mirror of
https://repo.or.cz/socat.git
synced 2024-12-22 15:32:35 +00:00
2052 lines
66 KiB
C
2052 lines
66 KiB
C
/* source: xio-openssl.c */
|
|
/* Copyright Gerhard Rieger and contributors (see file CHANGES) */
|
|
/* Published under the GNU General Public License V.2, see file COPYING */
|
|
|
|
/* this file contains the implementation of the openssl addresses */
|
|
|
|
#include "xiosysincludes.h"
|
|
#if WITH_OPENSSL /* make this address configure dependend */
|
|
#include <openssl/conf.h>
|
|
#include <openssl/x509v3.h>
|
|
|
|
#include "xioopen.h"
|
|
|
|
#include "xio-fd.h"
|
|
#include "xio-socket.h" /* _xioopen_connect() */
|
|
#include "xio-listen.h"
|
|
#include "xio-udp.h"
|
|
#include "xio-ipapp.h"
|
|
#include "xio-ip6.h"
|
|
|
|
#include "xio-openssl.h"
|
|
|
|
/* the openssl library requires a file descriptor for external communications.
|
|
so our best effort is to provide any possible kind of un*x file descriptor
|
|
(not only tcp, but also pipes, stdin, files...)
|
|
for tcp we want to provide support for socks and proxy.
|
|
read and write functions must use the openssl crypt versions.
|
|
but currently only plain tcp4 is implemented.
|
|
*/
|
|
|
|
/* Linux: "man 3 ssl" */
|
|
|
|
/* generate a simple openssl server for testing:
|
|
1) generate a private key
|
|
openssl genrsa -out server.key 1024
|
|
2) generate a self signed cert
|
|
openssl req -new -key server.key -x509 -days 3653 -out server.crt
|
|
enter fields...
|
|
3) generate the pem file
|
|
cat server.key server.crt >server.pem
|
|
openssl s_server (listens on 4433/tcp)
|
|
*/
|
|
|
|
/* static declaration of ssl's open function */
|
|
static int xioopen_openssl_connect(int argc, const char *argv[], struct opt *opts,
|
|
int xioflags, xiofile_t *fd, groups_t groups,
|
|
int dummy1, int dummy2, int dummy3);
|
|
|
|
/* static declaration of ssl's open function */
|
|
static int xioopen_openssl_listen(int argc, const char *argv[], struct opt *opts,
|
|
int xioflags, xiofile_t *fd, groups_t groups,
|
|
int dummy1, int dummy2, int dummy3);
|
|
static int openssl_SSL_ERROR_SSL(int level, const char *funcname);
|
|
static int openssl_handle_peer_certificate(struct single *xfd,
|
|
const char *peername,
|
|
bool opt_ver,
|
|
int level);
|
|
static int xioSSL_set_fd(struct single *xfd, int level);
|
|
static int xioSSL_connect(struct single *xfd, const char *opt_commonname, bool opt_ver, int level);
|
|
static int openssl_delete_cert_info(void);
|
|
|
|
|
|
/* description record for ssl connect */
|
|
const struct addrdesc xioaddr_openssl = {
|
|
"OPENSSL", /* keyword for selecting this address type in xioopen calls
|
|
(canonical or main name) */
|
|
3, /* data flow directions this address supports on API layer:
|
|
1..read, 2..write, 3..both */
|
|
xioopen_openssl_connect, /* a function pointer used to "open" these addresses.*/
|
|
GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_IP_TCP|GROUP_CHILD|GROUP_OPENSSL|GROUP_RETRY, /* bitwise OR of address groups this address belongs to.
|
|
You might have to specify a new group in xioopts.h */
|
|
0, /* an integer passed to xioopen_openssl; makes it possible to
|
|
use the xioopen_openssl_connect function for slightly different
|
|
address types. */
|
|
0, /* like previous argument */
|
|
0 /* like previous arguments, but pointer type.
|
|
No trailing comma or semicolon! */
|
|
HELP(":<host>:<port>") /* a text displayed from xio help function.
|
|
No trailing comma or semicolon!
|
|
only generates this text if WITH_HELP is != 0 */
|
|
} ;
|
|
|
|
#if WITH_LISTEN
|
|
/* description record for ssl listen */
|
|
const struct addrdesc xioaddr_openssl_listen = {
|
|
"OPENSSL-LISTEN", /* keyword for selecting this address type in xioopen calls
|
|
(canonical or main name) */
|
|
3, /* data flow directions this address supports on API layer:
|
|
1..read, 2..write, 3..both */
|
|
xioopen_openssl_listen, /* a function pointer used to "open" these addresses.*/
|
|
GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_IP_TCP|GROUP_LISTEN|GROUP_CHILD|GROUP_RANGE|GROUP_OPENSSL|GROUP_RETRY, /* bitwise OR of address groups this address belongs to.
|
|
You might have to specify a new group in xioopts.h */
|
|
0, /* an integer passed to xioopen_openssl_listen; makes it possible to
|
|
use the xioopen_openssl_listen function for slightly different
|
|
address types. */
|
|
0, /* like previous argument */
|
|
0 /* like previous arguments, but pointer type.
|
|
No trailing comma or semicolon! */
|
|
HELP(":<port>") /* a text displayed from xio help function.
|
|
No trailing comma or semicolon!
|
|
only generates this text if WITH_HELP is != 0 */
|
|
} ;
|
|
#endif /* WITH_LISTEN */
|
|
|
|
const struct addrdesc xioaddr_openssl_dtls_client = { "OPENSSL-DTLS-CLIENT", 3, xioopen_openssl_connect, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_IP_UDP|GROUP_CHILD|GROUP_OPENSSL|GROUP_RETRY, 1, 0, 0 HELP(":<host>:<port>") } ;
|
|
#if WITH_LISTEN
|
|
const struct addrdesc xioaddr_openssl_dtls_server = { "OPENSSL-DTLS-SERVER", 3, xioopen_openssl_listen, GROUP_FD|GROUP_SOCKET|GROUP_SOCK_IP4|GROUP_SOCK_IP6|GROUP_IP_UDP|GROUP_LISTEN|GROUP_CHILD|GROUP_RANGE|GROUP_OPENSSL|GROUP_RETRY, 1, 0, 0 HELP(":<port>") } ;
|
|
#endif
|
|
|
|
/* both client and server */
|
|
const struct optdesc opt_openssl_cipherlist = { "openssl-cipherlist", "ciphers", OPT_OPENSSL_CIPHERLIST, GROUP_OPENSSL, PH_SPEC, TYPE_STRING, OFUNC_SPEC };
|
|
#if WITH_OPENSSL_METHOD
|
|
const struct optdesc opt_openssl_method = { "openssl-method", "method", OPT_OPENSSL_METHOD, GROUP_OPENSSL, PH_SPEC, TYPE_STRING, OFUNC_SPEC };
|
|
#endif
|
|
#if HAVE_SSL_CTX_set_min_proto_version || defined(SSL_CTX_set_min_proto_version)
|
|
const struct optdesc opt_openssl_min_proto_version = { "openssl-min-proto-version", "min-version", OPT_OPENSSL_MIN_PROTO_VERSION, GROUP_OPENSSL, PH_INIT, TYPE_STRING, OFUNC_OFFSET, XIO_OFFSETOF(para.openssl.min_proto_version) };
|
|
#endif
|
|
#if HAVE_SSL_CTX_set_max_proto_version || defined(SSL_CTX_set_max_proto_version)
|
|
const struct optdesc opt_openssl_max_proto_version = { "openssl-max-proto-version", "max-version", OPT_OPENSSL_MAX_PROTO_VERSION, GROUP_OPENSSL, PH_INIT, TYPE_STRING, OFUNC_OFFSET, XIO_OFFSETOF(para.openssl.max_proto_version) };
|
|
#endif
|
|
const struct optdesc opt_openssl_verify = { "openssl-verify", "verify", OPT_OPENSSL_VERIFY, GROUP_OPENSSL, PH_SPEC, TYPE_BOOL, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_certificate = { "openssl-certificate", "cert", OPT_OPENSSL_CERTIFICATE, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_key = { "openssl-key", "key", OPT_OPENSSL_KEY, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_dhparam = { "openssl-dhparam", "dh", OPT_OPENSSL_DHPARAM, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_cafile = { "openssl-cafile", "cafile", OPT_OPENSSL_CAFILE, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_capath = { "openssl-capath", "capath", OPT_OPENSSL_CAPATH, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_egd = { "openssl-egd", "egd", OPT_OPENSSL_EGD, GROUP_OPENSSL, PH_SPEC, TYPE_FILENAME, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_pseudo = { "openssl-pseudo", "pseudo", OPT_OPENSSL_PSEUDO, GROUP_OPENSSL, PH_SPEC, TYPE_BOOL, OFUNC_SPEC };
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L && !defined(OPENSSL_NO_COMP)
|
|
const struct optdesc opt_openssl_compress = { "openssl-compress", "compress", OPT_OPENSSL_COMPRESS, GROUP_OPENSSL, PH_SPEC, TYPE_STRING, OFUNC_SPEC };
|
|
#endif
|
|
#if WITH_FIPS
|
|
const struct optdesc opt_openssl_fips = { "openssl-fips", "fips", OPT_OPENSSL_FIPS, GROUP_OPENSSL, PH_SPEC, TYPE_BOOL, OFUNC_SPEC };
|
|
#endif
|
|
const struct optdesc opt_openssl_commonname = { "openssl-commonname", "cn", OPT_OPENSSL_COMMONNAME, GROUP_OPENSSL, PH_SPEC, TYPE_STRING, OFUNC_SPEC };
|
|
#if defined(HAVE_SSL_set_tlsext_host_name) || defined(SSL_set_tlsext_host_name)
|
|
const struct optdesc opt_openssl_no_sni = { "openssl-no-sni", "nosni", OPT_OPENSSL_NO_SNI, GROUP_OPENSSL, PH_SPEC, TYPE_BOOL, OFUNC_SPEC };
|
|
const struct optdesc opt_openssl_snihost = { "openssl-snihost", "snihost", OPT_OPENSSL_SNIHOST, GROUP_OPENSSL, PH_SPEC, TYPE_STRING, OFUNC_SPEC };
|
|
#endif
|
|
|
|
|
|
/* If FIPS is compiled in, we need to track if the user asked for FIPS mode.
|
|
* On forks, the FIPS mode must be reset by a disable, then enable since
|
|
* FIPS tracks the process ID that initializes things.
|
|
* If FIPS is not compiled in, no tracking variable is needed
|
|
* and we make the reset code compile out. This keeps the
|
|
* rest of the code below free of FIPS related #ifs
|
|
*/
|
|
#if WITH_FIPS
|
|
static bool xio_openssl_fips = false;
|
|
int xio_reset_fips_mode(void) {
|
|
if (xio_openssl_fips) {
|
|
if(!sycFIPS_mode_set(0) || !sycFIPS_mode_set(1)) {
|
|
ERR_load_crypto_strings();
|
|
ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
|
|
Error("Failed to reset OpenSSL FIPS mode");
|
|
xio_openssl_fips = false;
|
|
return -1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
#else
|
|
#define xio_reset_fips_mode() 0
|
|
#endif
|
|
|
|
static void openssl_conn_loginfo(SSL *ssl) {
|
|
const char *string;
|
|
|
|
string = SSL_get_cipher_version(ssl);
|
|
Notice1("SSL proto version used: %s", string);
|
|
xiosetenv("OPENSSL_PROTO_VERSION", string, 1, NULL);
|
|
|
|
string = SSL_get_cipher(ssl);
|
|
Notice1("SSL connection using %s", string);
|
|
xiosetenv("OPENSSL_CIPHER", string, 1, NULL);
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L && !defined(OPENSSL_NO_COMP)
|
|
{
|
|
const COMP_METHOD *comp, *expansion;
|
|
|
|
comp = sycSSL_get_current_compression(ssl);
|
|
expansion = sycSSL_get_current_expansion(ssl);
|
|
|
|
Notice1("SSL connection compression \"%s\"",
|
|
comp?sycSSL_COMP_get_name(comp):"none");
|
|
Notice1("SSL connection expansion \"%s\"",
|
|
expansion?sycSSL_COMP_get_name(expansion):"none");
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* the open function for OpenSSL client */
|
|
static int
|
|
xioopen_openssl_connect(int argc,
|
|
const char *argv[], /* the arguments in the address string */
|
|
struct opt *opts,
|
|
int xioflags, /* is the open meant for reading (0),
|
|
writing (1), or both (2) ? */
|
|
xiofile_t *xxfd, /* a xio file descriptor structure,
|
|
already allocated */
|
|
groups_t groups, /* the matching address groups... */
|
|
int protogrp, /* first transparent integer value from
|
|
addr_openssl */
|
|
int dummy2, /* second transparent integer value from
|
|
addr_openssl */
|
|
int dummy3) /* transparent pointer value from
|
|
addr_openssl */
|
|
{
|
|
struct single *xfd = &xxfd->stream;
|
|
struct opt *opts0 = NULL;
|
|
const char *hostname, *portname;
|
|
int pf = PF_UNSPEC;
|
|
bool use_dtls = (protogrp != 0);
|
|
int socktype = SOCK_STREAM;
|
|
int ipproto = IPPROTO_TCP;
|
|
bool dofork = false;
|
|
union sockaddr_union us_sa, *us = &us_sa;
|
|
union sockaddr_union them_sa, *them = &them_sa;
|
|
socklen_t uslen = sizeof(us_sa);
|
|
socklen_t themlen = sizeof(them_sa);
|
|
bool needbind = false;
|
|
bool lowport = false;
|
|
int level;
|
|
SSL_CTX* ctx;
|
|
bool opt_ver = true; /* verify peer certificate */
|
|
char *opt_cert = NULL; /* file name of client certificate */
|
|
const char *opt_commonname = NULL; /* for checking peer certificate */
|
|
bool opt_no_sni = false;
|
|
const char *opt_snihost = NULL; /* for SNI host */
|
|
int result;
|
|
|
|
if (!(xioflags & XIO_MAYCONVERT)) {
|
|
Error("address with data processing not allowed here");
|
|
return STAT_NORETRY;
|
|
}
|
|
xfd->flags |= XIO_DOESCONVERT;
|
|
|
|
if (argc != 3) {
|
|
Error1("%s: 2 parameters required", argv[0]);
|
|
return STAT_NORETRY;
|
|
}
|
|
hostname = argv[1];
|
|
portname = argv[2];
|
|
if (hostname[0] == '\0') {
|
|
/* we catch this explicitely because empty commonname (peername) disables
|
|
commonName check of peer certificate */
|
|
Error1("%s: empty host name", argv[0]);
|
|
return STAT_NORETRY;
|
|
}
|
|
|
|
xfd->howtoend = END_SHUTDOWN;
|
|
if (applyopts_single(xfd, opts, PH_INIT) < 0) return -1;
|
|
applyopts(-1, opts, PH_INIT);
|
|
|
|
retropt_bool(opts, OPT_FORK, &dofork);
|
|
|
|
retropt_string(opts, OPT_OPENSSL_CERTIFICATE, &opt_cert);
|
|
retropt_string(opts, OPT_OPENSSL_COMMONNAME, (char **)&opt_commonname);
|
|
#if defined(HAVE_SSL_set_tlsext_host_name) || defined(SSL_set_tlsext_host_name)
|
|
retropt_bool(opts, OPT_OPENSSL_NO_SNI, &opt_no_sni);
|
|
retropt_string(opts, OPT_OPENSSL_SNIHOST, (char **)&opt_snihost);
|
|
#endif
|
|
|
|
if (opt_commonname == NULL) {
|
|
opt_commonname = strdup(hostname);
|
|
if (opt_commonname == NULL) {
|
|
Error1("strdup("F_Zu"): out of memory", strlen(hostname)+1);
|
|
}
|
|
}
|
|
|
|
#if defined(HAVE_SSL_set_tlsext_host_name) || defined(SSL_set_tlsext_host_name)
|
|
if (opt_snihost != NULL) {
|
|
if (check_ipaddr(opt_snihost) == 0) {
|
|
Warn1("specified SNI host \"%s\" is an IP address", opt_snihost);
|
|
}
|
|
} else if (check_ipaddr(opt_commonname) != 0) {
|
|
opt_snihost = strdup(opt_commonname);
|
|
if (opt_snihost == NULL) {
|
|
Error1("strdup("F_Zu"): out of memory", strlen(opt_commonname)+1);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
result =
|
|
_xioopen_openssl_prepare(opts, xfd, false, &opt_ver, opt_cert, &ctx, (bool *)&use_dtls);
|
|
if (result != STAT_OK) return STAT_NORETRY;
|
|
|
|
if (use_dtls) {
|
|
socktype = SOCK_DGRAM;
|
|
ipproto = IPPROTO_UDP;
|
|
}
|
|
retropt_int(opts, OPT_SO_TYPE, &socktype);
|
|
retropt_int(opts, OPT_SO_PROTOTYPE, &ipproto);
|
|
|
|
result =
|
|
_xioopen_ipapp_prepare(opts, &opts0, hostname, portname, &pf, ipproto,
|
|
xfd->para.socket.ip.res_opts[1],
|
|
xfd->para.socket.ip.res_opts[0],
|
|
them, &themlen, us, &uslen,
|
|
&needbind, &lowport, socktype);
|
|
if (result != STAT_OK) return STAT_NORETRY;
|
|
|
|
if (xioparms.logopt == 'm') {
|
|
Info("starting connect loop, switching to syslog");
|
|
diag_set('y', xioparms.syslogfac); xioparms.logopt = 'y';
|
|
} else {
|
|
Info("starting connect loop");
|
|
}
|
|
|
|
do { /* loop over failed connect and SSL handshake attempts */
|
|
|
|
#if WITH_RETRY
|
|
if (xfd->forever || xfd->retry) {
|
|
level = E_INFO;
|
|
} else
|
|
#endif /* WITH_RETRY */
|
|
level = E_ERROR;
|
|
|
|
/* this cannot fork because we retrieved fork option above */
|
|
result =
|
|
_xioopen_connect(xfd,
|
|
needbind?us:NULL, uslen,
|
|
(struct sockaddr *)them, themlen,
|
|
opts, pf, socktype, ipproto, lowport, level);
|
|
switch (result) {
|
|
case STAT_OK: break;
|
|
#if WITH_RETRY
|
|
case STAT_RETRYLATER:
|
|
case STAT_RETRYNOW:
|
|
if (xfd->forever || xfd->retry) {
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
if (result == STAT_RETRYLATER) {
|
|
Nanosleep(&xfd->intervall, NULL);
|
|
}
|
|
--xfd->retry;
|
|
continue;
|
|
}
|
|
return STAT_NORETRY;
|
|
#endif /* WITH_RETRY */
|
|
default:
|
|
return result;
|
|
}
|
|
|
|
/*! isn't this too early? */
|
|
if ((result = _xio_openlate(xfd, opts)) < 0) {
|
|
return result;
|
|
}
|
|
|
|
result = _xioopen_openssl_connect(xfd, opt_ver, opt_commonname,
|
|
opt_no_sni, opt_snihost, ctx, level);
|
|
switch (result) {
|
|
case STAT_OK: break;
|
|
#if WITH_RETRY
|
|
case STAT_RETRYLATER:
|
|
case STAT_RETRYNOW:
|
|
if (xfd->forever || xfd->retry) {
|
|
Close(xfd->fd);
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
if (result == STAT_RETRYLATER) {
|
|
Nanosleep(&xfd->intervall, NULL);
|
|
}
|
|
--xfd->retry;
|
|
continue;
|
|
}
|
|
#endif /* WITH_RETRY */
|
|
default: return STAT_NORETRY;
|
|
}
|
|
|
|
if (dofork) {
|
|
xiosetchilddied(); /* set SIGCHLD handler */
|
|
}
|
|
|
|
#if WITH_RETRY
|
|
if (dofork) {
|
|
pid_t pid;
|
|
int level = E_ERROR;
|
|
if (xfd->forever || xfd->retry) {
|
|
level = E_WARN;
|
|
}
|
|
while ((pid = xio_fork(false, level)) < 0) {
|
|
if (xfd->forever || --xfd->retry) {
|
|
Nanosleep(&xfd->intervall, NULL); continue;
|
|
}
|
|
return STAT_RETRYLATER;
|
|
}
|
|
|
|
if (pid == 0) { /* child process */
|
|
xfd->forever = false; xfd->retry = 0;
|
|
break;
|
|
}
|
|
|
|
/* parent process */
|
|
Close(xfd->fd);
|
|
sycSSL_free(xfd->para.openssl.ssl);
|
|
xfd->para.openssl.ssl = NULL;
|
|
/* with and without retry */
|
|
Nanosleep(&xfd->intervall, NULL);
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
continue; /* with next socket() bind() connect() */
|
|
}
|
|
#endif /* WITH_RETRY */
|
|
break;
|
|
} while (true); /* drop out on success */
|
|
|
|
openssl_conn_loginfo(xfd->para.openssl.ssl);
|
|
|
|
free((void *)opt_commonname);
|
|
free((void *)opt_snihost);
|
|
|
|
/* fill in the fd structure */
|
|
return STAT_OK;
|
|
}
|
|
|
|
|
|
/* this function is typically called within the OpenSSL client fork/retry loop.
|
|
xfd must be of type DATA_OPENSSL, and its fd must be set with a valid file
|
|
descriptor. this function then performs all SSL related step to make a valid
|
|
SSL connection from an FD and a CTX. */
|
|
int _xioopen_openssl_connect(struct single *xfd,
|
|
bool opt_ver,
|
|
const char *opt_commonname,
|
|
bool no_sni,
|
|
const char *snihost,
|
|
SSL_CTX *ctx,
|
|
int level) {
|
|
SSL *ssl;
|
|
unsigned long err;
|
|
int result;
|
|
|
|
/* create a SSL object */
|
|
if ((ssl = sycSSL_new(ctx)) == NULL) {
|
|
if (ERR_peek_error() == 0) Msg(level, "SSL_new() failed");
|
|
while (err = ERR_get_error()) {
|
|
Msg1(level, "SSL_new(): %s", ERR_error_string(err, NULL));
|
|
}
|
|
/*Error("SSL_new()");*/
|
|
return STAT_RETRYLATER;
|
|
}
|
|
xfd->para.openssl.ssl = ssl;
|
|
|
|
result = xioSSL_set_fd(xfd, level);
|
|
if (result != STAT_OK) {
|
|
sycSSL_free(xfd->para.openssl.ssl);
|
|
xfd->para.openssl.ssl = NULL;
|
|
return result;
|
|
}
|
|
|
|
#if defined(HAVE_SSL_set_tlsext_host_name) || defined(SSL_set_tlsext_host_name)
|
|
if (!no_sni) {
|
|
if (snihost == NULL || strlen(snihost) == 0) {
|
|
Warn("refusing to set empty SNI host name");
|
|
} else if (!SSL_set_tlsext_host_name(ssl, snihost)) {
|
|
Error1("Failed to set SNI host \"%s\"", snihost);
|
|
sycSSL_free(xfd->para.openssl.ssl);
|
|
xfd->para.openssl.ssl = NULL;
|
|
return STAT_NORETRY;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
result = xioSSL_connect(xfd, opt_commonname, opt_ver, level);
|
|
if (result != STAT_OK) {
|
|
sycSSL_free(xfd->para.openssl.ssl);
|
|
xfd->para.openssl.ssl = NULL;
|
|
return result;
|
|
}
|
|
|
|
result = openssl_handle_peer_certificate(xfd, opt_commonname,
|
|
opt_ver, level);
|
|
if (result != STAT_OK) {
|
|
sycSSL_free(xfd->para.openssl.ssl);
|
|
xfd->para.openssl.ssl = NULL;
|
|
return result;
|
|
}
|
|
|
|
return STAT_OK;
|
|
}
|
|
|
|
|
|
#if WITH_LISTEN
|
|
|
|
static int
|
|
xioopen_openssl_listen(int argc,
|
|
const char *argv[], /* the arguments in the address string */
|
|
struct opt *opts,
|
|
int xioflags, /* is the open meant for reading (0),
|
|
writing (1), or both (2) ? */
|
|
xiofile_t *xxfd, /* a xio file descriptor structure,
|
|
already allocated */
|
|
groups_t groups, /* the matching address groups... */
|
|
int protogrp, /* first transparent integer value from
|
|
addr_openssl */
|
|
int dummy2, /* second transparent integer value from
|
|
addr_openssl */
|
|
int dummy3) /* transparent pointer value from
|
|
addr_openssl */
|
|
{
|
|
struct single *xfd = &xxfd->stream;
|
|
const char *portname;
|
|
struct opt *opts0 = NULL;
|
|
union sockaddr_union us_sa, *us = &us_sa;
|
|
socklen_t uslen = sizeof(us_sa);
|
|
int pf;
|
|
bool use_dtls = (protogrp != 0);
|
|
int socktype = SOCK_STREAM;
|
|
int ipproto = IPPROTO_TCP;
|
|
/*! lowport? */
|
|
int level;
|
|
SSL_CTX* ctx;
|
|
bool opt_ver = true; /* verify peer certificate - changed with 1.6.0 */
|
|
char *opt_cert = NULL; /* file name of server certificate */
|
|
const char *opt_commonname = NULL; /* for checking peer certificate */
|
|
int result;
|
|
|
|
if (!(xioflags & XIO_MAYCONVERT)) {
|
|
Error("address with data processing not allowed here");
|
|
return STAT_NORETRY;
|
|
}
|
|
xfd->flags |= XIO_DOESCONVERT;
|
|
|
|
if (argc != 2) {
|
|
Error1("%s: 1 parameter required", argv[0]);
|
|
return STAT_NORETRY;
|
|
}
|
|
|
|
#if WITH_IP4 && WITH_IP6
|
|
pf = xioparms.default_ip=='6'?PF_INET6:PF_INET;
|
|
#elif WITH_IP6
|
|
pf = PF_INET6;
|
|
#else
|
|
pf = PF_INET;
|
|
#endif
|
|
|
|
portname = argv[1];
|
|
|
|
xfd->howtoend = END_SHUTDOWN;
|
|
if (applyopts_single(xfd, opts, PH_INIT) < 0) return -1;
|
|
applyopts(-1, opts, PH_INIT);
|
|
|
|
retropt_string(opts, OPT_OPENSSL_CERTIFICATE, &opt_cert);
|
|
if (opt_cert == NULL) {
|
|
Warn("no certificate given; consider option \"cert\"");
|
|
}
|
|
|
|
retropt_string(opts, OPT_OPENSSL_COMMONNAME, (char **)&opt_commonname);
|
|
|
|
applyopts(-1, opts, PH_EARLY);
|
|
|
|
result =
|
|
_xioopen_openssl_prepare(opts, xfd, true, &opt_ver, opt_cert, &ctx, &use_dtls);
|
|
if (result != STAT_OK) return STAT_NORETRY;
|
|
|
|
if (use_dtls) {
|
|
socktype = SOCK_DGRAM;
|
|
ipproto = IPPROTO_UDP;
|
|
}
|
|
retropt_int(opts, OPT_SO_TYPE, &socktype);
|
|
retropt_int(opts, OPT_SO_PROTOTYPE, &ipproto);
|
|
|
|
if (_xioopen_ipapp_listen_prepare(opts, &opts0, portname, &pf, ipproto,
|
|
xfd->para.socket.ip.res_opts[1],
|
|
xfd->para.socket.ip.res_opts[0],
|
|
us, &uslen, socktype)
|
|
!= STAT_OK) {
|
|
return STAT_NORETRY;
|
|
}
|
|
|
|
xfd->dtype = XIODATA_OPENSSL;
|
|
|
|
while (true) { /* loop over failed attempts */
|
|
|
|
#if WITH_RETRY
|
|
if (xfd->forever || xfd->retry) {
|
|
level = E_INFO;
|
|
} else
|
|
#endif /* WITH_RETRY */
|
|
level = E_ERROR;
|
|
|
|
/* this can fork() for us; it only returns on error or on
|
|
successful establishment of connection */
|
|
if (ipproto == IPPROTO_TCP) {
|
|
result = _xioopen_listen(xfd, xioflags,
|
|
(struct sockaddr *)us, uslen,
|
|
opts, pf, socktype, ipproto,
|
|
#if WITH_RETRY
|
|
(xfd->retry||xfd->forever)?E_INFO:E_ERROR
|
|
#else
|
|
E_ERROR
|
|
#endif /* WITH_RETRY */
|
|
);
|
|
#if WITH_UDP
|
|
} else {
|
|
result = _xioopen_ipdgram_listen(xfd, xioflags,
|
|
us, uslen, opts, pf, socktype, ipproto);
|
|
#endif /* WITH_UDP */
|
|
}
|
|
/*! not sure if we should try again on retry/forever */
|
|
switch (result) {
|
|
case STAT_OK: break;
|
|
#if WITH_RETRY
|
|
case STAT_RETRYLATER:
|
|
case STAT_RETRYNOW:
|
|
if (xfd->forever || xfd->retry) {
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
if (result == STAT_RETRYLATER) {
|
|
Nanosleep(&xfd->intervall, NULL);
|
|
}
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
--xfd->retry;
|
|
continue;
|
|
}
|
|
return STAT_NORETRY;
|
|
#endif /* WITH_RETRY */
|
|
default:
|
|
return result;
|
|
}
|
|
|
|
result = _xioopen_openssl_listen(xfd, opt_ver, opt_commonname, ctx, level);
|
|
switch (result) {
|
|
case STAT_OK: break;
|
|
#if WITH_RETRY
|
|
case STAT_RETRYLATER:
|
|
case STAT_RETRYNOW:
|
|
if (xfd->forever || xfd->retry) {
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
if (result == STAT_RETRYLATER) {
|
|
Nanosleep(&xfd->intervall, NULL);
|
|
}
|
|
dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL);
|
|
--xfd->retry;
|
|
continue;
|
|
}
|
|
return STAT_NORETRY;
|
|
#endif /* WITH_RETRY */
|
|
default:
|
|
return result;
|
|
}
|
|
|
|
openssl_conn_loginfo(xfd->para.openssl.ssl);
|
|
break;
|
|
|
|
} /* drop out on success */
|
|
|
|
/* fill in the fd structure */
|
|
|
|
return STAT_OK;
|
|
}
|
|
|
|
|
|
int _xioopen_openssl_listen(struct single *xfd,
|
|
bool opt_ver,
|
|
const char *opt_commonname,
|
|
SSL_CTX *ctx,
|
|
int level) {
|
|
char error_string[120];
|
|
unsigned long err;
|
|
int errint, ret;
|
|
|
|
/* create an SSL object */
|
|
if ((xfd->para.openssl.ssl = sycSSL_new(ctx)) == NULL) {
|
|
if (ERR_peek_error() == 0) Msg(level, "SSL_new() failed");
|
|
while (err = ERR_get_error()) {
|
|
Msg1(level, "SSL_new(): %s", ERR_error_string(err, NULL));
|
|
}
|
|
/*Error("SSL_new()");*/
|
|
return STAT_NORETRY;
|
|
}
|
|
|
|
/* assign the network connection to the SSL object */
|
|
if (sycSSL_set_fd(xfd->para.openssl.ssl, xfd->fd) <= 0) {
|
|
if (ERR_peek_error() == 0) Msg(level, "SSL_set_fd() failed");
|
|
while (err = ERR_get_error()) {
|
|
Msg2(level, "SSL_set_fd(, %d): %s",
|
|
xfd->fd, ERR_error_string(err, NULL));
|
|
}
|
|
}
|
|
|
|
#if WITH_DEBUG
|
|
{
|
|
int i = 0;
|
|
const char *ciphers = NULL;
|
|
Debug("available ciphers:");
|
|
do {
|
|
ciphers = SSL_get_cipher_list(xfd->para.openssl.ssl, i);
|
|
if (ciphers == NULL) break;
|
|
Debug2("CIPHERS pri=%d: %s", i, ciphers);
|
|
++i;
|
|
} while (1);
|
|
}
|
|
#endif /* WITH_DEBUG */
|
|
|
|
/* connect via SSL by performing handshake */
|
|
if ((ret = sycSSL_accept(xfd->para.openssl.ssl)) <= 0) {
|
|
/*if (ERR_peek_error() == 0) Msg(level, "SSL_accept() failed");*/
|
|
errint = SSL_get_error(xfd->para.openssl.ssl, ret);
|
|
switch (errint) {
|
|
case SSL_ERROR_NONE:
|
|
Msg(level, "ok"); break;
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
Msg(level, "connection closed (wrong version number?)"); break;
|
|
case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE:
|
|
case SSL_ERROR_WANT_CONNECT:
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
Msg(level, "nonblocking operation did not complete"); break; /*!*/
|
|
case SSL_ERROR_SYSCALL:
|
|
if (ERR_peek_error() == 0) {
|
|
if (ret == 0) {
|
|
Msg(level, "SSL_accept(): socket closed by peer");
|
|
} else if (ret == -1) {
|
|
Msg1(level, "SSL_accept(): %s", strerror(errno));
|
|
}
|
|
} else {
|
|
Msg(level, "I/O error"); /*!*/
|
|
while (err = ERR_get_error()) {
|
|
ERR_error_string_n(err, error_string, sizeof(error_string));
|
|
Msg4(level, "SSL_accept(): %s / %s / %s / %s", error_string,
|
|
ERR_lib_error_string(err), ERR_func_error_string(err),
|
|
ERR_reason_error_string(err));
|
|
}
|
|
/* Msg1(level, "SSL_accept(): %s", ERR_error_string(e, buf));*/
|
|
}
|
|
break;
|
|
case SSL_ERROR_SSL:
|
|
/*ERR_print_errors_fp(stderr);*/
|
|
openssl_SSL_ERROR_SSL(level, "SSL_accept");
|
|
break;
|
|
default:
|
|
Msg(level, "unknown error");
|
|
}
|
|
|
|
return STAT_RETRYLATER;
|
|
}
|
|
|
|
if (openssl_handle_peer_certificate(xfd, opt_commonname, opt_ver, E_ERROR/*!*/) < 0) {
|
|
return STAT_NORETRY;
|
|
}
|
|
|
|
return STAT_OK;
|
|
}
|
|
|
|
#endif /* WITH_LISTEN */
|
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L
|
|
/* In OpenSSL 0.9.7 compression methods could be added using
|
|
* SSL_COMP_add_compression_method(3), but the implemntation is not compatible
|
|
* with the standard (RFC3749).
|
|
*/
|
|
static int openssl_setup_compression(SSL_CTX *ctx, char *method)
|
|
{
|
|
STACK_OF(SSL_COMP)* comp_methods;
|
|
|
|
assert(method);
|
|
|
|
/* Getting the stack of compression methods has the intended side-effect of
|
|
* initializing the SSL library's compression part.
|
|
*/
|
|
comp_methods = SSL_COMP_get_compression_methods();
|
|
if (!comp_methods) {
|
|
Info("OpenSSL built without compression support");
|
|
return STAT_OK;
|
|
}
|
|
|
|
if (strcasecmp(method, "auto") == 0) {
|
|
Info("Using default OpenSSL compression");
|
|
return STAT_OK;
|
|
}
|
|
|
|
if (strcasecmp(method, "none") == 0) {
|
|
/* Disable compression */
|
|
#ifdef SSL_OP_NO_COMPRESSION
|
|
Info("Disabling OpenSSL compression");
|
|
SSL_CTX_set_options(ctx, SSL_OP_NO_COMPRESSION);
|
|
#else
|
|
/* SSL_OP_NO_COMPRESSION was only introduced in OpenSSL 0.9.9 (released
|
|
* as 1.0.0). Removing all compression methods is a work-around for
|
|
* earlier versions of OpenSSL, but it affects all SSL connections.
|
|
*/
|
|
Info("Disabling OpenSSL compression globally");
|
|
sk_SSL_COMP_zero(comp_methods);
|
|
#endif
|
|
return STAT_OK;
|
|
}
|
|
|
|
/* zlib compression in OpenSSL before version 0.9.8e-beta1 uses the libc's
|
|
* default malloc/free instead of the ones passed to OpenSSL. Should socat
|
|
* ever use custom malloc/free functions for OpenSSL, this must be taken
|
|
* into consideration. See OpenSSL bug #1468.
|
|
*/
|
|
|
|
Error1("openssl-compress=\"%s\": unknown compression method", method);
|
|
return STAT_NORETRY;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if HAVE_CTX_SSL_set_min_proto_version || defined(SSL_CTX_set_min_proto_version) || \
|
|
HAVE_SSL_CTX_set_max_proto_version || defined(SSL_CTX_set_max_proto_version)
|
|
#define XIO_OPENSSL_VERSIONGROUP_TLS 1
|
|
#define XIO_OPENSSL_VERSIONGROUP_DTLS 2
|
|
|
|
static struct wordent _xio_openssl_versions[] = {
|
|
#ifdef DTLS1_VERSION
|
|
{ "DTLS1", (void *)DTLS1_VERSION },
|
|
{ "DTLS1.0", (void *)DTLS1_VERSION },
|
|
#endif
|
|
#ifdef DTLS1_2_VERSION
|
|
{ "DTLS1.2", (void *)DTLS1_2_VERSION },
|
|
#endif
|
|
#ifdef DTLS1_VERSION
|
|
{ "DTLSv1", (void *)DTLS1_VERSION },
|
|
{ "DTLSv1.0", (void *)DTLS1_VERSION },
|
|
#endif
|
|
#ifdef DTLS1_2_VERSION
|
|
{ "DTLSv1.2", (void *)DTLS1_2_VERSION },
|
|
#endif
|
|
#ifdef SSL2_VERSION
|
|
{ "SSL2", (void *)SSL2_VERSION },
|
|
#endif
|
|
#ifdef SSL3_VERSION
|
|
{ "SSL3", (void *)SSL3_VERSION },
|
|
#endif
|
|
#ifdef SSL2_VERSION
|
|
{ "SSLv2", (void *)SSL2_VERSION },
|
|
#endif
|
|
#ifdef SSL3_VERSION
|
|
{ "SSLv3", (void *)SSL3_VERSION },
|
|
#endif
|
|
#ifdef TLS1_VERSION
|
|
{ "TLS1", (void *)TLS1_VERSION },
|
|
{ "TLS1.0", (void *)TLS1_VERSION },
|
|
#endif
|
|
#ifdef TLS1_1_VERSION
|
|
{ "TLS1.1", (void *)TLS1_1_VERSION },
|
|
#endif
|
|
#ifdef TLS1_2_VERSION
|
|
{ "TLS1.2", (void *)TLS1_2_VERSION },
|
|
#endif
|
|
#ifdef TLS1_3_VERSION
|
|
{ "TLS1.3", (void *)TLS1_3_VERSION },
|
|
#endif
|
|
#ifdef TLS1_VERSION
|
|
{ "TLSv1", (void *)TLS1_VERSION },
|
|
{ "TLSv1.0", (void *)TLS1_VERSION },
|
|
#endif
|
|
#ifdef TLS1_1_VERSION
|
|
{ "TLSv1.1", (void *)TLS1_1_VERSION },
|
|
#endif
|
|
#ifdef TLS1_2_VERSION
|
|
{ "TLSv1.2", (void *)TLS1_2_VERSION },
|
|
#endif
|
|
#ifdef TLS1_3_VERSION
|
|
{ "TLSv1.3", (void *)TLS1_3_VERSION },
|
|
#endif
|
|
} ;
|
|
|
|
static int _xio_openssl_parse_version(const char *verstring, int vergroups) {
|
|
int sslver;
|
|
const struct wordent *we;
|
|
we = keyw(_xio_openssl_versions, verstring,
|
|
sizeof(_xio_openssl_versions)/sizeof(struct wordent));
|
|
if (we == 0) {
|
|
Error1("Unknown SSL/TLS version \"%s\"", verstring);
|
|
return -1;
|
|
}
|
|
sslver = (size_t)we->desc;
|
|
switch (sslver) {
|
|
#ifdef SSL2_VERSION
|
|
case SSL2_VERSION:
|
|
#endif
|
|
#ifdef SSL3_VERSION
|
|
case SSL3_VERSION:
|
|
#endif
|
|
#ifdef TLS1_VERSION
|
|
case TLS1_VERSION:
|
|
#endif
|
|
#ifdef TLS1_1_VERSION
|
|
case TLS1_1_VERSION:
|
|
#endif
|
|
#ifdef TLS1_2_VERSION
|
|
case TLS1_2_VERSION:
|
|
#endif
|
|
#ifdef TLS1_3_VERSION
|
|
case TLS1_3_VERSION:
|
|
#endif
|
|
if (!(vergroups & XIO_OPENSSL_VERSIONGROUP_TLS)) {
|
|
Error1("Wrong type of TLS/DTLS version \"%s\"", verstring);
|
|
return -1;
|
|
}
|
|
#ifdef DTLS1_VERSION
|
|
case DTLS1_VERSION:
|
|
#endif
|
|
#ifdef DTLS1_2_VERSION
|
|
case DTLS1_2_VERSION:
|
|
#endif
|
|
if (!(vergroups & XIO_OPENSSL_VERSIONGROUP_DTLS)) {
|
|
Error1("Wrong type of TLS/DTLS version \"%s\"", verstring);
|
|
return -1;
|
|
}
|
|
break;
|
|
}
|
|
return sslver;
|
|
}
|
|
#endif /* defined(SSL_CTX_set_min_proto_version) || defined(SSL_CTX_set_max_proto_version) */
|
|
|
|
|
|
int
|
|
_xioopen_openssl_prepare(struct opt *opts,
|
|
struct single *xfd,/* a xio file descriptor
|
|
structure, already allocated
|
|
*/
|
|
bool server, /* SSL client: false */
|
|
bool *opt_ver,
|
|
const char *opt_cert,
|
|
SSL_CTX **ctxp,
|
|
bool *use_dtls) /* checked,overwritten with true if DTLS-method */
|
|
{
|
|
SSL_CTX *ctx;
|
|
bool opt_fips = false;
|
|
const SSL_METHOD *method = NULL;
|
|
char *me_str = NULL; /* method string */
|
|
char *ci_str = "HIGH:-NULL:-PSK:-aNULL"; /* cipher string */
|
|
char *opt_key = NULL; /* file name of client private key */
|
|
char *opt_dhparam = NULL; /* file name of DH params */
|
|
char *opt_cafile = NULL; /* certificate authority file */
|
|
char *opt_capath = NULL; /* certificate authority directory */
|
|
char *opt_egd = NULL; /* entropy gathering daemon socket path */
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L
|
|
char *opt_compress = NULL; /* compression method */
|
|
#endif
|
|
bool opt_pseudo = false; /* use pseudo entropy if nothing else */
|
|
unsigned long err;
|
|
int result;
|
|
|
|
xfd->dtype = XIODATA_OPENSSL;
|
|
|
|
retropt_bool(opts, OPT_OPENSSL_FIPS, &opt_fips);
|
|
retropt_string(opts, OPT_OPENSSL_METHOD, &me_str);
|
|
retropt_string(opts, OPT_OPENSSL_CIPHERLIST, &ci_str);
|
|
retropt_bool(opts, OPT_OPENSSL_VERIFY, opt_ver);
|
|
retropt_string(opts, OPT_OPENSSL_CAFILE, &opt_cafile);
|
|
retropt_string(opts, OPT_OPENSSL_CAPATH, &opt_capath);
|
|
retropt_string(opts, OPT_OPENSSL_KEY, &opt_key);
|
|
retropt_string(opts, OPT_OPENSSL_DHPARAM, &opt_dhparam);
|
|
retropt_string(opts, OPT_OPENSSL_EGD, &opt_egd);
|
|
retropt_bool(opts,OPT_OPENSSL_PSEUDO, &opt_pseudo);
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L
|
|
retropt_string(opts, OPT_OPENSSL_COMPRESS, &opt_compress);
|
|
#endif
|
|
#if WITH_FIPS
|
|
if (opt_fips) {
|
|
if (!sycFIPS_mode_set(1)) {
|
|
ERR_load_crypto_strings();
|
|
ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
|
|
Error("Failed to set FIPS mode");
|
|
} else {
|
|
xio_openssl_fips = true;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
openssl_delete_cert_info();
|
|
|
|
/* OpenSSL preparation */
|
|
#if defined(HAVE_OPENSSL_INIT_SSL) && defined(HAVE_OPENSSL_INIT_new)
|
|
{
|
|
uint64_t opts = 0;
|
|
OPENSSL_INIT_SETTINGS *settings;
|
|
settings = OPENSSL_INIT_new();
|
|
#ifdef OPENSSL_INIT_NO_ATEXIT
|
|
opts |= OPENSSL_INIT_NO_ATEXIT;
|
|
#endif
|
|
sycOPENSSL_init_ssl(opts, settings);
|
|
}
|
|
#else
|
|
# if defined(HAVE_SSL_library_init)
|
|
sycSSL_library_init();
|
|
# endif
|
|
OpenSSL_add_all_algorithms();
|
|
OpenSSL_add_all_ciphers();
|
|
OpenSSL_add_all_digests();
|
|
sycSSL_load_error_strings();
|
|
#endif /* defined(HAVE_OPENSSL_INIT_SSL) && defined(HAVE OPENSSL_INIT_new) */
|
|
|
|
/*! actions_to_seed_PRNG();*/
|
|
|
|
if (!server) {
|
|
if (me_str != NULL) {
|
|
if (false) {
|
|
; /* for canonical reasons */
|
|
#if HAVE_SSLv2_client_method
|
|
} else if (!strcasecmp(me_str, "SSL2")) {
|
|
method = sycSSLv2_client_method();
|
|
#endif
|
|
#if HAVE_SSLv3_client_method
|
|
} else if (!strcasecmp(me_str, "SSL3")) {
|
|
method = sycSSLv3_client_method();
|
|
#endif
|
|
#if HAVE_SSLv23_client_method
|
|
} else if (!strcasecmp(me_str, "SSL23")) {
|
|
method = sycSSLv23_client_method();
|
|
#endif
|
|
#if HAVE_TLSv1_client_method
|
|
} else if (!strcasecmp(me_str, "TLS1") || !strcasecmp(me_str, "TLS1.0")) {
|
|
method = sycTLSv1_client_method();
|
|
#endif
|
|
#if HAVE_TLSv1_1_client_method
|
|
} else if (!strcasecmp(me_str, "TLS1.1")) {
|
|
method = sycTLSv1_1_client_method();
|
|
#endif
|
|
#if HAVE_TLSv1_2_client_method
|
|
} else if (!strcasecmp(me_str, "TLS1.2")) {
|
|
method = sycTLSv1_2_client_method();
|
|
#endif
|
|
#if HAVE_DTLSv1_client_method
|
|
} else if (!strcasecmp(me_str, "DTLS1") || !strcasecmp(me_str, "DTLS1.0")) {
|
|
method = sycDTLSv1_client_method();
|
|
*use_dtls = true;
|
|
#endif
|
|
#if HAVE_DTLSv1_2_client_method
|
|
} else if (!strcasecmp(me_str, "DTLS1.2")) {
|
|
method = sycDTLSv1_2_client_method();
|
|
*use_dtls = true;
|
|
#endif
|
|
} else {
|
|
Error1("openssl-method=\"%s\": method unknown or not provided by library", me_str);
|
|
}
|
|
} else if (!*use_dtls) {
|
|
#if HAVE_TLS_client_method
|
|
method = sycTLS_client_method();
|
|
#elif HAVE_SSLv23_client_method
|
|
method = sycSSLv23_client_method();
|
|
#elif HAVE_TLSv1_2_client_method
|
|
method = sycTLSv1_2_client_method();
|
|
#elif HAVE_TLSv1_1_client_method
|
|
method = sycTLSv1_1_client_method();
|
|
#elif HAVE_TLSv1_client_method
|
|
method = sycTLSv1_client_method();
|
|
#elif HAVE_SSLv3_client_method
|
|
method = sycSSLv3_client_method();
|
|
#elif HAVE_SSLv2_client_method
|
|
method = sycSSLv2_client_method();
|
|
#else
|
|
# error "OpenSSL does not seem to provide SSL/TLS client methods"
|
|
#endif
|
|
} else {
|
|
#if HAVE_DTLS_client_method
|
|
method = sycDTLS_client_method();
|
|
#elif HAVE_DTLSv1_2_client_method
|
|
method = sycDTLSv1_2_client_method();
|
|
#elif HAVE_DTLSv1_client_method
|
|
method = sycDTLSv1_client_method();
|
|
#else
|
|
# error "OpenSSL does not seem to provide DTLS client methods"
|
|
#endif
|
|
*use_dtls = true;
|
|
}
|
|
} else /* server */ {
|
|
if (me_str != 0) {
|
|
if (false) {
|
|
; /* for canonical reasons */
|
|
#if HAVE_SSLv2_server_method
|
|
} else if (!strcasecmp(me_str, "SSL2")) {
|
|
method = sycSSLv2_server_method();
|
|
#endif
|
|
#if HAVE_SSLv3_server_method
|
|
} else if (!strcasecmp(me_str, "SSL3")) {
|
|
method = sycSSLv3_server_method();
|
|
#endif
|
|
#if HAVE_SSLv23_server_method
|
|
} else if (!strcasecmp(me_str, "SSL23")) {
|
|
method = sycSSLv23_server_method();
|
|
#endif
|
|
#if HAVE_TLSv1_server_method
|
|
} else if (!strcasecmp(me_str, "TLS1") || !strcasecmp(me_str, "TLS1.0")) {
|
|
method = sycTLSv1_server_method();
|
|
#endif
|
|
#if HAVE_TLSv1_1_server_method
|
|
} else if (!strcasecmp(me_str, "TLS1.1")) {
|
|
method = sycTLSv1_1_server_method();
|
|
#endif
|
|
#if HAVE_TLSv1_2_server_method
|
|
} else if (!strcasecmp(me_str, "TLS1.2")) {
|
|
method = sycTLSv1_2_server_method();
|
|
#endif
|
|
#if HAVE_DTLSv1_server_method
|
|
} else if (!strcasecmp(me_str, "DTLS1") || !strcasecmp(me_str, "DTLS1.0")) {
|
|
method = sycDTLSv1_server_method();
|
|
*use_dtls = true;
|
|
#endif
|
|
#if HAVE_DTLSv1_2_server_method
|
|
} else if (!strcasecmp(me_str, "DTLS1.2")) {
|
|
method = sycDTLSv1_2_server_method();
|
|
*use_dtls = true;
|
|
#endif
|
|
} else {
|
|
Error1("openssl-method=\"%s\": method unknown or not provided by library", me_str);
|
|
}
|
|
} else if (!*use_dtls) {
|
|
#if HAVE_TLS_server_method
|
|
method = sycTLS_server_method();
|
|
#elif HAVE_SSLv23_server_method
|
|
method = sycSSLv23_server_method();
|
|
#elif HAVE_TLSv1_2_server_method
|
|
method = sycTLSv1_2_server_method();
|
|
#elif HAVE_TLSv1_1_server_method
|
|
method = sycTLSv1_1_server_method();
|
|
#elif HAVE_TLSv1_server_method
|
|
method = sycTLSv1_server_method();
|
|
#elif HAVE_SSLv3_server_method
|
|
method = sycSSLv3_server_method();
|
|
#elif HAVE_SSLv2_server_method
|
|
method = sycSSLv2_server_method();
|
|
#else
|
|
# error "OpenSSL does not seem to provide SSL/TLS server methods"
|
|
#endif
|
|
} else {
|
|
#if HAVE_DTLS_server_method
|
|
method = sycDTLS_server_method();
|
|
#elif HAVE_DTLSv1_2_server_method
|
|
method = sycDTLSv1_2_server_method();
|
|
#elif HAVE_DTLSv1_server_method
|
|
method = sycDTLSv1_server_method();
|
|
#else
|
|
# error "OpenSSL does not seem to provide DTLS server methods"
|
|
#endif
|
|
*use_dtls = true;
|
|
}
|
|
}
|
|
|
|
if (opt_egd) {
|
|
#if !defined(OPENSSL_NO_EGD) && HAVE_RAND_egd
|
|
sycRAND_egd(opt_egd);
|
|
#else
|
|
Debug("RAND_egd() is not available by OpenSSL");
|
|
#endif
|
|
}
|
|
|
|
if (opt_pseudo) {
|
|
long int randdata;
|
|
/* initialize libc random from actual microseconds */
|
|
struct timeval tv;
|
|
struct timezone tz;
|
|
tz.tz_minuteswest = 0;
|
|
tz.tz_dsttime = 0;
|
|
if ((result = Gettimeofday(&tv, &tz)) < 0) {
|
|
Warn2("gettimeofday(%p, {0,0}): %s", &tv, strerror(errno));
|
|
}
|
|
srandom(tv.tv_sec*1000000+tv.tv_usec);
|
|
|
|
while (!RAND_status()) {
|
|
randdata = random();
|
|
Debug2("RAND_seed(0x{%lx}, "F_Zu")",
|
|
randdata, sizeof(randdata));
|
|
RAND_seed(&randdata, sizeof(randdata));
|
|
}
|
|
}
|
|
|
|
if ((ctx = sycSSL_CTX_new(method)) == NULL) {
|
|
if (ERR_peek_error() == 0) Error("SSL_CTX_new()");
|
|
while (err = ERR_get_error()) {
|
|
Error1("SSL_CTX_new(): %s", ERR_error_string(err, NULL));
|
|
}
|
|
|
|
/*ERR_clear_error;*/
|
|
return STAT_RETRYLATER;
|
|
}
|
|
xfd->para.openssl.ctx = ctx;
|
|
*ctxp = ctx;
|
|
|
|
#if HAVE_SSL_CTX_set_min_proto_version || defined(SSL_CTX_set_min_proto_version)
|
|
if (xfd->para.openssl.min_proto_version != NULL) {
|
|
int sslver, rc;
|
|
sslver = _xio_openssl_parse_version(xfd->para.openssl.min_proto_version,
|
|
XIO_OPENSSL_VERSIONGROUP_TLS|XIO_OPENSSL_VERSIONGROUP_DTLS);
|
|
if (sslver < 0)
|
|
return STAT_NORETRY;
|
|
if ((rc = SSL_CTX_set_min_proto_version(ctx, sslver)) <= 0) {
|
|
Debug1("version: %ld", SSL_CTX_get_min_proto_version(ctx));
|
|
Error3("_xioopen_openssl_prepare(): SSL_CTX_set_min_proto_version(\"%s\"->%d): failed (%d)",
|
|
xfd->para.openssl.min_proto_version, sslver, rc);
|
|
return STAT_NORETRY;
|
|
}
|
|
Debug1("version: %ld", SSL_CTX_get_min_proto_version(ctx));
|
|
}
|
|
#endif /* HAVE_SSL_set_min_proto_version || defined(SSL_set_min_proto_version) */
|
|
#if HAVE_SSL_CTX_set_max_proto_version || defined(SSL_CTX_set_max_proto_version)
|
|
if (xfd->para.openssl.max_proto_version != NULL) {
|
|
int sslver;
|
|
sslver = _xio_openssl_parse_version(xfd->para.openssl.max_proto_version,
|
|
XIO_OPENSSL_VERSIONGROUP_TLS|XIO_OPENSSL_VERSIONGROUP_DTLS);
|
|
if (sslver < 0)
|
|
return STAT_NORETRY;
|
|
if (SSL_CTX_set_max_proto_version(ctx, sslver) <= 0) {
|
|
Error2("_xioopen_openssl_prepare(): SSL_CTX_set_max_proto_version(\"%s\"->%d): failed",
|
|
xfd->para.openssl.max_proto_version, sslver);
|
|
return STAT_NORETRY;
|
|
}
|
|
}
|
|
#endif /* HAVE_SSL_set_max_proto_version || defined(SSL_set_max_proto_version) */
|
|
|
|
{
|
|
static unsigned char dh2048_p[] = {
|
|
0x00,0xdc,0x21,0x64,0x56,0xbd,0x9c,0xb2,0xac,0xbe,0xc9,0x98,0xef,0x95,0x3e,
|
|
0x26,0xfa,0xb5,0x57,0xbc,0xd9,0xe6,0x75,0xc0,0x43,0xa2,0x1c,0x7a,0x85,0xdf,
|
|
0x34,0xab,0x57,0xa8,0xf6,0xbc,0xf6,0x84,0x7d,0x05,0x69,0x04,0x83,0x4c,0xd5,
|
|
0x56,0xd3,0x85,0x09,0x0a,0x08,0xff,0xb5,0x37,0xa1,0xa3,0x8a,0x37,0x04,0x46,
|
|
0xd2,0x93,0x31,0x96,0xf4,0xe4,0x0d,0x9f,0xbd,0x3e,0x7f,0x9e,0x4d,0xaf,0x08,
|
|
0xe2,0xe8,0x03,0x94,0x73,0xc4,0xdc,0x06,0x87,0xbb,0x6d,0xae,0x66,0x2d,0x18,
|
|
0x1f,0xd8,0x47,0x06,0x5c,0xcf,0x8a,0xb5,0x00,0x51,0x57,0x9b,0xea,0x1e,0xd8,
|
|
0xdb,0x8e,0x3c,0x1f,0xd3,0x2f,0xba,0x1f,0x5f,0x3d,0x15,0xc1,0x3b,0x2c,0x82,
|
|
0x42,0xc8,0x8c,0x87,0x79,0x5b,0x38,0x86,0x3a,0xeb,0xfd,0x81,0xa9,0xba,0xf7,
|
|
0x26,0x5b,0x93,0xc5,0x3e,0x03,0x30,0x4b,0x00,0x5c,0xb6,0x23,0x3e,0xea,0x94,
|
|
0xc3,0xb4,0x71,0xc7,0x6e,0x64,0x3b,0xf8,0x92,0x65,0xad,0x60,0x6c,0xd4,0x7b,
|
|
0xa9,0x67,0x26,0x04,0xa8,0x0a,0xb2,0x06,0xeb,0xe0,0x7d,0x90,0xdd,0xdd,0xf5,
|
|
0xcf,0xb4,0x11,0x7c,0xab,0xc1,0xa3,0x84,0xbe,0x27,0x77,0xc7,0xde,0x20,0x57,
|
|
0x66,0x47,0xa7,0x35,0xfe,0x0d,0x6a,0x1c,0x52,0xb8,0x58,0xbf,0x26,0x33,0x81,
|
|
0x5e,0xb7,0xa9,0xc0,0xee,0x58,0x11,0x74,0x86,0x19,0x08,0x89,0x1c,0x37,0x0d,
|
|
0x52,0x47,0x70,0x75,0x8b,0xa8,0x8b,0x30,0x11,0x71,0x36,0x62,0xf0,0x73,0x41,
|
|
0xee,0x34,0x9d,0x0a,0x2b,0x67,0x4e,0x6a,0xa3,0xe2,0x99,0x92,0x1b,0xf5,0x32,
|
|
0x73,0x63
|
|
};
|
|
static unsigned char dh2048_g[] = {
|
|
0x02,
|
|
};
|
|
DH *dh;
|
|
BIGNUM *p = NULL, *g = NULL;
|
|
unsigned long err;
|
|
|
|
dh = DH_new();
|
|
p = BN_bin2bn(dh2048_p, sizeof(dh2048_p), NULL);
|
|
g = BN_bin2bn(dh2048_g, sizeof(dh2048_g), NULL);
|
|
if (!dh || !p || !g) {
|
|
if (dh)
|
|
DH_free(dh);
|
|
if (p)
|
|
BN_free(p);
|
|
if (g)
|
|
BN_free(g);
|
|
while (err = ERR_get_error()) {
|
|
Warn1("dh2048 setup(): %s",
|
|
ERR_error_string(err, NULL));
|
|
}
|
|
Error("dh2048 setup failed");
|
|
goto cont_out;
|
|
}
|
|
#if HAVE_DH_set0_pqg
|
|
if (!DH_set0_pqg(dh, p, NULL, g)) {
|
|
DH_free(dh);
|
|
BN_free(p);
|
|
BN_free(g);
|
|
goto cont_out;
|
|
}
|
|
#else
|
|
dh->p = p;
|
|
dh->g = g;
|
|
#endif /* HAVE_DH_set0_pqg */
|
|
if (sycSSL_CTX_set_tmp_dh(ctx, dh) <= 0) {
|
|
while (err = ERR_get_error()) {
|
|
Warn3("SSL_CTX_set_tmp_dh(%p, %p): %s", ctx, dh,
|
|
ERR_error_string(err, NULL));
|
|
}
|
|
Error2("SSL_CTX_set_tmp_dh(%p, %p) failed", ctx, dh);
|
|
}
|
|
/* p & g are freed by DH_free() once attached */
|
|
DH_free(dh);
|
|
cont_out:
|
|
;
|
|
}
|
|
|
|
#if HAVE_TYPE_EC_KEY /* not on Openindiana 5.11 */
|
|
{
|
|
/* see http://openssl.6102.n7.nabble.com/Problem-with-cipher-suite-ECDHE-ECDSA-AES256-SHA384-td42229.html */
|
|
int nid;
|
|
EC_KEY *ecdh;
|
|
|
|
#if 0
|
|
nid = OBJ_sn2nid(ECDHE_CURVE);
|
|
if (nid == NID_undef) {
|
|
Error("openssl: failed to set ECDHE parameters");
|
|
return -1;
|
|
}
|
|
#endif
|
|
nid = NID_X9_62_prime256v1;
|
|
ecdh = EC_KEY_new_by_curve_name(nid);
|
|
if (NULL == ecdh) {
|
|
Error("openssl: failed to set ECDHE parameters");
|
|
return -1;
|
|
}
|
|
|
|
SSL_CTX_set_tmp_ecdh(ctx, ecdh);
|
|
}
|
|
#endif /* HAVE_TYPE_EC_KEY */
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x00908000L
|
|
if (opt_compress) {
|
|
int result;
|
|
result = openssl_setup_compression(ctx, opt_compress);
|
|
if (result != STAT_OK) {
|
|
return result;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#if defined(HAVE_SSL_CTX_clear_mode) || defined(SSL_CTX_clear_mode)
|
|
/* It seems that OpenSSL-1.1.1 presets the mode differently.
|
|
Without correction socat might hang in SSL_read() */
|
|
{
|
|
long mode = 0;
|
|
mode = SSL_CTX_get_mode(ctx);
|
|
if (mode & SSL_MODE_AUTO_RETRY) {
|
|
Info("SSL_CTX mode has SSL_MODE_AUTO_RETRY set. Correcting..");
|
|
Debug1("SSL_CTX_clear_mode(%p, SSL_MODE_AUTO_RETRY)", ctx);
|
|
SSL_CTX_clear_mode(ctx, SSL_MODE_AUTO_RETRY);
|
|
}
|
|
}
|
|
#endif /* defined(HAVE_SSL_CTX_clear_mode) || defined(SSL_CTX_clear_mode) */
|
|
|
|
if (opt_cafile != NULL || opt_capath != NULL) {
|
|
if (sycSSL_CTX_load_verify_locations(ctx, opt_cafile, opt_capath) != 1) {
|
|
int result;
|
|
|
|
if ((result =
|
|
openssl_SSL_ERROR_SSL(E_ERROR, "SSL_CTX_load_verify_locations"))
|
|
!= STAT_OK) {
|
|
/*! free ctx */
|
|
return STAT_RETRYLATER;
|
|
}
|
|
}
|
|
#ifdef HAVE_SSL_CTX_set_default_verify_paths
|
|
} else {
|
|
SSL_CTX_set_default_verify_paths(ctx);
|
|
#endif
|
|
}
|
|
|
|
if (opt_cert) {
|
|
BIO *bio;
|
|
DH *dh;
|
|
|
|
if (sycSSL_CTX_use_certificate_chain_file(ctx, opt_cert) <= 0) {
|
|
/*! trace functions */
|
|
/*0 ERR_print_errors_fp(stderr);*/
|
|
if (ERR_peek_error() == 0)
|
|
Error2("SSL_CTX_use_certificate_file(%p, \"%s\", SSL_FILETYPE_PEM) failed",
|
|
ctx, opt_cert);
|
|
while (err = ERR_get_error()) {
|
|
Error1("SSL_CTX_use_certificate_file(): %s",
|
|
ERR_error_string(err, NULL));
|
|
}
|
|
return STAT_RETRYLATER;
|
|
}
|
|
|
|
if (sycSSL_CTX_use_PrivateKey_file(ctx, opt_key?opt_key:opt_cert, SSL_FILETYPE_PEM) <= 0) {
|
|
/*ERR_print_errors_fp(stderr);*/
|
|
openssl_SSL_ERROR_SSL(E_ERROR/*!*/, "SSL_CTX_use_PrivateKey_file");
|
|
return STAT_RETRYLATER;
|
|
}
|
|
|
|
if (opt_dhparam == NULL) {
|
|
opt_dhparam = (char *)opt_cert;
|
|
}
|
|
if ((bio = sycBIO_new_file(opt_dhparam, "r")) == NULL) {
|
|
Warn2("BIO_new_file(\"%s\", \"r\"): %s",
|
|
opt_dhparam, strerror(errno));
|
|
} else {
|
|
if ((dh = sycPEM_read_bio_DHparams(bio, NULL, NULL, NULL)) == NULL) {
|
|
Info1("PEM_read_bio_DHparams(%p, NULL, NULL, NULL): error", bio);
|
|
} else {
|
|
BIO_free(bio);
|
|
if (sycSSL_CTX_set_tmp_dh(ctx, dh) <= 0) {
|
|
while (err = ERR_get_error()) {
|
|
Warn3("SSL_CTX_set_tmp_dh(%p, %p): %s", ctx, dh,
|
|
ERR_error_string(err, NULL));
|
|
}
|
|
Error2("SSL_CTX_set_tmp_dh(%p, %p): error", ctx, dh);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/* set pre openssl-connect options */
|
|
/* SSL_CIPHERS */
|
|
if (ci_str != NULL) {
|
|
if (sycSSL_CTX_set_cipher_list(ctx, ci_str) <= 0) {
|
|
if (ERR_peek_error() == 0)
|
|
Error1("SSL_set_cipher_list(, \"%s\") failed", ci_str);
|
|
while (err = ERR_get_error()) {
|
|
Error2("SSL_set_cipher_list(, \"%s\"): %s",
|
|
ci_str, ERR_error_string(err, NULL));
|
|
}
|
|
/*Error("SSL_new()");*/
|
|
return STAT_RETRYLATER;
|
|
}
|
|
}
|
|
|
|
if (*opt_ver) {
|
|
sycSSL_CTX_set_verify(ctx,
|
|
SSL_VERIFY_PEER| SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
|
|
NULL);
|
|
Warn("OpenSSL: Warning: this implementation does not check CRLs");
|
|
} else {
|
|
sycSSL_CTX_set_verify(ctx,
|
|
SSL_VERIFY_NONE,
|
|
NULL);
|
|
}
|
|
|
|
return STAT_OK;
|
|
}
|
|
|
|
|
|
/* analyses an OpenSSL error condition, prints the appropriate messages with
|
|
severity 'level' and returns one of STAT_OK, STAT_RETRYLATER, or
|
|
STAT_NORETRY */
|
|
static int openssl_SSL_ERROR_SSL(int level, const char *funcname) {
|
|
unsigned long e;
|
|
char buf[120]; /* this value demanded by "man ERR_error_string" */
|
|
int stat = STAT_OK;
|
|
|
|
while (e = ERR_get_error()) {
|
|
Debug1("ERR_get_error(): %lx", e);
|
|
if
|
|
(
|
|
#if defined(OPENSSL_IS_BORINGSSL)
|
|
0 /* BoringSSL's RNG always succeeds. */
|
|
#elif defined(HAVE_RAND_status)
|
|
ERR_GET_LIB(e) == ERR_LIB_RAND && RAND_status() != 1
|
|
#else
|
|
e == ((ERR_LIB_RAND<<24)|
|
|
#if defined(RAND_F_RAND_BYTES)
|
|
(RAND_F_RAND_BYTES<<12)|
|
|
#else
|
|
(RAND_F_SSLEAY_RAND_BYTES<<12)|
|
|
#endif
|
|
(RAND_R_PRNG_NOT_SEEDED)) /*0x24064064*/
|
|
#endif
|
|
)
|
|
{
|
|
Error("too few entropy; use options \"egd\" or \"pseudo\"");
|
|
stat = STAT_NORETRY;
|
|
} else {
|
|
Msg2(level, "%s(): %s", funcname, ERR_error_string(e, buf));
|
|
stat = level==E_ERROR ? STAT_NORETRY : STAT_RETRYLATER;
|
|
}
|
|
}
|
|
return stat;
|
|
}
|
|
|
|
static const char *openssl_verify_messages[] = {
|
|
/* 0 */ "ok",
|
|
/* 1 */ NULL,
|
|
/* 2 */ "unable to get issuer certificate",
|
|
/* 3 */ "unable to get certificate CRL",
|
|
/* 4 */ "unable to decrypt certificate's signature",
|
|
/* 5 */ "unable to decrypt CRL's signature",
|
|
/* 6 */ "unable to decode issuer public key",
|
|
/* 7 */ "certificate signature failure",
|
|
/* 8 */ "CRL signature failure",
|
|
/* 9 */ "certificate is not yet valid",
|
|
/* 10 */ "certificate has expired",
|
|
/* 11 */ "CRL is not yet valid",
|
|
/* 12 */ "CRL has expired",
|
|
/* 13 */ "format error in certificate's notBefore field",
|
|
/* 14 */ "format error in certificate's notAfter field",
|
|
/* 15 */ "format error in CRL's lastUpdate field",
|
|
/* 16 */ "format error in CRL's nextUpdate field",
|
|
/* 17 */ "out of memory",
|
|
/* 18 */ "self signed certificate",
|
|
/* 19 */ "self signed certificate in certificate chain",
|
|
/* 20 */ "unable to get local issuer certificate",
|
|
/* 21 */ "unable to verify the first certificate",
|
|
/* 22 */ "certificate chain too long",
|
|
/* 23 */ "certificate revoked",
|
|
/* 24 */ "invalid CA certificate",
|
|
/* 25 */ "path length constraint exceeded",
|
|
/* 26 */ "unsupported certificate purpose",
|
|
/* 27 */ "certificate not trusted",
|
|
/* 28 */ "certificate rejected",
|
|
/* 29 */ "subject issuer mismatch",
|
|
/* 30 */ "authority and subject key identifier mismatch",
|
|
/* 31 */ "authority and issuer serial number mismatch",
|
|
/* 32 */ "key usage does not include certificate signing",
|
|
/* 33 */ NULL,
|
|
/* 34 */ NULL,
|
|
/* 35 */ NULL,
|
|
/* 36 */ NULL,
|
|
/* 37 */ NULL,
|
|
/* 38 */ NULL,
|
|
/* 39 */ NULL,
|
|
/* 40 */ NULL,
|
|
/* 41 */ NULL,
|
|
/* 42 */ NULL,
|
|
/* 43 */ NULL,
|
|
/* 44 */ NULL,
|
|
/* 45 */ NULL,
|
|
/* 46 */ NULL,
|
|
/* 47 */ NULL,
|
|
/* 48 */ NULL,
|
|
/* 49 */ NULL,
|
|
/* 50 */ "application verification failure",
|
|
} ;
|
|
|
|
|
|
/* delete all environment variables whose name begins with SOCAT_OPENSSL_
|
|
resp. <progname>_OPENSSL_ */
|
|
static int openssl_delete_cert_info(void) {
|
|
# define XIO_ENVNAMELEN 256
|
|
const char *progname;
|
|
char envprefix[XIO_ENVNAMELEN];
|
|
char envname[XIO_ENVNAMELEN];
|
|
size_t i, l;
|
|
const char **entry;
|
|
|
|
progname = diag_get_string('p');
|
|
envprefix[0] = '\0'; strncat(envprefix, progname, XIO_ENVNAMELEN-1);
|
|
l = strlen(envprefix);
|
|
for (i = 0; i < l; ++i) envprefix[i] = toupper((unsigned char)envprefix[i]);
|
|
strncat(envprefix+l, "_OPENSSL_", XIO_ENVNAMELEN-l-1);
|
|
|
|
#if HAVE_VAR_ENVIRON
|
|
entry = (const char **)environ;
|
|
while (*entry != NULL) {
|
|
if (!strncmp(*entry, envprefix, strlen(envprefix))) {
|
|
const char *eq = strchr(*entry, '=');
|
|
if (eq == NULL) eq = *entry + strlen(*entry);
|
|
envname[0] = '\0'; strncat(envname, *entry, eq-*entry);
|
|
#if HAVE_UNSETENV
|
|
Unsetenv(envname);
|
|
#endif
|
|
} else {
|
|
++entry;
|
|
}
|
|
}
|
|
#endif /* HAVE_VAR_ENVIRON */
|
|
return 0;
|
|
}
|
|
|
|
/* read in the "name" information (from field "issuer" or "subject") and
|
|
create environment variable with complete info, eg:
|
|
SOCAT_OPENSSL_X509_SUBJECT */
|
|
static int openssl_setenv_cert_name(const char *field, X509_NAME *name) {
|
|
BIO *bio = BIO_new(BIO_s_mem());
|
|
char *buf = NULL, *str;
|
|
size_t len;
|
|
X509_NAME_print_ex(bio, name, 0, XN_FLAG_ONELINE&~ASN1_STRFLGS_ESC_MSB); /* rc not documented */
|
|
len = BIO_get_mem_data (bio, &buf);
|
|
if ((str = Malloc(len+1)) == NULL) {
|
|
BIO_free(bio);
|
|
return -1;
|
|
}
|
|
memcpy(str, buf, len);
|
|
str[len] = '\0';
|
|
Info2("SSL peer cert %s: \"%s\"", field, str);
|
|
xiosetenv2("OPENSSL_X509", field, str, 1, NULL);
|
|
free(str);
|
|
BIO_free(bio);
|
|
return 0;
|
|
}
|
|
|
|
/* read in the "name" information (from field "issuer" or "subject") and
|
|
create environment variables with the fields, eg:
|
|
SOCAT_OPENSSL_X509_COMMONNAME
|
|
*/
|
|
static int openssl_setenv_cert_fields(const char *field, X509_NAME *name) {
|
|
int n, i;
|
|
n = X509_NAME_entry_count(name);
|
|
/* extract fields of cert name */
|
|
for (i = 0; i < n; ++i) {
|
|
X509_NAME_ENTRY *entry;
|
|
ASN1_OBJECT *obj;
|
|
ASN1_STRING *data;
|
|
const unsigned char *text;
|
|
int nid;
|
|
entry = X509_NAME_get_entry(name, i);
|
|
obj = X509_NAME_ENTRY_get_object(entry);
|
|
data = X509_NAME_ENTRY_get_data(entry);
|
|
nid = OBJ_obj2nid(obj);
|
|
#if HAVE_ASN1_STRING_get0_data
|
|
text = ASN1_STRING_get0_data(data);
|
|
#else
|
|
text = ASN1_STRING_data(data);
|
|
#endif
|
|
Debug3("SSL peer cert %s entry: %s=\"%s\"", (field[0]?field:"subject"), OBJ_nid2ln(nid), text);
|
|
if (field != NULL && field[0] != '\0') {
|
|
xiosetenv3("OPENSSL_X509", field, OBJ_nid2ln(nid), (const char *)text, 2, " // ");
|
|
} else {
|
|
xiosetenv2("OPENSSL_X509", OBJ_nid2ln(nid), (const char *)text, 2, " // ");
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* compares the peername used/provided by the client to cn as extracted from
|
|
the peer certificate.
|
|
supports wildcard cn like *.domain which matches domain and
|
|
host.domain
|
|
returns true on match */
|
|
static bool openssl_check_name(const char *nametype, const char *cn, const char *peername) {
|
|
const char *dotp;
|
|
if (peername == NULL) {
|
|
Info2("%s \"%s\": no peername", nametype, cn);
|
|
return false;
|
|
} else if (peername[0] == '\0') {
|
|
Info2("%s \"%s\": matched by empty peername", nametype, cn);
|
|
return true;
|
|
}
|
|
if (! (cn[0] == '*' && cn[1] == '.')) {
|
|
/* normal server name - this is simple */
|
|
if (strcmp(cn, peername) == 0) {
|
|
Debug3("%s \"%s\" matches peername \"%s\"", nametype, cn, peername);
|
|
return true;
|
|
} else {
|
|
Info3("%s \"%s\" does not match peername \"%s\"", nametype, cn, peername);
|
|
return false;
|
|
}
|
|
}
|
|
/* wildcard cert */
|
|
Debug2("%s \"%s\" is a wildcard name", nametype, cn);
|
|
/* case: just the base domain */
|
|
if (strcmp(cn+2, peername) == 0) {
|
|
Debug3("wildcard %s \"%s\" matches base domain \"%s\"", nametype, cn, peername);
|
|
return true;
|
|
}
|
|
/* case: subdomain; only one level! */
|
|
dotp = strchr(peername, '.');
|
|
if (dotp == NULL) {
|
|
Info2("peername \"%s\" is not a subdomain, thus is not matched by wildcard commonName \"%s\"",
|
|
peername, cn);
|
|
return false;
|
|
}
|
|
if (strcmp(cn+1, dotp) != 0) {
|
|
Info3("%s \"%s\" does not match subdomain peername \"%s\"", nametype, cn, peername);
|
|
return false;
|
|
}
|
|
Debug3("%s \"%s\" matches subdomain peername \"%s\"", nametype, cn, peername);
|
|
return true;
|
|
}
|
|
|
|
/* retrieves the commonName field and compares it to the peername
|
|
returns true on match, false otherwise */
|
|
static bool openssl_check_peername(X509_NAME *name, const char *peername) {
|
|
int ind = -1;
|
|
X509_NAME_ENTRY *entry;
|
|
ASN1_STRING *data;
|
|
const unsigned char *text;
|
|
ind = X509_NAME_get_index_by_NID(name, NID_commonName, -1);
|
|
if (ind < 0) {
|
|
Info("no COMMONNAME field in peer certificate");
|
|
return false;
|
|
}
|
|
entry = X509_NAME_get_entry(name, ind);
|
|
data = X509_NAME_ENTRY_get_data(entry);
|
|
#if HAVE_ASN1_STRING_get0_data
|
|
text = ASN1_STRING_get0_data(data);
|
|
#else
|
|
text = ASN1_STRING_data(data);
|
|
#endif
|
|
return openssl_check_name("commonName", (const char *)text, peername);
|
|
}
|
|
|
|
/* retrieves certificate provided by peer, sets env vars containing
|
|
certificates field values, and checks peername if provided by
|
|
calling function */
|
|
/* parts of this code were copied from Gene Spaffords C/C++ Secure Programming at Etutorials.org:
|
|
http://etutorials.org/Programming/secure+programming/Chapter+10.+Public+Key+Infrastructure/10.8+Adding+Hostname+Checking+to+Certificate+Verification/
|
|
The code examples in this tutorial do not seem to have explicit license restrictions.
|
|
*/
|
|
/* peername is, with OpenSSL client, the server name, or the value of option
|
|
commonname if provided;
|
|
With OpenSSL server, it is the value of option commonname */
|
|
static int openssl_handle_peer_certificate(struct single *xfd,
|
|
const char *peername,
|
|
bool opt_ver, int level) {
|
|
X509 *peer_cert;
|
|
X509_NAME *subjectname, *issuername;
|
|
/*ASN1_TIME not_before, not_after;*/
|
|
int extcount, i, ok = 0;
|
|
int status;
|
|
|
|
if ((peer_cert = SSL_get_peer_certificate(xfd->para.openssl.ssl)) == NULL) {
|
|
if (opt_ver) {
|
|
Msg(level, "no peer certificate");
|
|
status = STAT_RETRYLATER;
|
|
} else {
|
|
Notice("no peer certificate and no check");
|
|
status = STAT_OK;
|
|
}
|
|
return status;
|
|
}
|
|
|
|
/* verify peer certificate (trust, signature, validity dates) */
|
|
if (opt_ver) {
|
|
long verify_result;
|
|
if ((verify_result = sycSSL_get_verify_result(xfd->para.openssl.ssl)) != X509_V_OK) {
|
|
const char *message = NULL;
|
|
if (verify_result >= 0 &&
|
|
(size_t)verify_result <
|
|
sizeof(openssl_verify_messages)/sizeof(char*)) {
|
|
message = openssl_verify_messages[verify_result];
|
|
}
|
|
if (message) {
|
|
Msg1(level, "%s", message);
|
|
} else {
|
|
Msg1(level, "rejected peer certificate with error %ld", verify_result);
|
|
}
|
|
status = STAT_RETRYLATER;
|
|
X509_free(peer_cert);
|
|
return STAT_RETRYLATER;
|
|
}
|
|
Info("peer certificate is trusted");
|
|
}
|
|
|
|
/* set env vars from cert's subject and issuer values */
|
|
if ((subjectname = X509_get_subject_name(peer_cert)) != NULL) {
|
|
openssl_setenv_cert_name("subject", subjectname);
|
|
openssl_setenv_cert_fields("", subjectname);
|
|
/*! I'd like to provide dates too; see
|
|
http://markmail.org/message/yi4vspp7aeu3xwtu#query:+page:1+mid:jhnl4wklif3pgzqf+state:results */
|
|
}
|
|
if ((issuername = X509_get_issuer_name(peer_cert)) != NULL) {
|
|
openssl_setenv_cert_name("issuer", issuername);
|
|
}
|
|
|
|
if (!opt_ver) {
|
|
Notice("option openssl-verify disabled, no check of certificate");
|
|
X509_free(peer_cert);
|
|
return STAT_OK;
|
|
}
|
|
|
|
/* check peername against cert's subjectAltName DNS entries */
|
|
/* this code is based on example from Gerhard Gappmeier in
|
|
http://openssl.6102.n7.nabble.com/How-to-extract-subjectAltName-td17236.html
|
|
and the GEN_IPADD from
|
|
http://openssl.6102.n7.nabble.com/reading-IP-addresses-from-Subject-Alternate-Name-extension-td29245.html
|
|
*/
|
|
if ((extcount = X509_get_ext_count(peer_cert)) > 0) {
|
|
for (i = 0; !ok && i < extcount; ++i) {
|
|
const char *extstr;
|
|
X509_EXTENSION *ext;
|
|
const X509V3_EXT_METHOD *meth;
|
|
ext = X509_get_ext(peer_cert, i);
|
|
extstr = OBJ_nid2sn(OBJ_obj2nid(X509_EXTENSION_get_object(ext)));
|
|
if (!strcasecmp(extstr, "subjectAltName")) {
|
|
void *names;
|
|
if (!(meth = X509V3_EXT_get(ext))) break;
|
|
names = X509_get_ext_d2i(peer_cert, NID_subject_alt_name, NULL, NULL);
|
|
if (names) {
|
|
int numalts;
|
|
int i;
|
|
|
|
/* get amount of alternatives, RFC2459 claims there MUST be at least one, but we don't depend on it... */
|
|
numalts = sk_GENERAL_NAME_num ( names );
|
|
/* loop through all alternatives */
|
|
for (i = 0; i < numalts; ++i) {
|
|
/* get a handle to alternative name number i */
|
|
const GENERAL_NAME *pName = sk_GENERAL_NAME_value (names, i);
|
|
unsigned char *pBuffer;
|
|
switch (pName->type) {
|
|
|
|
case GEN_DNS:
|
|
ASN1_STRING_to_UTF8(&pBuffer, pName->d.ia5);
|
|
xiosetenv("OPENSSL_X509V3_SUBJECTALTNAME_DNS", (char *)pBuffer, 2, " // ");
|
|
if (peername != NULL &&
|
|
openssl_check_name("subjectAltName", (char *)pBuffer, /*const char*/peername)) {
|
|
ok = 1;
|
|
}
|
|
OPENSSL_free(pBuffer);
|
|
break;
|
|
|
|
case GEN_IPADD:
|
|
{
|
|
/* binary address format */
|
|
const unsigned char *data = pName->d.iPAddress->data;
|
|
size_t len = pName->d.iPAddress->length;
|
|
char aBuffer[INET6_ADDRSTRLEN]; /* canonical peername */
|
|
struct in6_addr ip6bin;
|
|
|
|
switch (len) {
|
|
case 4: /* IPv4 */
|
|
snprintf(aBuffer, sizeof(aBuffer), "%u.%u.%u.%u", data[0], data[1], data[2], data[3]);
|
|
if (peername != NULL &&
|
|
openssl_check_name("subjectAltName", aBuffer, /*const char*/peername)) {
|
|
ok = 1;
|
|
}
|
|
break;
|
|
#if WITH_IP6
|
|
case 16: /* IPv6 */
|
|
inet_ntop(AF_INET6, data, aBuffer, sizeof(aBuffer));
|
|
if (peername != NULL) {
|
|
xioip6_pton(peername, &ip6bin);
|
|
if (memcmp(data, &ip6bin, sizeof(ip6bin)) == 0) {
|
|
Debug2("subjectAltName \"%s\" matches peername \"%s\"",
|
|
aBuffer, peername);
|
|
ok = 1;
|
|
} else {
|
|
Info2("subjectAltName \"%s\" does not match peername \"%s\"",
|
|
aBuffer, peername);
|
|
}
|
|
}
|
|
break;
|
|
#endif
|
|
}
|
|
xiosetenv("OPENSSL_X509V3_SUBJECTALTNAME_IPADD", (char *)aBuffer, 2, " // ");
|
|
}
|
|
break;
|
|
default: Warn3("Unknown subject type %d (GEN_DNS=%d, GEN_IPADD=%d",
|
|
pName->type, GEN_DNS, GEN_IPADD);
|
|
continue;
|
|
}
|
|
if (ok) { break; }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ok) {
|
|
Notice("trusting certificate, commonName matches");
|
|
X509_free(peer_cert);
|
|
return STAT_OK;
|
|
}
|
|
|
|
if (peername == NULL || peername[0] == '\0') {
|
|
Notice("trusting certificate, no check of commonName");
|
|
X509_free(peer_cert);
|
|
return STAT_OK;
|
|
}
|
|
|
|
/* here: all envs set; opt_ver, cert verified, no subjAltName match -> check subject CN */
|
|
if (!openssl_check_peername(/*X509_NAME*/subjectname, /*const char*/peername)) {
|
|
Error1("certificate is valid but its commonName does not match hostname \"%s\"",
|
|
peername);
|
|
status = STAT_NORETRY;
|
|
} else {
|
|
Notice("trusting certificate, commonName matches");
|
|
status = STAT_OK;
|
|
}
|
|
X509_free(peer_cert);
|
|
return status;
|
|
}
|
|
|
|
static int xioSSL_set_fd(struct single *xfd, int level) {
|
|
unsigned long err;
|
|
|
|
/* assign a network connection to the SSL object */
|
|
if (sycSSL_set_fd(xfd->para.openssl.ssl, xfd->fd) <= 0) {
|
|
Msg(level, "SSL_set_fd() failed");
|
|
while (err = ERR_get_error()) {
|
|
Msg2(level, "SSL_set_fd(, %d): %s",
|
|
xfd->fd, ERR_error_string(err, NULL));
|
|
}
|
|
return STAT_RETRYLATER;
|
|
}
|
|
return STAT_OK;
|
|
}
|
|
|
|
|
|
/* ...
|
|
in case of an error condition, this function check forever and retry
|
|
options and ev. sleeps an interval. It returns NORETRY when the caller
|
|
should not retry for any reason. */
|
|
static int xioSSL_connect(struct single *xfd, const char *opt_commonname,
|
|
bool opt_ver, int level) {
|
|
char error_string[120];
|
|
int errint, status, ret;
|
|
unsigned long err;
|
|
|
|
/* connect via SSL by performing handshake */
|
|
if ((ret = sycSSL_connect(xfd->para.openssl.ssl)) <= 0) {
|
|
/*if (ERR_peek_error() == 0) Msg(level, "SSL_connect() failed");*/
|
|
errint = SSL_get_error(xfd->para.openssl.ssl, ret);
|
|
switch (errint) {
|
|
case SSL_ERROR_NONE:
|
|
/* this is not an error, but I dare not continue for security reasons*/
|
|
Msg(level, "ok");
|
|
status = STAT_RETRYLATER;
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
Msg(level, "connection closed (wrong version number?)");
|
|
status = STAT_RETRYLATER;
|
|
break;
|
|
case SSL_ERROR_WANT_READ:
|
|
case SSL_ERROR_WANT_WRITE:
|
|
case SSL_ERROR_WANT_CONNECT:
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
Msg(level, "nonblocking operation did not complete");
|
|
status = STAT_RETRYLATER;
|
|
break; /*!*/
|
|
case SSL_ERROR_SYSCALL:
|
|
if (ERR_peek_error() == 0) {
|
|
if (ret == 0) {
|
|
Msg(level, "SSL_connect(): socket closed by peer");
|
|
} else if (ret == -1) {
|
|
Msg1(level, "SSL_connect(): %s", strerror(errno));
|
|
}
|
|
} else {
|
|
Msg(level, "I/O error"); /*!*/
|
|
while (err = ERR_get_error()) {
|
|
ERR_error_string_n(err, error_string, sizeof(error_string));
|
|
Msg4(level, "SSL_connect(): %s / %s / %s / %s", error_string,
|
|
ERR_lib_error_string(err), ERR_func_error_string(err),
|
|
ERR_reason_error_string(err));
|
|
}
|
|
}
|
|
status = STAT_RETRYLATER;
|
|
break;
|
|
case SSL_ERROR_SSL:
|
|
status = openssl_SSL_ERROR_SSL(level, "SSL_connect");
|
|
if (openssl_handle_peer_certificate(xfd, opt_commonname, opt_ver, level/*!*/) < 0) {
|
|
return STAT_RETRYLATER;
|
|
}
|
|
break;
|
|
default:
|
|
Msg(level, "unknown error");
|
|
status = STAT_RETRYLATER;
|
|
break;
|
|
}
|
|
return status;
|
|
}
|
|
return STAT_OK;
|
|
}
|
|
|
|
/* on result < 0: errno is set (at least to EIO) */
|
|
ssize_t xioread_openssl(struct single *pipe, void *buff, size_t bufsiz) {
|
|
unsigned long err;
|
|
char error_string[120];
|
|
int _errno = EIO; /* if we have no better idea about nature of error */
|
|
int errint, ret;
|
|
|
|
ret = sycSSL_read(pipe->para.openssl.ssl, buff, bufsiz);
|
|
if (ret < 0) {
|
|
errint = SSL_get_error(pipe->para.openssl.ssl, ret);
|
|
switch (errint) {
|
|
case SSL_ERROR_NONE:
|
|
/* this is not an error, but I dare not continue for security reasons*/
|
|
Error("ok");
|
|
break;
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
Error("connection closed by peer");
|
|
break;
|
|
case SSL_ERROR_WANT_READ:
|
|
case SSL_ERROR_WANT_WRITE:
|
|
case SSL_ERROR_WANT_CONNECT:
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
Info("nonblocking operation did not complete");
|
|
errno = EAGAIN;
|
|
return -1;
|
|
case SSL_ERROR_SYSCALL:
|
|
if (ERR_peek_error() == 0) {
|
|
if (ret == 0) {
|
|
Error("SSL_read(): socket closed by peer");
|
|
} else if (ret == -1) {
|
|
_errno = errno;
|
|
Error1("SSL_read(): %s", strerror(errno));
|
|
}
|
|
} else {
|
|
Error("I/O error"); /*!*/
|
|
while (err = ERR_get_error()) {
|
|
ERR_error_string_n(err, error_string, sizeof(error_string));
|
|
Error4("SSL_read(): %s / %s / %s / %s", error_string,
|
|
ERR_lib_error_string(err), ERR_func_error_string(err),
|
|
ERR_reason_error_string(err));
|
|
}
|
|
}
|
|
break;
|
|
case SSL_ERROR_SSL:
|
|
openssl_SSL_ERROR_SSL(E_ERROR, "SSL_read");
|
|
break;
|
|
default:
|
|
Error("unknown error");
|
|
break;
|
|
}
|
|
errno = _errno;
|
|
return -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
ssize_t xiopending_openssl(struct single *pipe) {
|
|
int bytes = sycSSL_pending(pipe->para.openssl.ssl);
|
|
return bytes;
|
|
}
|
|
|
|
/* on result < 0: errno is set (at least to EIO) */
|
|
ssize_t xiowrite_openssl(struct single *pipe, const void *buff, size_t bufsiz) {
|
|
unsigned long err;
|
|
char error_string[120];
|
|
int _errno = EIO; /* if we have no better idea about nature of error */
|
|
int errint, ret;
|
|
|
|
ret = sycSSL_write(pipe->para.openssl.ssl, buff, bufsiz);
|
|
if (ret < 0) {
|
|
errint = SSL_get_error(pipe->para.openssl.ssl, ret);
|
|
switch (errint) {
|
|
case SSL_ERROR_NONE:
|
|
/* this is not an error, but I dare not continue for security reasons*/
|
|
Error("ok");
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
Error("connection closed by peer");
|
|
break;
|
|
case SSL_ERROR_WANT_READ:
|
|
case SSL_ERROR_WANT_WRITE:
|
|
case SSL_ERROR_WANT_CONNECT:
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
Error("nonblocking operation did not complete");
|
|
break; /*!*/
|
|
case SSL_ERROR_SYSCALL:
|
|
if (ERR_peek_error() == 0) {
|
|
if (ret == 0) {
|
|
Error("SSL_write(): socket closed by peer");
|
|
} else if (ret == -1) {
|
|
_errno = errno;
|
|
Error1("SSL_write(): %s", strerror(errno));
|
|
}
|
|
} else {
|
|
Error("I/O error"); /*!*/
|
|
while (err = ERR_get_error()) {
|
|
ERR_error_string_n(err, error_string, sizeof(error_string));
|
|
Error4("SSL_write(): %s / %s / %s / %s", error_string,
|
|
ERR_lib_error_string(err), ERR_func_error_string(err),
|
|
ERR_reason_error_string(err));
|
|
}
|
|
}
|
|
break;
|
|
case SSL_ERROR_SSL:
|
|
openssl_SSL_ERROR_SSL(E_ERROR, "SSL_write");
|
|
break;
|
|
default:
|
|
Error("unknown error");
|
|
break;
|
|
}
|
|
errno = _errno;
|
|
return -1;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int xioshutdown_openssl(struct single *sfd, int how)
|
|
{
|
|
int rc;
|
|
|
|
if ((rc = sycSSL_shutdown(sfd->para.openssl.ssl)) < 0) {
|
|
Warn1("xioshutdown_openssl(): SSL_shutdown() -> %d", rc);
|
|
}
|
|
if (sfd->tag == XIO_TAG_WRONLY) {
|
|
char buff[1];
|
|
/* give peer time to read all data before closing socket */
|
|
xioread_openssl(sfd, buff, 1);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#endif /* WITH_OPENSSL */
|