2003-09-04 18:05:08 +02:00
|
|
|
/* Copyright 2003 Roger Dingledine. */
|
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
/* $Id$ */
|
2004-11-29 23:25:31 +01:00
|
|
|
const char tortls_c_id[] = "$Id$";
|
2003-09-04 18:05:08 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/**
|
|
|
|
* \file tortls.c
|
|
|
|
*
|
|
|
|
* \brief TLS wrappers for Tor.
|
|
|
|
**/
|
|
|
|
/* (Unlike other tor functions, these
|
2003-09-04 18:05:08 +02:00
|
|
|
* are prefixed with tor_ in order to avoid conflicting with OpenSSL
|
|
|
|
* functions and variables.)
|
2004-05-10 05:53:24 +02:00
|
|
|
*/
|
2003-09-04 18:05:08 +02:00
|
|
|
|
|
|
|
#include "./crypto.h"
|
|
|
|
#include "./tortls.h"
|
|
|
|
#include "./util.h"
|
2003-09-11 23:38:57 +02:00
|
|
|
#include "./log.h"
|
2004-04-03 06:05:12 +02:00
|
|
|
#include <string.h>
|
2003-09-04 18:05:08 +02:00
|
|
|
|
2003-10-19 02:46:51 +02:00
|
|
|
/* Copied from or.h */
|
|
|
|
#define LEGAL_NICKNAME_CHARACTERS "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
|
|
|
|
|
2003-09-04 18:05:08 +02:00
|
|
|
#include <assert.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/tls1.h>
|
|
|
|
#include <openssl/asn1.h>
|
|
|
|
#include <openssl/bio.h>
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** How long do identity certificates live? (sec) */
|
2004-04-25 00:17:50 +02:00
|
|
|
#define IDENTITY_CERT_LIFETIME (365*24*60*60)
|
2003-10-22 18:41:35 +02:00
|
|
|
|
2004-05-01 22:46:28 +02:00
|
|
|
typedef struct tor_tls_context_st {
|
2003-09-04 18:05:08 +02:00
|
|
|
SSL_CTX *ctx;
|
2004-07-22 06:53:34 +02:00
|
|
|
SSL_CTX *client_only_ctx;
|
2004-05-01 22:46:28 +02:00
|
|
|
} tor_tls_context;
|
2003-09-04 18:05:08 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Holds a SSL object and its associated data. Members are only
|
2004-05-10 12:27:54 +02:00
|
|
|
* accessed from within tortls.c.
|
2004-05-01 22:46:28 +02:00
|
|
|
*/
|
2003-09-04 18:05:08 +02:00
|
|
|
struct tor_tls_st {
|
2004-05-10 12:27:54 +02:00
|
|
|
SSL *ssl; /**< An OpenSSL SSL object. */
|
|
|
|
int socket; /**< The underlying file descriptor for this TLS connection. */
|
2003-12-17 22:14:13 +01:00
|
|
|
enum {
|
|
|
|
TOR_TLS_ST_HANDSHAKE, TOR_TLS_ST_OPEN, TOR_TLS_ST_GOTCLOSE,
|
2003-09-04 18:05:08 +02:00
|
|
|
TOR_TLS_ST_SENTCLOSE, TOR_TLS_ST_CLOSED
|
2004-05-10 05:53:24 +02:00
|
|
|
} state; /**< The current SSL state, depending on which operations have
|
2004-05-01 22:46:28 +02:00
|
|
|
* completed successfully. */
|
2003-09-04 18:05:08 +02:00
|
|
|
int isServer;
|
2004-10-14 04:48:57 +02:00
|
|
|
size_t wantwrite_n; /**< 0 normally, >0 if we returned wantwrite last time. */
|
2003-09-04 18:05:08 +02:00
|
|
|
};
|
|
|
|
|
2003-12-17 22:14:13 +01:00
|
|
|
static X509* tor_tls_create_certificate(crypto_pk_env_t *rsa,
|
2004-04-25 00:17:50 +02:00
|
|
|
crypto_pk_env_t *rsa_sign,
|
|
|
|
const char *cname,
|
|
|
|
const char *cname_sign,
|
|
|
|
unsigned int lifetime);
|
2003-09-25 07:17:11 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Global tls context. We keep it here because nobody else needs to
|
2004-05-10 12:27:54 +02:00
|
|
|
* touch it. */
|
2003-10-23 16:20:51 +02:00
|
|
|
static tor_tls_context *global_tls_context = NULL;
|
2004-05-10 05:53:24 +02:00
|
|
|
/** True iff tor_tls_init() has been called. */
|
2003-09-12 01:26:31 +02:00
|
|
|
static int tls_library_is_initialized = 0;
|
2003-09-08 08:22:19 +02:00
|
|
|
|
2004-05-01 22:46:28 +02:00
|
|
|
/* Module-internal error codes. */
|
2003-09-04 18:05:08 +02:00
|
|
|
#define _TOR_TLS_SYSCALL -6
|
|
|
|
#define _TOR_TLS_ZERORETURN -5
|
|
|
|
|
2003-09-10 02:47:39 +02:00
|
|
|
/* These functions are declared in crypto.c but not exported. */
|
2004-04-25 00:17:50 +02:00
|
|
|
EVP_PKEY *_crypto_pk_env_get_evp_pkey(crypto_pk_env_t *env, int private);
|
2003-09-10 02:47:39 +02:00
|
|
|
crypto_pk_env_t *_crypto_new_pk_env_rsa(RSA *rsa);
|
2004-04-03 04:40:30 +02:00
|
|
|
DH *_crypto_dh_env_get_dh(crypto_dh_env_t *dh);
|
2003-09-15 20:18:37 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Log all pending tls errors at level <b>severity</b>. Use
|
|
|
|
* <b>doing</b> to describe our current activities.
|
2004-05-01 22:46:28 +02:00
|
|
|
*/
|
2003-09-15 20:18:37 +02:00
|
|
|
static void
|
2003-10-16 01:50:25 +02:00
|
|
|
tls_log_errors(int severity, const char *doing)
|
2003-09-15 20:18:37 +02:00
|
|
|
{
|
2003-10-16 01:50:25 +02:00
|
|
|
int err;
|
|
|
|
const char *msg, *lib, *func;
|
|
|
|
while ((err = ERR_get_error()) != 0) {
|
|
|
|
msg = (const char*)ERR_reason_error_string(err);
|
|
|
|
lib = (const char*)ERR_lib_error_string(err);
|
|
|
|
func = (const char*)ERR_func_error_string(err);
|
|
|
|
if (!msg) msg = "(null)";
|
|
|
|
if (doing) {
|
|
|
|
log(severity, "TLS error while %s: %s (in %s:%s)", doing, msg, lib,func);
|
|
|
|
} else {
|
|
|
|
log(severity, "TLS error: %s (in %s:%s)", msg, lib, func);
|
|
|
|
}
|
2003-09-15 20:18:37 +02:00
|
|
|
}
|
|
|
|
}
|
2003-09-10 02:47:39 +02:00
|
|
|
|
2003-09-16 22:53:09 +02:00
|
|
|
#define CATCH_SYSCALL 1
|
|
|
|
#define CATCH_ZERO 2
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Given a TLS object and the result of an SSL_* call, use
|
2004-05-01 22:46:28 +02:00
|
|
|
* SSL_get_error to determine whether an error has occurred, and if so
|
|
|
|
* which one. Return one of TOR_TLS_{DONE|WANTREAD|WANTWRITE|ERROR}.
|
|
|
|
* If extra&CATCH_SYSCALL is true, return _TOR_TLS_SYSCALL instead of
|
|
|
|
* reporting syscall errors. If extra&CATCH_ZERO is true, return
|
|
|
|
* _TOR_TLS_ZERORETURN instead of reporting zero-return errors.
|
|
|
|
*
|
2004-05-10 05:53:24 +02:00
|
|
|
* If an error has occurred, log it at level <b>severity</b> and describe the
|
|
|
|
* current action as <b>doing</b>.
|
2004-05-01 22:46:28 +02:00
|
|
|
*/
|
2003-09-04 18:05:08 +02:00
|
|
|
static int
|
2003-09-16 22:53:09 +02:00
|
|
|
tor_tls_get_error(tor_tls *tls, int r, int extra,
|
2003-12-17 22:14:13 +01:00
|
|
|
const char *doing, int severity)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
|
|
|
int err = SSL_get_error(tls->ssl, r);
|
|
|
|
switch (err) {
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
return TOR_TLS_DONE;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
return TOR_TLS_WANTREAD;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
return TOR_TLS_WANTWRITE;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
2003-09-16 22:53:09 +02:00
|
|
|
if (extra&CATCH_SYSCALL)
|
2003-12-17 22:14:13 +01:00
|
|
|
return _TOR_TLS_SYSCALL;
|
2004-05-01 22:46:28 +02:00
|
|
|
if (r == 0)
|
|
|
|
log(severity, "TLS error: unexpected close while %s", doing);
|
|
|
|
else {
|
|
|
|
int e = tor_socket_errno(tls->socket);
|
|
|
|
log(severity, "TLS error: <syscall error while %s> (errno=%d: %s)",
|
2004-05-02 22:18:21 +02:00
|
|
|
doing, e, tor_socket_strerror(e));
|
2004-05-01 22:46:28 +02:00
|
|
|
}
|
2003-10-16 01:50:25 +02:00
|
|
|
tls_log_errors(severity, doing);
|
2003-09-16 22:53:09 +02:00
|
|
|
return TOR_TLS_ERROR;
|
2003-09-04 18:05:08 +02:00
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
2003-09-16 22:53:09 +02:00
|
|
|
if (extra&CATCH_ZERO)
|
2003-12-17 22:14:13 +01:00
|
|
|
return _TOR_TLS_ZERORETURN;
|
2003-09-16 22:53:09 +02:00
|
|
|
log(severity, "TLS error: Zero return");
|
2003-10-16 01:50:25 +02:00
|
|
|
tls_log_errors(severity, doing);
|
2003-09-16 22:53:09 +02:00
|
|
|
return TOR_TLS_ERROR;
|
2003-09-04 18:05:08 +02:00
|
|
|
default:
|
2003-10-16 01:50:25 +02:00
|
|
|
tls_log_errors(severity, doing);
|
2003-09-04 18:05:08 +02:00
|
|
|
return TOR_TLS_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Initialize OpenSSL, unless it has already been initialized.
|
2004-05-01 22:46:28 +02:00
|
|
|
*/
|
2003-09-12 01:26:31 +02:00
|
|
|
static void
|
2004-10-27 20:16:37 +02:00
|
|
|
tor_tls_init(void) {
|
2003-09-12 01:26:31 +02:00
|
|
|
if (!tls_library_is_initialized) {
|
|
|
|
SSL_library_init();
|
2003-09-15 21:38:52 +02:00
|
|
|
SSL_load_error_strings();
|
2003-09-15 20:37:49 +02:00
|
|
|
crypto_global_init();
|
2003-09-15 21:38:52 +02:00
|
|
|
OpenSSL_add_all_algorithms();
|
2003-09-12 01:26:31 +02:00
|
|
|
tls_library_is_initialized = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** We need to give OpenSSL a callback to verify certificates. This is
|
2004-05-01 22:46:28 +02:00
|
|
|
* it: We always accept peer certs and complete the handshake. We
|
|
|
|
* don't validate them until later.
|
|
|
|
*/
|
2003-12-17 22:14:13 +01:00
|
|
|
static int always_accept_verify_cb(int preverify_ok,
|
2003-09-04 18:05:08 +02:00
|
|
|
X509_STORE_CTX *x509_ctx)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Generate and sign an X509 certificate with the public key <b>rsa</b>,
|
|
|
|
* signed by the private key <b>rsa_sign</b>. The commonName of the
|
|
|
|
* certificate will be <b>cname</b>; the commonName of the issuer will be
|
|
|
|
* <b>cname_sign</b>. The cert will be valid for <b>cert_lifetime</b> seconds
|
2004-05-01 22:46:28 +02:00
|
|
|
* starting from now. Return a certificate on success, NULL on
|
|
|
|
* failure.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
2004-05-01 22:46:28 +02:00
|
|
|
static X509 *
|
2003-12-17 22:14:13 +01:00
|
|
|
tor_tls_create_certificate(crypto_pk_env_t *rsa,
|
2004-04-25 00:17:50 +02:00
|
|
|
crypto_pk_env_t *rsa_sign,
|
|
|
|
const char *cname,
|
|
|
|
const char *cname_sign,
|
|
|
|
unsigned int cert_lifetime)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
|
|
|
time_t start_time, end_time;
|
2004-04-25 00:17:50 +02:00
|
|
|
EVP_PKEY *sign_pkey = NULL, *pkey=NULL;
|
2003-09-04 18:05:08 +02:00
|
|
|
X509 *x509 = NULL;
|
2004-04-25 00:17:50 +02:00
|
|
|
X509_NAME *name = NULL, *name_issuer=NULL;
|
2003-09-04 18:05:08 +02:00
|
|
|
int nid;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-09-12 01:26:31 +02:00
|
|
|
tor_tls_init();
|
|
|
|
|
2003-09-04 18:05:08 +02:00
|
|
|
start_time = time(NULL);
|
|
|
|
|
2004-10-17 00:28:11 +02:00
|
|
|
tor_assert(rsa);
|
|
|
|
tor_assert(cname);
|
|
|
|
tor_assert(rsa_sign);
|
|
|
|
tor_assert(cname_sign);
|
2004-04-25 00:17:50 +02:00
|
|
|
if (!(sign_pkey = _crypto_pk_env_get_evp_pkey(rsa_sign,1)))
|
|
|
|
goto error;
|
|
|
|
if (!(pkey = _crypto_pk_env_get_evp_pkey(rsa,0)))
|
|
|
|
goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(x509 = X509_new()))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(X509_set_version(x509, 2)))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(ASN1_INTEGER_set(X509_get_serialNumber(x509), (long)start_time)))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(name = X509_NAME_new()))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-09-12 01:26:31 +02:00
|
|
|
if ((nid = OBJ_txt2nid("organizationName")) == NID_undef) goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
|
2004-10-27 23:14:11 +02:00
|
|
|
(char*)"TOR", -1, -1, 0))) goto error;
|
2003-09-12 01:26:31 +02:00
|
|
|
if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
|
2004-04-25 00:17:50 +02:00
|
|
|
(char*)cname, -1, -1, 0))) goto error;
|
|
|
|
if (!(X509_set_subject_name(x509, name)))
|
|
|
|
goto error;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2004-04-25 00:17:50 +02:00
|
|
|
if (!(name_issuer = X509_NAME_new()))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-04-25 00:17:50 +02:00
|
|
|
if ((nid = OBJ_txt2nid("organizationName")) == NID_undef) goto error;
|
|
|
|
if (!(X509_NAME_add_entry_by_NID(name_issuer, nid, MBSTRING_ASC,
|
2004-10-27 23:14:11 +02:00
|
|
|
(char*)"TOR", -1, -1, 0))) goto error;
|
2004-04-25 00:17:50 +02:00
|
|
|
if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
|
|
|
|
if (!(X509_NAME_add_entry_by_NID(name_issuer, nid, MBSTRING_ASC,
|
|
|
|
(char*)cname_sign, -1, -1, 0))) goto error;
|
|
|
|
if (!(X509_set_issuer_name(x509, name_issuer)))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-04-25 00:17:50 +02:00
|
|
|
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!X509_time_adj(X509_get_notBefore(x509),0,&start_time))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-04-25 00:17:50 +02:00
|
|
|
end_time = start_time + cert_lifetime;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!X509_time_adj(X509_get_notAfter(x509),0,&end_time))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-09-04 18:05:08 +02:00
|
|
|
if (!X509_set_pubkey(x509, pkey))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-04-25 00:17:50 +02:00
|
|
|
if (!X509_sign(x509, sign_pkey, EVP_sha1()))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2003-09-15 21:38:52 +02:00
|
|
|
|
2003-09-11 23:12:39 +02:00
|
|
|
goto done;
|
|
|
|
error:
|
2004-04-26 18:52:47 +02:00
|
|
|
tls_log_errors(LOG_WARN, "generating certificate");
|
2003-11-18 07:52:25 +01:00
|
|
|
if (x509) {
|
2003-12-17 22:14:13 +01:00
|
|
|
X509_free(x509);
|
2003-11-18 07:52:25 +01:00
|
|
|
x509 = NULL;
|
|
|
|
}
|
2003-09-11 23:12:39 +02:00
|
|
|
done:
|
2004-04-25 00:17:50 +02:00
|
|
|
if (sign_pkey)
|
|
|
|
EVP_PKEY_free(sign_pkey);
|
2003-09-11 23:12:39 +02:00
|
|
|
if (pkey)
|
|
|
|
EVP_PKEY_free(pkey);
|
|
|
|
if (name)
|
|
|
|
X509_NAME_free(name);
|
2004-04-25 00:17:50 +02:00
|
|
|
if (name_issuer)
|
|
|
|
X509_NAME_free(name_issuer);
|
2003-09-25 07:17:11 +02:00
|
|
|
return x509;
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
|
|
|
|
2003-09-11 23:12:39 +02:00
|
|
|
#ifdef EVERYONE_HAS_AES
|
2004-01-20 03:14:12 +01:00
|
|
|
/* Everybody is running OpenSSL 0.9.7 or later, so no backward compatibility
|
2003-09-11 23:12:39 +02:00
|
|
|
* is needed. */
|
|
|
|
#define CIPHER_LIST TLS1_TXT_DHE_RSA_WITH_AES_128_SHA
|
|
|
|
#elif defined(TLS1_TXT_DHE_RSA_WITH_AES_128_SHA)
|
2003-12-17 22:14:13 +01:00
|
|
|
/* Some people are running OpenSSL before 0.9.7, but we aren't.
|
2003-09-11 23:12:39 +02:00
|
|
|
* We can support AES and 3DES.
|
|
|
|
*/
|
2003-09-15 21:38:52 +02:00
|
|
|
#define CIPHER_LIST (TLS1_TXT_DHE_RSA_WITH_AES_128_SHA ":" \
|
2003-12-17 22:14:13 +01:00
|
|
|
SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA)
|
2003-09-11 23:12:39 +02:00
|
|
|
#else
|
|
|
|
/* We're running OpenSSL before 0.9.7. We only support 3DES. */
|
|
|
|
#define CIPHER_LIST SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA
|
|
|
|
#endif
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Create a new TLS context. If we are going to be using it as a
|
|
|
|
* server, it must have isServer set to true, <b>identity</b> set to the
|
|
|
|
* identity key used to sign that certificate, and <b>nickname</b> set to
|
2004-05-01 22:46:28 +02:00
|
|
|
* the server's nickname. If we're only going to be a client,
|
|
|
|
* isServer should be false, identity should be NULL, and nickname
|
|
|
|
* should be NULL. Return -1 if failure, else 0.
|
|
|
|
*
|
|
|
|
* You can call this function multiple times. Each time you call it,
|
2004-07-22 00:11:11 +02:00
|
|
|
* it generates new certificates; all new connections will use
|
|
|
|
* the new SSL context.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
2003-09-08 08:22:19 +02:00
|
|
|
int
|
2004-04-25 00:17:50 +02:00
|
|
|
tor_tls_context_new(crypto_pk_env_t *identity,
|
|
|
|
int isServer, const char *nickname,
|
|
|
|
unsigned int key_lifetime)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
2004-04-25 00:17:50 +02:00
|
|
|
crypto_pk_env_t *rsa = NULL;
|
2003-09-04 18:05:08 +02:00
|
|
|
crypto_dh_env_t *dh = NULL;
|
|
|
|
EVP_PKEY *pkey = NULL;
|
2004-04-25 00:17:50 +02:00
|
|
|
tor_tls_context *result = NULL;
|
|
|
|
X509 *cert = NULL, *idcert = NULL;
|
2004-10-27 07:53:07 +02:00
|
|
|
char nn2[128];
|
2004-07-22 06:53:34 +02:00
|
|
|
int client_only;
|
|
|
|
SSL_CTX **ctx;
|
2004-10-19 20:17:12 +02:00
|
|
|
if (!nickname)
|
|
|
|
nickname = "null";
|
2004-10-27 08:37:34 +02:00
|
|
|
tor_snprintf(nn2, sizeof(nn2), "%s <identity>", nickname);
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-09-12 01:26:31 +02:00
|
|
|
tor_tls_init();
|
|
|
|
|
2004-04-25 00:17:50 +02:00
|
|
|
if (isServer) {
|
2004-05-01 22:46:28 +02:00
|
|
|
/* Generate short-term RSA key. */
|
2004-04-25 00:17:50 +02:00
|
|
|
if (!(rsa = crypto_new_pk_env()))
|
|
|
|
goto error;
|
|
|
|
if (crypto_pk_generate_key(rsa)<0)
|
|
|
|
goto error;
|
2004-05-01 22:46:28 +02:00
|
|
|
/* Create certificate signed by identity key. */
|
2004-04-25 00:17:50 +02:00
|
|
|
cert = tor_tls_create_certificate(rsa, identity, nickname, nn2,
|
|
|
|
key_lifetime);
|
2004-05-01 22:46:28 +02:00
|
|
|
/* Create self-signed certificate for identity key. */
|
2004-04-25 00:17:50 +02:00
|
|
|
idcert = tor_tls_create_certificate(identity, identity, nn2, nn2,
|
|
|
|
IDENTITY_CERT_LIFETIME);
|
|
|
|
if (!cert || !idcert) {
|
2003-10-10 03:48:03 +02:00
|
|
|
log(LOG_WARN, "Error creating certificate");
|
2004-04-25 00:17:50 +02:00
|
|
|
goto error;
|
2003-09-25 07:17:11 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-09-04 18:05:08 +02:00
|
|
|
result = tor_malloc(sizeof(tor_tls_context));
|
2004-07-22 06:53:34 +02:00
|
|
|
result->ctx = result->client_only_ctx = NULL;
|
|
|
|
for (client_only=0; client_only <= 1; ++client_only) {
|
|
|
|
ctx = client_only ? &result->client_only_ctx : &result->ctx;
|
2003-09-11 23:12:39 +02:00
|
|
|
#ifdef EVERYONE_HAS_AES
|
2004-07-22 06:53:34 +02:00
|
|
|
/* Tell OpenSSL to only use TLS1 */
|
|
|
|
if (!(*ctx = SSL_CTX_new(TLSv1_method())))
|
|
|
|
goto error;
|
2003-09-11 23:12:39 +02:00
|
|
|
#else
|
2004-07-22 06:53:34 +02:00
|
|
|
/* Tell OpenSSL to use SSL3 or TLS1 but not SSL2. */
|
|
|
|
if (!(*ctx = SSL_CTX_new(SSLv23_method())))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-07-22 06:53:34 +02:00
|
|
|
SSL_CTX_set_options(*ctx, SSL_OP_NO_SSLv2);
|
|
|
|
#endif
|
|
|
|
if (!SSL_CTX_set_cipher_list(*ctx, CIPHER_LIST))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-07-22 06:53:34 +02:00
|
|
|
if (!client_only) {
|
|
|
|
if (cert && !SSL_CTX_use_certificate(*ctx,cert))
|
|
|
|
goto error;
|
2004-12-07 08:48:16 +01:00
|
|
|
X509_free(cert); /* We just added a reference to cert. */
|
|
|
|
cert=NULL;
|
2004-07-22 06:53:34 +02:00
|
|
|
if (idcert && !SSL_CTX_add_extra_chain_cert(*ctx,idcert))
|
2003-09-11 23:12:39 +02:00
|
|
|
goto error;
|
2004-12-07 08:48:16 +01:00
|
|
|
idcert=NULL; /* The context now owns the reference to idcert */
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
2004-07-22 06:53:34 +02:00
|
|
|
SSL_CTX_set_session_cache_mode(*ctx, SSL_SESS_CACHE_OFF);
|
|
|
|
if (isServer && !client_only) {
|
|
|
|
tor_assert(rsa);
|
|
|
|
if (!(pkey = _crypto_pk_env_get_evp_pkey(rsa,1)))
|
|
|
|
goto error;
|
|
|
|
if (!SSL_CTX_use_PrivateKey(*ctx, pkey))
|
|
|
|
goto error;
|
|
|
|
EVP_PKEY_free(pkey);
|
|
|
|
pkey = NULL;
|
2004-12-07 08:48:16 +01:00
|
|
|
if (!SSL_CTX_check_private_key(*ctx))
|
|
|
|
goto error;
|
2004-07-22 06:53:34 +02:00
|
|
|
}
|
|
|
|
dh = crypto_dh_new();
|
|
|
|
SSL_CTX_set_tmp_dh(*ctx, _crypto_dh_env_get_dh(dh));
|
|
|
|
crypto_dh_free(dh);
|
|
|
|
SSL_CTX_set_verify(*ctx, SSL_VERIFY_PEER,
|
|
|
|
always_accept_verify_cb);
|
|
|
|
/* let us realloc bufs that we're writing from */
|
|
|
|
SSL_CTX_set_mode(*ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
2003-10-23 16:20:51 +02:00
|
|
|
/* Free the old context if one exists. */
|
|
|
|
if (global_tls_context) {
|
|
|
|
/* This is safe even if there are open connections: OpenSSL does
|
|
|
|
* reference counting with SSL and SSL_CTX objects. */
|
2003-10-23 16:27:53 +02:00
|
|
|
SSL_CTX_free(global_tls_context->ctx);
|
2004-07-22 06:53:34 +02:00
|
|
|
SSL_CTX_free(global_tls_context->client_only_ctx);
|
|
|
|
tor_free(global_tls_context);
|
2003-10-23 16:20:51 +02:00
|
|
|
}
|
2003-09-08 08:22:19 +02:00
|
|
|
global_tls_context = result;
|
2004-12-07 07:48:02 +01:00
|
|
|
if (rsa)
|
|
|
|
crypto_free_pk_env(rsa);
|
2003-09-08 08:22:19 +02:00
|
|
|
return 0;
|
2003-09-11 23:12:39 +02:00
|
|
|
|
|
|
|
error:
|
2004-04-26 18:52:47 +02:00
|
|
|
tls_log_errors(LOG_WARN, "creating TLS context");
|
2003-09-11 23:12:39 +02:00
|
|
|
if (pkey)
|
|
|
|
EVP_PKEY_free(pkey);
|
2004-04-25 00:17:50 +02:00
|
|
|
if (rsa)
|
|
|
|
crypto_free_pk_env(rsa);
|
2003-09-11 23:12:39 +02:00
|
|
|
if (dh)
|
|
|
|
crypto_dh_free(dh);
|
|
|
|
if (result && result->ctx)
|
|
|
|
SSL_CTX_free(result->ctx);
|
2004-07-22 06:53:34 +02:00
|
|
|
if (result && result->client_only_ctx)
|
|
|
|
SSL_CTX_free(result->client_only_ctx);
|
2003-09-11 23:12:39 +02:00
|
|
|
if (result)
|
|
|
|
free(result);
|
2004-05-18 17:35:21 +02:00
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
|
|
|
if (idcert)
|
2004-12-07 08:48:16 +01:00
|
|
|
X509_free(idcert);
|
2003-09-11 23:12:39 +02:00
|
|
|
return -1;
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Create a new TLS object from a file descriptor, and a flag to
|
|
|
|
* determine whether it is functioning as a server.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
|
|
|
tor_tls *
|
2004-07-22 06:53:34 +02:00
|
|
|
tor_tls_new(int sock, int isServer, int use_no_cert)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
|
|
|
tor_tls *result = tor_malloc(sizeof(tor_tls));
|
2004-07-22 06:53:34 +02:00
|
|
|
SSL_CTX *ctx;
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(global_tls_context); /* make sure somebody made it first */
|
2004-07-22 06:53:34 +02:00
|
|
|
ctx = use_no_cert ? global_tls_context->client_only_ctx
|
|
|
|
: global_tls_context->ctx;
|
|
|
|
if (!(result->ssl = SSL_new(ctx)))
|
2003-09-04 18:05:08 +02:00
|
|
|
return NULL;
|
|
|
|
result->socket = sock;
|
|
|
|
SSL_set_fd(result->ssl, sock);
|
|
|
|
result->state = TOR_TLS_ST_HANDSHAKE;
|
|
|
|
result->isServer = isServer;
|
2003-10-18 10:00:19 +02:00
|
|
|
result->wantwrite_n = 0;
|
2003-09-04 18:05:08 +02:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Release resources associated with a TLS object. Does not close the
|
2003-09-04 18:05:08 +02:00
|
|
|
* underlying file descriptor.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
tor_tls_free(tor_tls *tls)
|
|
|
|
{
|
|
|
|
SSL_free(tls->ssl);
|
|
|
|
free(tls);
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Underlying function for TLS reading. Reads up to <b>len</b>
|
|
|
|
* characters from <b>tls</b> into <b>cp</b>. On success, returns the
|
|
|
|
* number of characters read. On failure, returns TOR_TLS_ERROR,
|
|
|
|
* TOR_TLS_CLOSE, TOR_TLS_WANTREAD, or TOR_TLS_WANTWRITE.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
|
|
|
int
|
2004-10-14 04:48:57 +02:00
|
|
|
tor_tls_read(tor_tls *tls, char *cp, size_t len)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
|
|
|
int r, err;
|
2004-10-17 00:28:11 +02:00
|
|
|
tor_assert(tls);
|
|
|
|
tor_assert(tls->ssl);
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls->state == TOR_TLS_ST_OPEN);
|
2003-09-04 18:05:08 +02:00
|
|
|
r = SSL_read(tls->ssl, cp, len);
|
|
|
|
if (r > 0)
|
|
|
|
return r;
|
2003-09-27 00:27:24 +02:00
|
|
|
err = tor_tls_get_error(tls, r, CATCH_ZERO, "reading", LOG_INFO);
|
2003-09-16 22:53:09 +02:00
|
|
|
if (err == _TOR_TLS_ZERORETURN) {
|
2004-11-23 01:08:26 +01:00
|
|
|
log_fn(LOG_DEBUG,"read returned r=%d; TLS is closed",r);
|
2003-09-04 18:05:08 +02:00
|
|
|
tls->state = TOR_TLS_ST_CLOSED;
|
|
|
|
return TOR_TLS_CLOSE;
|
|
|
|
} else {
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(err != TOR_TLS_DONE);
|
2004-11-23 01:08:26 +01:00
|
|
|
log_fn(LOG_DEBUG,"read returned r=%d, err=%d",r,err);
|
2003-09-04 18:05:08 +02:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Underlying function for TLS writing. Write up to <b>n</b>
|
|
|
|
* characters from <b>cp</b> onto <b>tls</b>. On success, returns the
|
|
|
|
* number of characters written. On failure, returns TOR_TLS_ERROR,
|
|
|
|
* TOR_TLS_WANTREAD, or TOR_TLS_WANTWRITE.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
|
|
|
int
|
2004-10-14 04:48:57 +02:00
|
|
|
tor_tls_write(tor_tls *tls, char *cp, size_t n)
|
2003-09-04 18:05:08 +02:00
|
|
|
{
|
|
|
|
int r, err;
|
2004-10-17 00:28:11 +02:00
|
|
|
tor_assert(tls);
|
|
|
|
tor_assert(tls->ssl);
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls->state == TOR_TLS_ST_OPEN);
|
2003-09-11 23:38:57 +02:00
|
|
|
if (n == 0)
|
|
|
|
return 0;
|
2004-11-28 10:05:49 +01:00
|
|
|
if (tls->wantwrite_n) {
|
2003-10-18 10:00:19 +02:00
|
|
|
/* if WANTWRITE last time, we must use the _same_ n as before */
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(n >= tls->wantwrite_n);
|
2004-04-16 00:08:37 +02:00
|
|
|
log_fn(LOG_DEBUG,"resuming pending-write, (%d to flush, reusing %d)",
|
2004-10-14 05:18:14 +02:00
|
|
|
(int)n, (int)tls->wantwrite_n);
|
2003-10-18 10:00:19 +02:00
|
|
|
n = tls->wantwrite_n;
|
|
|
|
tls->wantwrite_n = 0;
|
|
|
|
}
|
2003-09-04 18:05:08 +02:00
|
|
|
r = SSL_write(tls->ssl, cp, n);
|
2003-09-27 00:27:24 +02:00
|
|
|
err = tor_tls_get_error(tls, r, 0, "writing", LOG_INFO);
|
2003-09-11 23:38:57 +02:00
|
|
|
if (err == TOR_TLS_DONE) {
|
2003-09-04 18:05:08 +02:00
|
|
|
return r;
|
2003-10-18 10:00:19 +02:00
|
|
|
}
|
2003-10-19 02:39:48 +02:00
|
|
|
if (err == TOR_TLS_WANTWRITE || err == TOR_TLS_WANTREAD) {
|
2003-10-18 10:00:19 +02:00
|
|
|
tls->wantwrite_n = n;
|
|
|
|
}
|
|
|
|
return err;
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Perform initial handshake on <b>tls</b>. When finished, returns
|
2003-09-04 18:05:08 +02:00
|
|
|
* TOR_TLS_DONE. On failure, returns TOR_TLS_ERROR, TOR_TLS_WANTREAD,
|
2003-09-11 22:10:39 +02:00
|
|
|
* or TOR_TLS_WANTWRITE.
|
2003-09-04 18:05:08 +02:00
|
|
|
*/
|
|
|
|
int
|
|
|
|
tor_tls_handshake(tor_tls *tls)
|
|
|
|
{
|
|
|
|
int r;
|
2004-10-17 00:28:11 +02:00
|
|
|
tor_assert(tls);
|
|
|
|
tor_assert(tls->ssl);
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls->state == TOR_TLS_ST_HANDSHAKE);
|
2003-09-04 18:05:08 +02:00
|
|
|
if (tls->isServer) {
|
|
|
|
r = SSL_accept(tls->ssl);
|
|
|
|
} else {
|
|
|
|
r = SSL_connect(tls->ssl);
|
|
|
|
}
|
2003-09-27 00:27:24 +02:00
|
|
|
r = tor_tls_get_error(tls,r,0, "handshaking", LOG_INFO);
|
2003-09-04 18:05:08 +02:00
|
|
|
if (r == TOR_TLS_DONE) {
|
2003-12-17 22:14:13 +01:00
|
|
|
tls->state = TOR_TLS_ST_OPEN;
|
2004-04-26 18:52:47 +02:00
|
|
|
}
|
2003-09-04 18:05:08 +02:00
|
|
|
return r;
|
|
|
|
}
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Shut down an open tls connection <b>tls</b>. When finished, returns
|
2003-09-04 18:05:08 +02:00
|
|
|
* TOR_TLS_DONE. On failure, returns TOR_TLS_ERROR, TOR_TLS_WANTREAD,
|
|
|
|
* or TOR_TLS_WANTWRITE.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
tor_tls_shutdown(tor_tls *tls)
|
|
|
|
{
|
|
|
|
int r, err;
|
|
|
|
char buf[128];
|
2004-10-17 00:28:11 +02:00
|
|
|
tor_assert(tls);
|
|
|
|
tor_assert(tls->ssl);
|
2003-09-04 18:05:08 +02:00
|
|
|
|
2003-09-11 23:38:57 +02:00
|
|
|
while (1) {
|
|
|
|
if (tls->state == TOR_TLS_ST_SENTCLOSE) {
|
|
|
|
/* If we've already called shutdown once to send a close message,
|
|
|
|
* we read until the other side has closed too.
|
|
|
|
*/
|
|
|
|
do {
|
2003-12-17 22:14:13 +01:00
|
|
|
r = SSL_read(tls->ssl, buf, 128);
|
2003-09-11 23:38:57 +02:00
|
|
|
} while (r>0);
|
2003-12-17 22:14:13 +01:00
|
|
|
err = tor_tls_get_error(tls, r, CATCH_ZERO, "reading to shut down",
|
|
|
|
LOG_INFO);
|
2003-09-11 23:38:57 +02:00
|
|
|
if (err == _TOR_TLS_ZERORETURN) {
|
2003-12-17 22:14:13 +01:00
|
|
|
tls->state = TOR_TLS_ST_GOTCLOSE;
|
|
|
|
/* fall through... */
|
2003-09-11 23:38:57 +02:00
|
|
|
} else {
|
2003-12-17 22:14:13 +01:00
|
|
|
return err;
|
2003-09-11 23:38:57 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
r = SSL_shutdown(tls->ssl);
|
|
|
|
if (r == 1) {
|
|
|
|
/* If shutdown returns 1, the connection is entirely closed. */
|
|
|
|
tls->state = TOR_TLS_ST_CLOSED;
|
|
|
|
return TOR_TLS_DONE;
|
|
|
|
}
|
2003-12-17 22:14:13 +01:00
|
|
|
err = tor_tls_get_error(tls, r, CATCH_SYSCALL|CATCH_ZERO, "shutting down",
|
|
|
|
LOG_INFO);
|
2003-09-11 23:38:57 +02:00
|
|
|
if (err == _TOR_TLS_SYSCALL) {
|
|
|
|
/* The underlying TCP connection closed while we were shutting down. */
|
2003-12-17 22:14:13 +01:00
|
|
|
tls->state = TOR_TLS_ST_CLOSED;
|
2003-09-11 23:38:57 +02:00
|
|
|
return TOR_TLS_DONE;
|
|
|
|
} else if (err == _TOR_TLS_ZERORETURN) {
|
|
|
|
/* The TLS connection says that it sent a shutdown record, but
|
|
|
|
* isn't done shutting down yet. Make sure that this hasn't
|
|
|
|
* happened before, then go back to the start of the function
|
|
|
|
* and try to read.
|
|
|
|
*/
|
2003-12-17 22:14:13 +01:00
|
|
|
if (tls->state == TOR_TLS_ST_GOTCLOSE ||
|
|
|
|
tls->state == TOR_TLS_ST_SENTCLOSE) {
|
|
|
|
log(LOG_WARN,
|
|
|
|
"TLS returned \"half-closed\" value while already half-closed");
|
|
|
|
return TOR_TLS_ERROR;
|
2003-09-11 23:38:57 +02:00
|
|
|
}
|
|
|
|
tls->state = TOR_TLS_ST_SENTCLOSE;
|
|
|
|
/* fall through ... */
|
2003-09-04 18:05:08 +02:00
|
|
|
} else {
|
|
|
|
return err;
|
|
|
|
}
|
2003-09-11 23:38:57 +02:00
|
|
|
} /* end loop */
|
2003-09-04 18:05:08 +02:00
|
|
|
}
|
2003-09-08 08:22:19 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Return true iff this TLS connection is authenticated.
|
2003-09-10 02:47:39 +02:00
|
|
|
*/
|
|
|
|
int
|
|
|
|
tor_tls_peer_has_cert(tor_tls *tls)
|
|
|
|
{
|
|
|
|
X509 *cert;
|
|
|
|
if (!(cert = SSL_get_peer_certificate(tls->ssl)))
|
|
|
|
return 0;
|
|
|
|
X509_free(cert);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Return the nickname (if any) that the peer connected on <b>tls</b>
|
2004-05-01 22:46:28 +02:00
|
|
|
* claims to have.
|
|
|
|
*/
|
2003-10-19 02:46:51 +02:00
|
|
|
int
|
2004-10-14 04:48:57 +02:00
|
|
|
tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen)
|
2003-10-19 02:46:51 +02:00
|
|
|
{
|
|
|
|
X509 *cert = NULL;
|
|
|
|
X509_NAME *name = NULL;
|
|
|
|
int nid;
|
|
|
|
int lenout;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-10-19 02:46:51 +02:00
|
|
|
if (!(cert = SSL_get_peer_certificate(tls->ssl))) {
|
2003-10-19 03:15:36 +02:00
|
|
|
log_fn(LOG_WARN, "Peer has no certificate");
|
2003-11-18 07:52:25 +01:00
|
|
|
goto error;
|
2003-10-19 02:46:51 +02:00
|
|
|
}
|
|
|
|
if (!(name = X509_get_subject_name(cert))) {
|
2003-10-19 03:15:36 +02:00
|
|
|
log_fn(LOG_WARN, "Peer certificate has no subject name");
|
2003-11-18 07:52:25 +01:00
|
|
|
goto error;
|
2003-10-19 02:46:51 +02:00
|
|
|
}
|
|
|
|
if ((nid = OBJ_txt2nid("commonName")) == NID_undef)
|
2003-11-18 07:52:25 +01:00
|
|
|
goto error;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-10-19 02:46:51 +02:00
|
|
|
lenout = X509_NAME_get_text_by_NID(name, nid, buf, buflen);
|
|
|
|
if (lenout == -1)
|
2003-11-18 07:52:25 +01:00
|
|
|
goto error;
|
2004-03-09 23:01:17 +01:00
|
|
|
if (((int)strspn(buf, LEGAL_NICKNAME_CHARACTERS)) < lenout) {
|
2003-10-19 03:15:36 +02:00
|
|
|
log_fn(LOG_WARN, "Peer certificate nickname has illegal characters.");
|
2003-11-18 07:52:25 +01:00
|
|
|
goto error;
|
2003-10-19 02:46:51 +02:00
|
|
|
}
|
2004-12-07 08:48:16 +01:00
|
|
|
X509_free(cert);
|
|
|
|
|
2003-10-19 02:46:51 +02:00
|
|
|
return 0;
|
2003-11-18 07:52:25 +01:00
|
|
|
error:
|
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
|
|
|
return -1;
|
2003-10-19 02:46:51 +02:00
|
|
|
}
|
|
|
|
|
2004-07-21 19:59:24 +02:00
|
|
|
static void log_cert_lifetime(X509 *cert, const char *problem)
|
|
|
|
{
|
|
|
|
BIO *bio = NULL;
|
|
|
|
BUF_MEM *buf;
|
|
|
|
char *s1=NULL, *s2=NULL;
|
2004-07-23 01:06:28 +02:00
|
|
|
char mytime[33];
|
|
|
|
time_t now = time(NULL);
|
2004-07-21 19:59:24 +02:00
|
|
|
|
|
|
|
if (problem)
|
|
|
|
log_fn(LOG_WARN,"Certificate %s: is your system clock set incorrectly?",
|
|
|
|
problem);
|
|
|
|
|
|
|
|
if (!(bio = BIO_new(BIO_s_mem()))) {
|
|
|
|
log_fn(LOG_WARN, "Couldn't allocate BIO!"); goto end;
|
|
|
|
}
|
|
|
|
if (!(ASN1_TIME_print(bio, X509_get_notBefore(cert)))) {
|
|
|
|
tls_log_errors(LOG_WARN, "printing certificate lifetime");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
BIO_get_mem_ptr(bio, &buf);
|
|
|
|
s1 = tor_strndup(buf->data, buf->length);
|
|
|
|
|
|
|
|
BIO_reset(bio);
|
|
|
|
if (!(ASN1_TIME_print(bio, X509_get_notAfter(cert)))) {
|
|
|
|
tls_log_errors(LOG_WARN, "printing certificate lifetime");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
BIO_get_mem_ptr(bio, &buf);
|
|
|
|
s2 = tor_strndup(buf->data, buf->length);
|
|
|
|
|
2004-07-23 01:06:28 +02:00
|
|
|
strftime(mytime, 32, "%b %d %H:%M:%S %Y GMT", gmtime(&now));
|
|
|
|
|
|
|
|
log_fn(LOG_WARN, "(certificate lifetime runs from %s through %s. Your time is %s.)",s1,s2,mytime);
|
2004-07-21 19:59:24 +02:00
|
|
|
|
|
|
|
end:
|
|
|
|
if (bio)
|
|
|
|
BIO_free(bio);
|
|
|
|
if (s1)
|
|
|
|
tor_free(s1);
|
|
|
|
if (s2)
|
|
|
|
tor_free(s2);
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** If the provided tls connection is authenticated and has a
|
2004-07-21 02:44:04 +02:00
|
|
|
* certificate that is currently valid and signed, then set
|
|
|
|
* *<b>identity_key</b> to the identity certificate's key and return
|
|
|
|
* 0. Else, return -1.
|
2003-09-10 02:47:39 +02:00
|
|
|
*/
|
2004-04-25 00:17:50 +02:00
|
|
|
int
|
2004-07-21 02:44:04 +02:00
|
|
|
tor_tls_verify(tor_tls *tls, crypto_pk_env_t **identity_key)
|
2003-09-10 02:47:39 +02:00
|
|
|
{
|
2004-07-21 02:44:04 +02:00
|
|
|
X509 *cert = NULL, *id_cert = NULL;
|
|
|
|
STACK_OF(X509) *chain = NULL;
|
2004-04-25 00:17:50 +02:00
|
|
|
EVP_PKEY *id_pkey = NULL;
|
2004-07-21 02:44:04 +02:00
|
|
|
RSA *rsa;
|
2004-07-22 00:11:11 +02:00
|
|
|
int num_in_chain;
|
2004-07-21 02:44:04 +02:00
|
|
|
int r = -1, i;
|
|
|
|
|
|
|
|
*identity_key = NULL;
|
2004-04-25 00:17:50 +02:00
|
|
|
|
2003-09-10 02:47:39 +02:00
|
|
|
if (!(cert = SSL_get_peer_certificate(tls->ssl)))
|
2004-07-21 02:44:04 +02:00
|
|
|
goto done;
|
|
|
|
if (!(chain = SSL_get_peer_cert_chain(tls->ssl)))
|
|
|
|
goto done;
|
2004-07-22 00:11:11 +02:00
|
|
|
num_in_chain = sk_X509_num(chain);
|
|
|
|
/* 1 means we're receiving (server-side), and it's just the id_cert.
|
|
|
|
* 2 means we're connecting (client-side), and it's both the link
|
|
|
|
* cert and the id_cert.
|
|
|
|
*/
|
|
|
|
if (num_in_chain < 1) {
|
2004-07-21 05:32:56 +02:00
|
|
|
log_fn(LOG_WARN,"Unexpected number of certificates in chain (%d)",
|
2004-07-22 00:11:11 +02:00
|
|
|
num_in_chain);
|
2004-07-21 02:44:04 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2004-07-22 00:11:11 +02:00
|
|
|
for (i=0; i<num_in_chain; ++i) {
|
2004-07-21 02:44:04 +02:00
|
|
|
id_cert = sk_X509_value(chain, i);
|
|
|
|
if (X509_cmp(id_cert, cert) != 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!id_cert) {
|
|
|
|
log_fn(LOG_WARN,"No distinct identity certificate found");
|
|
|
|
goto done;
|
|
|
|
}
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2004-07-21 02:44:04 +02:00
|
|
|
if (!(id_pkey = X509_get_pubkey(id_cert)) ||
|
2004-04-25 00:17:50 +02:00
|
|
|
X509_verify(cert, id_pkey) <= 0) {
|
2003-10-18 08:48:46 +02:00
|
|
|
log_fn(LOG_WARN,"X509_verify on cert and pkey returned <= 0");
|
2004-04-26 05:09:17 +02:00
|
|
|
tls_log_errors(LOG_WARN,"verifying certificate");
|
2003-09-10 02:47:39 +02:00
|
|
|
goto done;
|
2003-10-18 08:48:46 +02:00
|
|
|
}
|
2003-09-10 02:47:39 +02:00
|
|
|
|
2004-07-21 02:44:04 +02:00
|
|
|
rsa = EVP_PKEY_get1_RSA(id_pkey);
|
|
|
|
if (!rsa)
|
|
|
|
goto done;
|
|
|
|
*identity_key = _crypto_new_pk_env_rsa(rsa);
|
|
|
|
|
2004-04-25 00:17:50 +02:00
|
|
|
r = 0;
|
2003-12-17 22:14:13 +01:00
|
|
|
|
2003-09-10 02:47:39 +02:00
|
|
|
done:
|
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
2004-04-25 00:17:50 +02:00
|
|
|
if (id_pkey)
|
|
|
|
EVP_PKEY_free(id_pkey);
|
2004-04-26 04:33:12 +02:00
|
|
|
|
2004-05-18 17:35:21 +02:00
|
|
|
/* This should never get invoked, but let's make sure in case OpenSSL
|
|
|
|
* acts unexpectedly. */
|
2004-04-26 04:33:12 +02:00
|
|
|
tls_log_errors(LOG_WARN, "finishing tor_tls_verify");
|
|
|
|
|
2003-09-10 02:47:39 +02:00
|
|
|
return r;
|
|
|
|
}
|
2003-09-14 04:58:50 +02:00
|
|
|
|
2004-11-14 23:07:48 +01:00
|
|
|
/** Check whether the certificate set on the connection <b>tls</b> is
|
|
|
|
* expired or not-yet-valid, give or take <b>tolerance</b>
|
|
|
|
* seconds. Return 0 for valid, -1 for failure.
|
|
|
|
*
|
|
|
|
* NOTE: you should call tor_tls_verify before tor_tls_check_lifetime.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
tor_tls_check_lifetime(tor_tls *tls, int tolerance)
|
|
|
|
{
|
|
|
|
time_t now, t;
|
|
|
|
X509 *cert;
|
|
|
|
int r = -1;
|
|
|
|
|
|
|
|
now = time(NULL);
|
|
|
|
|
|
|
|
if (!(cert = SSL_get_peer_certificate(tls->ssl)))
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
t = now + tolerance;
|
|
|
|
if (X509_cmp_time(X509_get_notBefore(cert), &t) > 0) {
|
|
|
|
log_cert_lifetime(cert, "not yet valid");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
t = now - tolerance;
|
|
|
|
if (X509_cmp_time(X509_get_notAfter(cert), &t) < 0) {
|
|
|
|
log_cert_lifetime(cert, "already expired");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = 0;
|
|
|
|
done:
|
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Return the number of bytes available for reading from <b>tls</b>.
|
|
|
|
*/
|
2003-12-17 22:14:13 +01:00
|
|
|
int
|
2003-09-28 08:47:29 +02:00
|
|
|
tor_tls_get_pending_bytes(tor_tls *tls)
|
2003-09-27 22:07:40 +02:00
|
|
|
{
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls);
|
2004-04-27 01:19:21 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x0090700fl
|
|
|
|
if (tls->ssl->rstate == SSL_ST_READ_BODY)
|
|
|
|
return 0;
|
|
|
|
if (tls->ssl->s3->rrec.type != SSL3_RT_APPLICATION_DATA)
|
|
|
|
return 0;
|
|
|
|
#endif
|
2003-09-27 22:07:40 +02:00
|
|
|
return SSL_pending(tls->ssl);
|
2004-04-27 01:19:21 +02:00
|
|
|
|
2003-09-27 22:07:40 +02:00
|
|
|
}
|
2004-01-13 02:19:02 +01:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Return the number of bytes read across the underlying socket. */
|
2004-01-13 02:19:02 +01:00
|
|
|
unsigned long tor_tls_get_n_bytes_read(tor_tls *tls)
|
|
|
|
{
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls);
|
2004-01-13 02:19:02 +01:00
|
|
|
return BIO_number_read(SSL_get_rbio(tls->ssl));
|
|
|
|
}
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Return the number of bytes written across the underlying socket. */
|
2004-01-13 02:19:02 +01:00
|
|
|
unsigned long tor_tls_get_n_bytes_written(tor_tls *tls)
|
|
|
|
{
|
2004-04-25 21:59:38 +02:00
|
|
|
tor_assert(tls);
|
2004-01-13 02:19:02 +01:00
|
|
|
return BIO_number_written(SSL_get_wbio(tls->ssl));
|
|
|
|
}
|
2004-04-06 05:44:36 +02:00
|
|
|
|
2004-05-10 05:53:24 +02:00
|
|
|
/** Implement assert_no_tls_errors: If there are any pending OpenSSL
|
2004-05-01 22:46:28 +02:00
|
|
|
* errors, log an error message and assert(0). */
|
2004-04-27 01:00:07 +02:00
|
|
|
void _assert_no_tls_errors(const char *fname, int line)
|
|
|
|
{
|
|
|
|
if (ERR_peek_error() == 0)
|
|
|
|
return;
|
|
|
|
log_fn(LOG_ERR, "Unhandled OpenSSL errors found at %s:%d: ",
|
|
|
|
fname, line);
|
|
|
|
tls_log_errors(LOG_ERR, NULL);
|
|
|
|
|
|
|
|
tor_assert(0);
|
|
|
|
}
|
|
|
|
|