1
0
mirror of https://github.com/osmarks/ngircd.git synced 2024-10-27 20:36:18 +00:00

Support for server certificate validation on server links [S2S-TLS]

This patch provides code to validate the server certificate in
server links, defeating nasty man-in-the-middle attacks on server
links.

Features:

- Check whether the certificate is signed by a trusted certificate
  authority (CA).
- Check the host name, including wildcard certificates and Subject
  Alternative Names.
- Optionally check against a certificate revocation list (CRL).
- Implementation for both OpenSSL and GnuTLS linkage.

Left for another day:

- Parameterize the TLS parameter of an outbound connection. Currently,
  it's hardcoded to disable all versions before TLSv1.1.
- Using certificate as CA-certificate. They work for GnuTLS only but
  perhaps this should rather raise an error there, too.
- Optional OCSP checking.
- Checking client certificates. Code is there but this first needs some
  consideration about the use cases. This could replace all other
  authentication methods, for both client-server and server-server
  connections.

This patch is based on a patch by Florian Westphal from 2009, which
implemented this for OpenSSL only:

  From: Florian Westphal <fw@strlen.de>
  Date: Mon, 18 May 2009 00:29:02 +0200
  Subject: SSL/TLS: Add initial certificate support to OpenSSL backend

Commit message modified by Alex Barton.

Closes #120, "Server links using TLS/SSL need certificate validation".
Supersedes PR #8, "Options for verifying and requiring SSL client
certificates", which had (incomplete?) code for OpenSSL, no GnuTLS.
This commit is contained in:
Christoph Biedl 2014-11-02 14:48:34 +01:00 committed by Alexander Barton
parent 339ad77b62
commit 817937b218
7 changed files with 386 additions and 14 deletions

View File

@ -273,6 +273,13 @@
# is only available when ngIRCd is compiled with support for SSL!
# So don't forget to remove the ";" above if this is the case ...
# SSL Trusted CA Certificates File (for verifying peer certificates)
;CAFile = /etc/ssl/CA/cacert.pem
# Certificate Revocation File (for marking otherwise valid
# certficates as invalid)
;CRLFile = /etc/ssl/CA/crl.pem
# SSL Server Key Certificate
;CertFile = :ETCDIR:/ssl/server-cert.pem
@ -364,6 +371,10 @@
# Connect to the remote server using TLS/SSL (Default: false)
;SSLConnect = yes
# Verify the TLS certificate presented by the remote server
# (Default: yes)
;SSLVerify = yes
# Define a (case insensitive) list of masks matching nicknames that
# should be treated as IRC services when introduced via this remote
# server, separated by commas (",").

View File

@ -397,6 +397,13 @@ All SSL-related configuration variables are located in the
section. Please note that this whole section is only recognized by ngIRCd
when it is compiled with support for SSL using OpenSSL or GnuTLS!
.TP
\fBCAFile (string)\fR
Filename pointing to the Trusted CA Certificates. This is required for
verifying peer certificates.
.TP
\fBCRLFile (string)\fR
Filename of Certificate Revocation List.
.TP
\fBCertFile\fR (string)
SSL Certificate file of the private server key.
.TP
@ -491,6 +498,9 @@ You can use the IRC Operator command CONNECT later on to create the link.
\fBSSLConnect\fR (boolean)
Connect to the remote server using TLS/SSL. Default: false.
.TP
\fBSSLVerify\fR (boolean)
Verify the TLS certificate presented by the remote server. Default: yes.
.TP
\fBServiceMask\fR (string)
Define a (case insensitive) list of masks matching nicknames that should be
treated as IRC services when introduced via this remote server, separated

View File

@ -113,6 +113,12 @@ ConfSSL_Init(void)
free(Conf_SSLOptions.CertFile);
Conf_SSLOptions.CertFile = NULL;
free(Conf_SSLOptions.CAFile);
Conf_SSLOptions.CAFile = NULL;
free(Conf_SSLOptions.CRLFile);
Conf_SSLOptions.CRLFile = NULL;
free(Conf_SSLOptions.DHFile);
Conf_SSLOptions.DHFile = NULL;
array_free_wipe(&Conf_SSLOptions.KeyFilePassword);
@ -465,7 +471,10 @@ Conf_Test( void )
printf( " Host = %s\n", Conf_Server[i].host );
printf( " Port = %u\n", (unsigned int)Conf_Server[i].port );
#ifdef SSL_SUPPORT
printf( " SSLConnect = %s\n", yesno_to_str(Conf_Server[i].SSLConnect));
printf(" SSLConnect = %s\n",
yesno_to_str(Conf_Server[i].SSLConnect));
printf(" SSLVerify = %s\n",
yesno_to_str(Conf_Server[i].SSLVerify));
#endif
printf( " MyPassword = %s\n", Conf_Server[i].pwd_in );
printf( " PeerPassword = %s\n", Conf_Server[i].pwd_out );
@ -1797,6 +1806,16 @@ Handle_SSL(const char *File, int Line, char *Var, char *Arg)
Conf_SSLOptions.CipherList = strdup_warn(Arg);
return;
}
if (strcasecmp(Var, "CAFile") == 0) {
assert(Conf_SSLOptions.CAFile == NULL);
Conf_SSLOptions.CAFile = strdup_warn(Arg);
return;
}
if (strcasecmp(Var, "CRLFile") == 0) {
assert(Conf_SSLOptions.CRLFile == NULL);
Conf_SSLOptions.CRLFile = strdup_warn(Arg);
return;
}
Config_Error_Section(File, Line, Var, "SSL");
}
@ -1927,7 +1946,11 @@ Handle_SERVER(const char *File, int Line, char *Var, char *Arg )
if( strcasecmp( Var, "SSLConnect" ) == 0 ) {
New_Server.SSLConnect = Check_ArgIsTrue(Arg);
return;
}
}
if (strcasecmp(Var, "SSLVerify") == 0) {
New_Server.SSLVerify = Check_ArgIsTrue(Arg);
return;
}
#endif
if( strcasecmp( Var, "Group" ) == 0 ) {
/* Server group */

View File

@ -61,6 +61,7 @@ typedef struct _Conf_Server
ng_ipaddr_t dst_addr[2]; /**< List of addresses to connect to */
#ifdef SSL_SUPPORT
bool SSLConnect; /**< Establish connection using SSL? */
bool SSLVerify; /**< Verify server certificate using CA? */
#endif
char svs_mask[CLIENT_ID_LEN]; /**< Mask of nicknames that should be
treated and counted as services */
@ -76,6 +77,8 @@ struct SSLOptions {
array ListenPorts; /**< Array of listening SSL ports */
array KeyFilePassword; /**< Key file password */
char *CipherList; /**< Set SSL cipher list to use */
char *CAFile; /**< Trusted CA certificates file */
char *CRLFile; /**< Certificate revocation file */
};
#endif

View File

@ -43,13 +43,17 @@ extern struct SSLOptions Conf_SSLOptions;
#include <openssl/err.h>
#include <openssl/rand.h>
#include <openssl/dh.h>
#include <openssl/x509v3.h>
static SSL_CTX * ssl_ctx;
static DH *dh_params;
static bool ConnSSL_LoadServerKey_openssl PARAMS(( SSL_CTX *c ));
static bool ConnSSL_SetVerifyProperties_openssl PARAMS((SSL_CTX * c));
#endif
#define MAX_CERT_CHAIN_LENGTH 10 /* XXX: do not hardcode */
#ifdef HAVE_LIBGNUTLS
#include <sys/types.h>
#include <sys/stat.h>
@ -74,6 +78,7 @@ static size_t x509_cred_idx;
static gnutls_dh_params_t dh_params;
static gnutls_priority_t priorities_cache = NULL;
static bool ConnSSL_LoadServerKey_gnutls PARAMS(( void ));
static bool ConnSSL_SetVerifyProperties_gnutls PARAMS((void));
#endif
#define SHA256_STRING_LEN (32 * 2 + 1)
@ -131,9 +136,37 @@ out:
/**
* Log OpenSSL error message.
*
* @param level The log level
* @param msg The error message.
* @param info Additional information text or NULL.
*/
static void
LogOpenSSL_CertInfo(int level, X509 * cert, const char *msg)
{
BIO *mem;
char *memptr;
long len;
assert(cert);
assert(msg);
if (!cert)
return;
mem = BIO_new(BIO_s_mem());
if (!mem)
return;
X509_NAME_print_ex(mem, X509_get_subject_name(cert), 4,
XN_FLAG_ONELINE);
X509_NAME_print_ex(mem, X509_get_issuer_name(cert), 4, XN_FLAG_ONELINE);
if (BIO_write(mem, "", 1) == 1) {
len = BIO_get_mem_data(mem, &memptr);
if (memptr && len > 0)
Log(level, "%s: \"%s\"", msg, memptr);
}
(void)BIO_set_close(mem, BIO_CLOSE);
BIO_free(mem);
}
static void
LogOpenSSLError(const char *error, const char *info)
{
@ -176,9 +209,16 @@ pem_passwd_cb(char *buf, int size, int rwflag, void *password)
static int
Verify_openssl(UNUSED int preverify_ok, UNUSED X509_STORE_CTX *x509_ctx)
Verify_openssl(int preverify_ok, X509_STORE_CTX * ctx)
{
return 1;
int err;
if (!preverify_ok) {
err = X509_STORE_CTX_get_error(ctx);
Log(LOG_ERR, "Certificate validation failed: %s",
X509_verify_cert_error_string(err));
}
return preverify_ok;
}
#endif
@ -354,7 +394,12 @@ ConnSSL_InitLibrary( void )
}
SSL_CTX_set_session_id_context(newctx, (unsigned char *)"ngircd", 6);
SSL_CTX_set_options(newctx, SSL_OP_SINGLE_DH_USE|SSL_OP_NO_SSLv2);
if (!ConnSSL_SetVerifyProperties_openssl(newctx))
goto out;
SSL_CTX_set_options(newctx,
SSL_OP_SINGLE_DH_USE | SSL_OP_NO_SSLv2 |
SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 | SSL_OP_NO_TLSv1_1 |
SSL_OP_NO_COMPRESSION);
SSL_CTX_set_mode(newctx, SSL_MODE_ENABLE_PARTIAL_WRITE);
SSL_CTX_set_verify(newctx, SSL_VERIFY_PEER|SSL_VERIFY_CLIENT_ONCE,
Verify_openssl);
@ -394,6 +439,9 @@ out:
goto out;
}
if (!ConnSSL_SetVerifyProperties_gnutls())
goto out;
Log(LOG_INFO, "GnuTLS %s initialized.", gnutls_check_version(NULL));
initialized = true;
return true;
@ -405,6 +453,37 @@ out:
#ifdef HAVE_LIBGNUTLS
static bool
ConnSSL_SetVerifyProperties_gnutls(void)
{
int err;
if (!Conf_SSLOptions.CAFile)
return true;
err = gnutls_certificate_set_x509_trust_file(x509_cred,
Conf_SSLOptions.CAFile,
GNUTLS_X509_FMT_PEM);
if (err < 0) {
Log(LOG_ERR, "Failed to load x509 trust file %s: %s",
Conf_SSLOptions.CAFile, gnutls_strerror(err));
return false;
}
if (Conf_SSLOptions.CRLFile) {
err =
gnutls_certificate_set_x509_crl_file(x509_cred,
Conf_SSLOptions.CRLFile,
GNUTLS_X509_FMT_PEM);
if (err < 0) {
Log(LOG_ERR, "Failed to load x509 crl file %s: %s",
Conf_SSLOptions.CRLFile, gnutls_strerror(err));
return false;
}
}
return true;
}
static bool
ConnSSL_LoadServerKey_gnutls(void)
{
@ -531,6 +610,56 @@ ConnSSL_LoadServerKey_openssl(SSL_CTX *ctx)
}
static bool
ConnSSL_SetVerifyProperties_openssl(SSL_CTX * ctx)
{
X509_STORE *store = NULL;
X509_LOOKUP *lookup;
int verify_flags = SSL_VERIFY_PEER;
bool ret = false;
if (!Conf_SSLOptions.CAFile)
return true;
if (SSL_CTX_load_verify_locations(ctx, Conf_SSLOptions.CAFile, NULL) !=
1) {
LogOpenSSLError("SSL_CTX_load_verify_locations", NULL);
goto out;
}
if (Conf_SSLOptions.CRLFile) {
X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
SSL_CTX_set1_param(ctx, param);
store = SSL_CTX_get_cert_store(ctx);
assert(store);
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
if (!lookup) {
LogOpenSSLError("X509_STORE_add_lookup",
Conf_SSLOptions.CRLFile);
goto out;
}
if (X509_load_crl_file
(lookup, Conf_SSLOptions.CRLFile, X509_FILETYPE_PEM) != 1) {
LogOpenSSLError("X509_load_crl_file",
Conf_SSLOptions.CRLFile);
goto out;
}
}
SSL_CTX_set_verify(ctx, verify_flags, Verify_openssl);
SSL_CTX_set_verify_depth(ctx, MAX_CERT_CHAIN_LENGTH);
ret = true;
out:
if (Conf_SSLOptions.CRLFile)
free(Conf_SSLOptions.CRLFile);
Conf_SSLOptions.CRLFile = NULL;
return ret;
}
#endif
static bool
ConnSSL_Init_SSL(CONNECTION *c)
@ -602,7 +731,7 @@ ConnSSL_Init_SSL(CONNECTION *c)
bool
ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
ConnSSL_PrepareConnect(CONNECTION * c, CONF_SERVER * s)
{
bool ret;
#ifdef HAVE_LIBGNUTLS
@ -613,7 +742,7 @@ ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
Log(LOG_ERR, "Failed to initialize new SSL session: %s",
gnutls_strerror(err));
return false;
}
}
#endif
ret = ConnSSL_Init_SSL(c);
if (!ret)
@ -621,7 +750,23 @@ ConnSSL_PrepareConnect(CONNECTION *c, UNUSED CONF_SERVER *s)
Conn_OPTION_ADD(c, CONN_SSL_CONNECT);
#ifdef HAVE_LIBSSL
assert(c->ssl_state.ssl);
SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_NONE, NULL);
if (s->SSLVerify) {
X509_VERIFY_PARAM *param = NULL;
param = SSL_get0_param(c->ssl_state.ssl);
X509_VERIFY_PARAM_set_hostflags(param,
X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
Log(LOG_ERR, "DEBUG: Setting up hostname verification for '%s'", s->host);
int err = X509_VERIFY_PARAM_set1_host(param, s->host, 0);
if (err != 1) {
Log(LOG_ERR,
"Cannot set up hostname verification for '%s': %u",
s->host, err);
return false;
}
SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_PEER,
Verify_openssl);
} else
SSL_set_verify(c->ssl_state.ssl, SSL_VERIFY_NONE, NULL);
#endif
return true;
}
@ -720,18 +865,102 @@ ConnSSL_HandleError(CONNECTION * c, const int code, const char *fname)
}
static void
ConnSSL_LogCertInfo( CONNECTION *c )
#ifdef HAVE_LIBGNUTLS
static void *
LogMalloc(size_t s)
{
void *mem = malloc(s);
if (!mem)
Log(LOG_ERR, "Out of memory: Could not allocate %lu byte",
(unsigned long)s);
return mem;
}
static void
LogGnuTLS_CertInfo(int level, gnutls_x509_crt_t cert, const char *msg)
{
char *dn, *issuer_dn;
size_t size = 0;
int err = gnutls_x509_crt_get_dn(cert, NULL, &size);
if (size == 0) {
Log(LOG_ERR, "gnutls_x509_crt_get_dn: size == 0");
return;
}
if (err && err != GNUTLS_E_SHORT_MEMORY_BUFFER)
goto err_crt_get;
dn = LogMalloc(size);
if (!dn)
return;
err = gnutls_x509_crt_get_dn(cert, dn, &size);
if (err)
goto err_crt_get;
gnutls_x509_crt_get_issuer_dn(cert, NULL, &size);
assert(size);
issuer_dn = LogMalloc(size);
if (!issuer_dn) {
Log(level, "%s: Distinguished Name: %s", msg, dn);
free(dn);
return;
}
gnutls_x509_crt_get_issuer_dn(cert, issuer_dn, &size);
Log(level, "%s: Distinguished Name: \"%s\", Issuer \"%s\"", msg, dn,
issuer_dn);
free(dn);
free(issuer_dn);
return;
err_crt_get:
Log(LOG_ERR, "gnutls_x509_crt_get_dn: %s", gnutls_strerror(err));
return;
}
#endif
static void
ConnSSL_LogCertInfo( CONNECTION * c, bool connect)
{
bool cert_seen = false, cert_ok = false;
char msg[128];
#ifdef HAVE_LIBSSL
const char *comp_alg = "no compression";
const void *comp;
X509 *peer_cert = NULL;
SSL *ssl = c->ssl_state.ssl;
assert(ssl);
Log(LOG_INFO, "Connection %d: initialized %s using cipher %s.",
c->sock, SSL_get_version(ssl), SSL_get_cipher(ssl));
comp = SSL_get_current_compression(ssl);
if (comp)
comp_alg = SSL_COMP_get_name(comp);
Log(LOG_INFO, "Connection %d: initialized %s using cipher %s, %s.",
c->sock, SSL_get_version(ssl), SSL_get_cipher(ssl), comp_alg);
peer_cert = SSL_get_peer_certificate(ssl);
if (peer_cert && connect) {
cert_seen = true;
/* Client: Check server certificate */
int err = SSL_get_verify_result(ssl);
if (err == X509_V_OK) {
const char *peername = SSL_get0_peername(ssl);
if (peername != NULL)
cert_ok = true;
Log(LOG_ERR, "X509_V_OK, peername = '%s'", peername);
} else
Log(LOG_ERR, "Certificate validation failed: %s",
X509_verify_cert_error_string(err));
snprintf(msg, sizeof(msg), "%svalid peer certificate",
cert_ok ? "" : "in");
LogOpenSSL_CertInfo(cert_ok ? LOG_DEBUG : LOG_ERR, peer_cert,
msg);
X509_free(peer_cert);
}
#endif
#ifdef HAVE_LIBGNUTLS
unsigned int status;
gnutls_credentials_type_t cred;
gnutls_session_t sess = c->ssl_state.gnutls_session;
gnutls_cipher_algorithm_t cipher = gnutls_cipher_get(sess);
@ -740,7 +969,81 @@ ConnSSL_LogCertInfo( CONNECTION *c )
gnutls_protocol_get_name(gnutls_protocol_get_version(sess)),
gnutls_cipher_get_name(cipher),
gnutls_mac_get_name(gnutls_mac_get(sess)));
cred = gnutls_auth_get_type(c->ssl_state.gnutls_session);
if (cred == GNUTLS_CRD_CERTIFICATE && connect) {
cert_seen = true;
int verify =
gnutls_certificate_verify_peers2(c->
ssl_state.gnutls_session,
&status);
Log(LOG_ERR, "DEBUG: verify = %d", verify);
if (verify < 0) {
Log(LOG_ERR,
"gnutls_certificate_verify_peers2 failed: %s",
gnutls_strerror(verify));
goto done_cn_validation;
} else if (status) {
gnutls_datum_t out;
if (gnutls_certificate_verification_status_print
(status, gnutls_certificate_type_get(sess), &out,
0) == GNUTLS_E_SUCCESS) {
Log(LOG_ERR,
"Certificate validation failed: %s",
out.data);
gnutls_free(out.data);
}
}
Log(LOG_ERR, "DEBUG: status = %d", status);
gnutls_x509_crt_t cert;
unsigned cert_list_size;
const gnutls_datum_t *cert_list =
gnutls_certificate_get_peers(sess, &cert_list_size);
if (!cert_list || cert_list_size == 0) {
Log(LOG_ERR, "No certificates found");
goto done_cn_validation;
}
int err = gnutls_x509_crt_init(&cert);
if (err < 0) {
Log(LOG_ERR,
"Failed to initialize x509 certificate: %s",
gnutls_strerror(err));
goto done_cn_validation;
}
err = gnutls_x509_crt_import(cert, cert_list,
GNUTLS_X509_FMT_DER);
if (err < 0) {
Log(LOG_ERR, "Failed to parse the certificate: %s",
gnutls_strerror(err));
goto done_cn_validation;
}
err = gnutls_x509_crt_check_hostname(cert, c->host);
if (err == 0)
Log(LOG_ERR,
"Failed to verify the hostname, expected \"%s\"",
c->host);
else
cert_ok = verify == 0 && status == 0;
snprintf(msg, sizeof(msg), "%svalid peer certificate",
cert_ok ? "" : "in");
LogGnuTLS_CertInfo(cert_ok ? LOG_DEBUG : LOG_ERR, cert, msg);
gnutls_x509_crt_deinit(cert);
done_cn_validation:
;
}
#endif
/*
* can be used later to check if connection was authenticated, e.g.
* if inbound connection tries to register itself as server.
* Could also restrict /OPER to authenticated connections, etc.
*/
if (cert_ok)
Conn_OPTION_ADD(c, CONN_SSL_PEERCERT_OK);
if (!cert_seen)
Log(LOG_INFO, "Peer did not present a certificate");
}
@ -879,7 +1182,7 @@ ConnectAccept( CONNECTION *c, bool connect)
(void)ConnSSL_InitCertFp(c);
Conn_OPTION_DEL(c, (CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ|CONN_SSL_CONNECT));
ConnSSL_LogCertInfo(c);
ConnSSL_LogCertInfo(c, connect);
Conn_StartLogin(CONNECTION2ID(c));
return 1;

View File

@ -2563,6 +2563,7 @@ static void
cb_connserver_login_ssl(int sock, short unused)
{
CONN_ID idx = Socket2Index(sock);
int serveridx;
(void) unused;
@ -2581,10 +2582,30 @@ cb_connserver_login_ssl(int sock, short unused)
return;
}
serveridx = Conf_GetServer(idx);
assert(serveridx >= 0);
if (serveridx < 0)
goto err;
Log( LOG_INFO, "SSL connection %d with \"%s:%d\" established.", idx,
My_Connections[idx].host, Conf_Server[Conf_GetServer( idx )].port );
if (!Conn_OPTION_ISSET(&My_Connections[idx], CONN_SSL_PEERCERT_OK)) {
if (Conf_Server[serveridx].SSLVerify) {
Log(LOG_ERR,
"SSLVerify enabled for %d, but peer certificate check failed",
idx);
goto err;
}
Log(LOG_WARNING,
"Peer certificate check failed for %d, but SSLVerify is disabled, continuing",
idx);
}
server_login(idx);
return;
err:
Log(LOG_ERR, "SSL connection on socket %d failed!", sock);
Conn_Close(idx, "Can't connect!", NULL, false);
}

View File

@ -40,7 +40,8 @@
#define CONN_SSL 32 /* this connection is SSL encrypted */
#define CONN_SSL_WANT_WRITE 64 /* SSL/TLS library needs to write protocol data */
#define CONN_SSL_WANT_READ 128 /* SSL/TLS library needs to read protocol data */
#define CONN_SSL_FLAGS_ALL (CONN_SSL_CONNECT|CONN_SSL|CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ)
#define CONN_SSL_PEERCERT_OK 256 /* peer presented a valid certificate (used to check inbound server auth */
#define CONN_SSL_FLAGS_ALL (CONN_SSL_CONNECT|CONN_SSL|CONN_SSL_WANT_WRITE|CONN_SSL_WANT_READ|CONN_SSL_PEERCERT_OK)
#endif
typedef int CONN_ID;