/*
* Verify established TLS connections.
*
- * Copyright (C) 2011 Simon Ruderich
+ * Copyright (C) 2011-2013 Simon Ruderich
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
#include "tlsproxy.h"
#include "verify.h"
-/* errno */
#include <errno.h>
-/* gnutls_x509_*() */
+
#include <gnutls/x509.h>
int verify_tls_connection(gnutls_session_t session, const char *hostname) {
int result;
- char path[1024];
+ char path[TLSPROXY_MAX_PATH_LENGTH];
size_t size;
unsigned int status;
result = gnutls_certificate_verify_peers2(session, &status);
/* Verification failed (!= invalid certificate but worse), no need for any
* more checks. */
- if (0 > result) {
+ if (result < 0) {
LOG(LOG_WARNING,
"verify_tls_connection(): gnutls_certificate_verify_peers2() failed: %s",
gnutls_strerror(result));
/* We only handle X509 certificates for now. Let validation fail to
* prevent an attacker from changing the certificate type to prevent
* detection. */
- if (GNUTLS_CRT_X509 != gnutls_certificate_type_get(session)) {
+ if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) {
LOG(LOG_WARNING,
"verify_tls_connection(): no X509 server certificate");
return -1;
/* Get server certificate. */
- if (0 > (result = gnutls_x509_crt_init(&cert))) {
+ result = gnutls_x509_crt_init(&cert);
+ if (result < 0) {
LOG(LOG_WARNING,
"verify_tls_connection(): gnutls_x509_crt_init() failed: %s",
gnutls_strerror(result));
}
cert_list = gnutls_certificate_get_peers(session, &cert_list_size);
- if (NULL == cert_list) {
+ if (cert_list == NULL) {
LOG(LOG_WARNING,
"verify_tls_connection(): gnutls_certificate_get_peers() failed");
gnutls_x509_crt_deinit(cert);
return -1;
}
- if (0 > (result = gnutls_x509_crt_import(cert, &cert_list[0],
- GNUTLS_X509_FMT_DER))) {
+ result = gnutls_x509_crt_import(cert, &cert_list[0], GNUTLS_X509_FMT_DER);
+ if (result < 0) {
LOG(LOG_WARNING,
"verify_tls_connection(): gnutls_x509_crt_import() failed: %s",
gnutls_strerror(result));
size = sizeof(server_cert);
result = gnutls_x509_crt_export(cert, GNUTLS_X509_FMT_PEM,
server_cert, &size);
- if (GNUTLS_E_SUCCESS != result) {
+ if (result != GNUTLS_E_SUCCESS) {
LOG(LOG_WARNING,
"verify_tls_connection(): gnutls_x509_crt_export() failed: %s",
gnutls_strerror(result));
gnutls_x509_crt_deinit(cert);
/* Open stored server certificate file. */
- if (0 != server_certificate_path(&file, hostname, path, sizeof(path))) {
+ if (server_certificate_file(&file, hostname, path, sizeof(path)) != 0) {
LOG(LOG_DEBUG, "server certificate:\n%s", server_cert);
return -1;
}
size = 1; /* '\0' */
stored_cert[0] = '\0'; /* for strcat() */
- while (NULL != fgets(buffer, sizeof(buffer), file)) {
+ while (fgets(buffer, sizeof(buffer), file) != NULL) {
size += strlen(buffer);
/* Make sure the buffer is big enough. */
- if (sizeof(stored_cert) <= size) {
+ if (size >= sizeof(stored_cert)) {
LOG(LOG_WARNING, "verify_tls_connection(): '%s' too big", path);
fclose(file);
fclose(file);
/* Check if the server certificate matches our stored certificate. */
- if (0 != strcmp(stored_cert, server_cert)) {
+ if (strcmp(stored_cert, server_cert)) {
LOG(LOG_ERROR,
"verify_tls_connection(): server certificate changed!",
path, strerror(errno));
return -2;
}
+ /* Check that the proxy certificate file exists and is readable for this
+ * domain. This ensures we send an "invalid" certificate even if the proxy
+ * certificate doesn't exist. */
+ if (proxy_certificate_path(hostname, path, sizeof(path)) != 0) {
+ return -1;
+ }
+ file = fopen(path, "r");
+ if (file == NULL) {
+ LOG(LOG_WARNING,
+ "verify_tls_connection(): proxy certificate doesn't exist: '%s'",
+ path);
+ return -1;
+ }
+ fclose(file);
+
return 0;
}
return -1;
}
/* Try to prevent path traversals in hostnames. */
- if (NULL != strstr(hostname, "..")) {
+ if (strstr(hostname, "..") != NULL) {
LOG(LOG_WARNING,
"get_certificate_path(): possible path traversal: '%s'",
hostname);
hostname, path, size);
}
-int server_certificate_path(FILE **file, const char *hostname,
+int server_certificate_file(FILE **file, const char *hostname,
char *path, size_t size) {
- if (0 != get_certificate_path(STORED_SERVER_CERT_FORMAT,
- hostname, path, size)) {
+ if (get_certificate_path(STORED_SERVER_CERT_FORMAT,
+ hostname, path, size) != 0) {
LOG_PERROR(LOG_ERROR,
- "server_certificate_path(): failed to get path");
+ "server_certificate_file(): failed to get path");
return -1;
}
/* Open the stored certificate file. */
*file = fopen(path, "rb");
- if (NULL == *file) {
+ if (*file == NULL) {
if (global_passthrough_unknown) {
LOG(LOG_DEBUG,
- "server_certificate_path(): failed to open '%s': %s",
+ "server_certificate_file(): failed to open '%s': %s",
path, strerror(errno));
} else {
LOG(LOG_WARNING,
- "server_certificate_path(): failed to open '%s': %s",
+ "server_certificate_file(): failed to open '%s': %s",
path, strerror(errno));
}
/* Couldn't open the file, special case. */