress, cert, depth, xts);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static std::string cert_status_line(int preverify_ok,
|
|
int depth,
|
|
int err,
|
|
const std::string& subject)
|
|
{
|
|
std::string ret;
|
|
ret.reserve(128);
|
|
ret = "VERIFY";
|
|
if (preverify_ok)
|
|
ret += " OK";
|
|
else
|
|
ret += " FAIL";
|
|
ret += ": depth=";
|
|
ret += openvpn::to_string(depth);
|
|
ret += ", ";
|
|
if (!subject.empty())
|
|
ret += subject;
|
|
else
|
|
ret += "NO_SUBJECT";
|
|
if (!preverify_ok)
|
|
{
|
|
ret += " [";
|
|
ret += X509_verify_cert_error_string(err);
|
|
ret += ']';
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static AuthCert::Fail::Type cert_fail_code(const int openssl_err)
|
|
{
|
|
// NOTE: this method should never return OK
|
|
switch (openssl_err)
|
|
{
|
|
case X509_V_ERR_CERT_HAS_EXPIRED:
|
|
return AuthCert::Fail::EXPIRED;
|
|
default:
|
|
return AuthCert::Fail::OTHER;
|
|
}
|
|
}
|
|
|
|
static int verify_callback_client(int preverify_ok, X509_STORE_CTX *ctx)
|
|
{
|
|
// get the OpenSSL SSL object
|
|
::SSL* ssl = (::SSL*) X509_STORE_CTX_get_ex_data (ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
|
|
|
|
// get OpenSSLContext
|
|
const OpenSSLContext* self = (OpenSSLContext*) ssl->ctx->app_verify_arg;
|
|
|
|
// get depth
|
|
const int depth = X509_STORE_CTX_get_error_depth(ctx);
|
|
|
|
// log subject
|
|
const std::string subject = x509_get_subject(ctx->current_cert);
|
|
if (self->config->flags & SSLConst::LOG_VERIFY_STATUS)
|
|
OPENVPN_LOG_SSL(cert_status_line(preverify_ok, depth, X509_STORE_CTX_get_error(ctx), subject));
|
|
|
|
// leaf-cert verification
|
|
if (depth == 0)
|
|
{
|
|
// verify ns-cert-type
|
|
if (self->ns_cert_type_defined() && !self->verify_ns_cert_type(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad ns-cert-type in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
// verify X509 key usage
|
|
if (self->x509_cert_ku_defined() && !self->verify_x509_cert_ku(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad X509 key usage in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
// verify X509 extended key usage
|
|
if (self->x509_cert_eku_defined() && !self->verify_x509_cert_eku(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad X509 extended key usage in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
// verify tls-remote
|
|
if (!self->config->tls_remote.empty())
|
|
{
|
|
const std::string subj = TLSRemote::sanitize_x509_name(subject);
|
|
const std::string common_name = TLSRemote::sanitize_common_name(x509_get_field(ctx->current_cert, NID_commonName));
|
|
TLSRemote::log(self->config->tls_remote, subj, common_name);
|
|
if (!TLSRemote::test(self->config->tls_remote, subj, common_name))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- tls-remote match failed");
|
|
preverify_ok = false;
|
|
}
|
|
}
|
|
}
|
|
|
|
return preverify_ok;
|
|
}
|
|
|
|
static int verify_callback_server(int preverify_ok, X509_STORE_CTX *ctx)
|
|
{
|
|
// get the OpenSSL SSL object
|
|
::SSL* ssl = (::SSL*) X509_STORE_CTX_get_ex_data (ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
|
|
|
|
// get OpenSSLContext
|
|
const OpenSSLContext* self = (OpenSSLContext*) ssl->ctx->app_verify_arg;
|
|
|
|
// get OpenSSLContext::SSL
|
|
SSL* self_ssl = (SSL *) SSL_get_ex_data (ssl, SSL::mydata_index);
|
|
|
|
// get error code
|
|
const int err = X509_STORE_CTX_get_error(ctx);
|
|
|
|
// get depth
|
|
const int depth = X509_STORE_CTX_get_error_depth(ctx);
|
|
|
|
// log subject
|
|
if (self->config->flags & SSLConst::LOG_VERIFY_STATUS)
|
|
OPENVPN_LOG_SSL(cert_status_line(preverify_ok, depth, err, x509_get_subject(ctx->current_cert)));
|
|
|
|
// record cert error in authcert
|
|
if (!preverify_ok && self_ssl->authcert)
|
|
self_ssl->authcert->add_fail(depth, cert_fail_code(err), X509_verify_cert_error_string(err));
|
|
|
|
if (depth == 1) // issuer cert
|
|
{
|
|
// save the issuer cert fingerprint
|
|
if (self_ssl->authcert)
|
|
{
|
|
static_assert(sizeof(AuthCert::issuer_fp) == SHA_DIGEST_LENGTH, "size inconsistency");
|
|
std::memcpy(self_ssl->authcert->issuer_fp, ctx->current_cert->sha1_hash, sizeof(AuthCert::issuer_fp));
|
|
}
|
|
}
|
|
else if (depth == 0) // leaf cert
|
|
{
|
|
// verify ns-cert-type
|
|
if (self->ns_cert_type_defined() && !self->verify_ns_cert_type(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad ns-cert-type in leaf certificate");
|
|
if (self_ssl->authcert)
|
|
self_ssl->authcert->add_fail(depth, AuthCert::Fail::BAD_CERT_TYPE, "bad ns-cert-type in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
// verify X509 key usage
|
|
if (self->x509_cert_ku_defined() && !self->verify_x509_cert_ku(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad X509 key usage in leaf certificate");
|
|
if (self_ssl->authcert)
|
|
self_ssl->authcert->add_fail(depth, AuthCert::Fail::BAD_CERT_TYPE, "bad X509 key usage in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
// verify X509 extended key usage
|
|
if (self->x509_cert_eku_defined() && !self->verify_x509_cert_eku(ctx->current_cert))
|
|
{
|
|
OPENVPN_LOG_SSL("VERIFY FAIL -- bad X509 extended key usage in leaf certificate");
|
|
if (self_ssl->authcert)
|
|
self_ssl->authcert->add_fail(depth, AuthCert::Fail::BAD_CERT_TYPE, "bad X509 extended key usage in leaf certificate");
|
|
preverify_ok = false;
|
|
}
|
|
|
|
if (self_ssl->authcert)
|
|
{
|
|
// save the Common Name
|
|
self_ssl->authcert->cn = x509_get_field(ctx->current_cert, NID_commonName);
|
|
|
|
// save the leaf cert serial number
|
|
const ASN1_INTEGER *ai = X509_get_serialNumber(ctx->current_cert);
|
|
self_ssl->authcert->sn = ai ? ASN1_INTEGER_get(ai) : -1;
|
|
}
|
|
}
|
|
|
|
// x509-track enabled?
|
|
if (self_ssl->authcert && self_ssl->authcert->x509_track)
|
|
x509_track_extract_from_cert(ctx->current_cert,
|
|
depth,
|
|
self->config->x509_track_config,
|
|
*self_ssl->authcert->x509_track);
|
|
|
|
return preverify_ok || ((self->config->flags & SSLConst::DEFERRED_CERT_VERIFY)
|
|
&& self_ssl->authcert // failsafe: don't defer error unless
|
|
&& self_ssl->authcert->is_fail()); // authcert has recorded it
|
|
}
|
|
|
|
// Print debugging information on SSL/TLS session negotiation.
|
|
static void info_callback (const ::SSL *s, int where, int ret)
|
|
{
|
|
if (where & SSL_CB_LOOP)
|
|
{
|
|
OPENVPN_LOG_SSL("SSL state (" << (where & SSL_ST_CONNECT ? "connect" : where & SSL_ST_ACCEPT ? "accept" : "undefined") << "): " << SSL_state_string_long(s));
|
|
}
|
|
else if (where & SSL_CB_ALERT)
|
|
{
|
|
OPENVPN_LOG_SSL("SSL alert (" << (where & SSL_CB_READ ? "read" : "write") << "): " << SSL_alert_type_string_long(ret) << ": " << SSL_alert_desc_string_long(ret));
|
|
}
|
|
}
|
|
|
|
void erase()
|
|
{
|
|
if (epki)
|
|
{
|
|
delete epki;
|
|
epki = nullptr;
|
|
}
|
|
if (ctx)
|
|
{
|
|
SSL_CTX_free(ctx);
|
|
ctx = nullptr;
|
|
}
|
|
}
|
|
|
|
Config::Ptr config;
|
|
SSL_CTX* ctx;
|
|
ExternalPKIImpl* epki;
|
|
};
|
|
|
|
int OpenSSLContext::SSL::mydata_index = -1;
|
|
|
|
SSL_METHOD OpenSSLContext::SSL::ssl23_method_client_;
|
|
SSL_METHOD OpenSSLContext::SSL::ssl23_method_server_;
|
|
}
|
|
|
|
#endif
|