2 * Verify established TLS connections.
4 * Copyright (C) 2011-2013 Simon Ruderich
6 * This program is free software: you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation, either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include <gnutls/x509.h>
29 static int get_certificate_path(const char *format,
30 const char *hostname, char *buffer, size_t size);
33 int verify_tls_connection(gnutls_session_t session, const char *hostname) {
35 char path[TLSPROXY_MAX_PATH_LENGTH];
39 gnutls_x509_crt_t cert;
40 const gnutls_datum_t *cert_list;
41 unsigned int cert_list_size;
43 char buffer[66]; /* one line in a PEM file is 64 bytes + '\n' + '\0' */
44 char server_cert[8192];
45 char stored_cert[8192];
47 result = gnutls_certificate_verify_peers2(session, &status);
48 /* Verification failed (!= invalid certificate but worse), no need for any
52 "verify_tls_connection(): gnutls_certificate_verify_peers2() failed: %s",
53 gnutls_strerror(result));
56 /* Definitely an invalid certificate, abort. */
57 if (status & GNUTLS_CERT_EXPIRED
58 || status & GNUTLS_CERT_REVOKED
59 || status & GNUTLS_CERT_NOT_ACTIVATED
60 || status & GNUTLS_CERT_INSECURE_ALGORITHM) {
62 "verify_tls_connection(): invalid server certificate");
66 /* We only handle X509 certificates for now. Let validation fail to
67 * prevent an attacker from changing the certificate type to prevent
69 if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
71 "verify_tls_connection(): no X509 server certificate");
75 /* Get server certificate. */
77 result = gnutls_x509_crt_init(&cert);
80 "verify_tls_connection(): gnutls_x509_crt_init() failed: %s",
81 gnutls_strerror(result));
85 cert_list = gnutls_certificate_get_peers(session, &cert_list_size);
86 if (cert_list == NULL) {
88 "verify_tls_connection(): gnutls_certificate_get_peers() failed");
89 gnutls_x509_crt_deinit(cert);
93 result = gnutls_x509_crt_import(cert, &cert_list[0], GNUTLS_X509_FMT_DER);
96 "verify_tls_connection(): gnutls_x509_crt_import() failed: %s",
97 gnutls_strerror(result));
98 gnutls_x509_crt_deinit(cert);
102 /* Export the certificate as PEM to compare it with the known certificate
104 size = sizeof(server_cert);
105 result = gnutls_x509_crt_export(cert, GNUTLS_X509_FMT_PEM,
107 if (result != GNUTLS_E_SUCCESS) {
109 "verify_tls_connection(): gnutls_x509_crt_export() failed: %s",
110 gnutls_strerror(result));
111 gnutls_x509_crt_deinit(cert);
114 /* We got the certificate as PEM, free the crt struct. */
115 gnutls_x509_crt_deinit(cert);
117 /* Open stored server certificate file. */
118 if (server_certificate_file(&file, hostname, path, sizeof(path)) != 0) {
119 LOG(LOG_DEBUG, "server certificate:\n%s", server_cert);
124 stored_cert[0] = '\0'; /* for strcat() */
126 while (fgets(buffer, sizeof(buffer), file) != NULL) {
127 size += strlen(buffer);
128 /* Make sure the buffer is big enough. */
129 if (size >= sizeof(stored_cert)) {
130 LOG(LOG_WARNING, "verify_tls_connection(): '%s' too big", path);
133 LOG(LOG_DEBUG, "server certificate:\n%s", server_cert);
137 strcat(stored_cert, buffer);
142 "verify_tls_connection(): failed to read from '%s': %s",
143 path, strerror(errno));
145 LOG(LOG_DEBUG, "server certificate:\n%s", server_cert);
150 /* Check if the server certificate matches our stored certificate. */
151 if (strcmp(stored_cert, server_cert)) {
153 "verify_tls_connection(): server certificate changed!",
154 path, strerror(errno));
156 LOG(LOG_WARNING, "server certificate:\n%s", server_cert);
160 /* Check that the proxy certificate file exists and is readable for this
161 * domain. This ensures we send an "invalid" certificate even if the proxy
162 * certificate doesn't exist. */
163 if (proxy_certificate_path(hostname, path, sizeof(path)) != 0) {
166 file = fopen(path, "r");
169 "verify_tls_connection(): proxy certificate doesn't exist: '%s'",
179 static int get_certificate_path(const char *format,
180 const char *hostname, char *buffer, size_t size) {
183 /* Hostname too long. */
184 if (size - strlen(format) <= strlen(hostname)) {
186 "get_certificate_path(): hostname too long: '%s'",
190 /* Try to prevent path traversals in hostnames. */
191 if (strstr(hostname, "..") != NULL) {
193 "get_certificate_path(): possible path traversal: '%s'",
197 /* Safe as format is no user input. */
198 result = snprintf(buffer, size, format, hostname);
200 LOG_PERROR(LOG_ERROR, "get_certificate_path(): snprintf failed");
202 } else if ((size_t)result >= size) {
203 LOG(LOG_ERROR, "get_certificate_path(): snprintf buffer too short");
210 int proxy_certificate_path(const char *hostname, char *path, size_t size) {
211 return get_certificate_path(PROXY_SERVER_CERT_FORMAT,
212 hostname, path, size);
215 int server_certificate_file(FILE **file, const char *hostname,
216 char *path, size_t size) {
217 if (get_certificate_path(STORED_SERVER_CERT_FORMAT,
218 hostname, path, size) != 0) {
219 LOG_PERROR(LOG_ERROR,
220 "server_certificate_file(): failed to get path");
224 /* Open the stored certificate file. */
225 *file = fopen(path, "rb");
227 if (global_passthrough_unknown) {
229 "server_certificate_file(): failed to open '%s': %s",
230 path, strerror(errno));
233 "server_certificate_file(): failed to open '%s': %s",
234 path, strerror(errno));
236 /* Couldn't open the file, special case. */