summaryrefslogtreecommitdiff
path: root/vchat-ssl.c
diff options
context:
space:
mode:
Diffstat (limited to 'vchat-ssl.c')
-rwxr-xr-xvchat-ssl.c210
1 files changed, 109 insertions, 101 deletions
diff --git a/vchat-ssl.c b/vchat-ssl.c
index ef5b96e..b344d10 100755
--- a/vchat-ssl.c
+++ b/vchat-ssl.c
@@ -154,8 +154,21 @@ static SSL_CTX * vc_create_sslctx( vc_x509store_t *vc_store )
154 154
155int vc_connect_ssl( BIO **conn, vc_x509store_t *vc_store ) 155int vc_connect_ssl( BIO **conn, vc_x509store_t *vc_store )
156{ 156{
157 BIO *ssl_conn = NULL;
158 SSL_CTX * ctx = vc_create_sslctx(vc_store); 157 SSL_CTX * ctx = vc_create_sslctx(vc_store);
158 X509 *peercert = NULL;
159 BIO *ssl_conn = NULL;
160 const SSL *sslp = NULL;
161 const SSL_CIPHER * cipher = NULL;
162
163 /* To display and check server fingerprint */
164 char fingerprint[EVP_MAX_MD_SIZE*4];
165 unsigned char fingerprint_bin[EVP_MAX_MD_SIZE];
166 unsigned int fingerprint_len;
167
168 FILE *fingerprint_file = NULL;
169 char * fp = fingerprint;
170
171 long result;
159 172
160 if( !ctx ) 173 if( !ctx )
161 return 1; 174 return 1;
@@ -163,112 +176,107 @@ int vc_connect_ssl( BIO **conn, vc_x509store_t *vc_store )
163 ssl_conn = BIO_new_ssl(ctx, 1); 176 ssl_conn = BIO_new_ssl(ctx, 1);
164 SSL_CTX_free(ctx); 177 SSL_CTX_free(ctx);
165 178
166 if( ssl_conn ) { 179 if( !ssl_conn )
167 BIO_push( ssl_conn, *conn ); 180 goto ssl_error;
168 *conn = ssl_conn; 181
169 fflush(stdout); 182 BIO_push( ssl_conn, *conn );
170 183 *conn = ssl_conn;
171 if( BIO_do_handshake( *conn ) > 0 ) { 184 fflush(stdout);
172 /* Show information about cipher used */ 185
173 const SSL *sslp = NULL; 186 if( BIO_do_handshake( *conn ) <= 0 )
174 const SSL_CIPHER * cipher = NULL; 187 goto ssl_error;
175 188
176 /* Get cipher object */ 189 /* Show information about cipher used */
177 BIO_get_ssl(ssl_conn, &sslp); 190 /* Get cipher object */
178 if (sslp) 191 BIO_get_ssl(ssl_conn, &sslp);
179 cipher = SSL_get_current_cipher(sslp); 192 if (sslp)
180 if (cipher) { 193 cipher = SSL_get_current_cipher(sslp);
181 char cipher_desc[TMPSTRSIZE]; 194 if (cipher) {
182 snprintf(tmpstr, TMPSTRSIZE, "[SSL CIPHER ] %s", SSL_CIPHER_description(cipher, cipher_desc, TMPSTRSIZE)); 195 char cipher_desc[TMPSTRSIZE];
183 writecf(FS_SERV, tmpstr); 196 snprintf(tmpstr, TMPSTRSIZE, "[SSL CIPHER ] %s", SSL_CIPHER_description(cipher, cipher_desc, TMPSTRSIZE));
184 } else { 197 writecf(FS_SERV, tmpstr);
185 snprintf(tmpstr, TMPSTRSIZE, "[SSL ERROR ] Cipher not known / SSL object can't be queried!"); 198 } else {
186 writecf(FS_ERR, tmpstr); 199 snprintf(tmpstr, TMPSTRSIZE, "[SSL ERROR ] Cipher not known / SSL object can't be queried!");
187 } 200 writecf(FS_ERR, tmpstr);
201 }
188 202
189 /* Accept being connected, _if_ verification passed */ 203 /* Accept being connected, _if_ verification passed */
190 if (sslp) { 204 if (!sslp)
191 long result = SSL_get_verify_result(sslp); 205 goto ssl_error;
192#if 1 == 1 206
193 if (result == X509_V_OK) { 207 peercert = SSL_get_peer_certificate(sslp);
208 if (!peercert)
209 goto ssl_error;
210
211 /* show basic information about peer cert */
212 snprintf(tmpstr, TMPSTRSIZE, "[SSL SUBJECT ] %s", X509_NAME_oneline(X509_get_subject_name(peercert),0,0));
213 writecf(FS_SERV, tmpstr);
214 snprintf(tmpstr, TMPSTRSIZE, "[SSL ISSUER ] %s", X509_NAME_oneline(X509_get_issuer_name(peercert),0,0));
215 writecf(FS_SERV, tmpstr);
216
217 /* calculate fingerprint */
218 if (!X509_digest(peercert,EVP_sha1(),fingerprint_bin,&fingerprint_len))
219 goto ssl_error;
220
221 assert ( ( fingerprint_len > 1 ) && (fingerprint_len <= EVP_MAX_MD_SIZE ));
222 for (j=0; j<(int)fingerprint_len; j++)
223 fp += sprintf(nf, "%02X:", fingerprint_bin[j]);
224 assert ( fp > fingerprint );
225 fp[-1] = 0;
226 snprintf(tmpstr, TMPSTRSIZE, "[SSL FINGERPRINT ] from server: %s", fingerprint);
227 writecf(FS_SERV, tmpstr);
228
229 /* we don't need the peercert anymore */
230 X509_free(peercert);
231
232 /* If verify of x509 chain was requested, do the check here */
233 result = SSL_get_verify_result(sslp);
234 if (result != X509_V_OK && !getintoption(CF_IGNSSL) )
235 goto ssl_error;
236
237 if (result != X509_V_OK)
238 writecf(FS_ERR, "[SSL VERIFY ERROR ] FAILURE IGNORED!!!");
239
240 /* verify fingerprint */
241 if (getintoption(CF_PIN_FINGERPRINT)) {
242
243 fingerprint_file = fopen(tilde_expand(getstroption(CF_FINGERPRINT)), "r");
244 if (fingerprint_file) {
245
246 /* Read fingerprint from file */
247 char old_fingerprint[EVP_MAX_MD_SIZE*4];
248 char * r = fgets(old_fingerprint, sizeof(old_fingerprint), fingerprint_file);
249 fclose(fingerprint_file);
250
251 if (r) {
252 /* chomp */
253 char *nl = strchr(r, '\n');
254 if (nl) *nl = 0;
255
256 /* verify fingerprint matches stored version */
257 if (!strcmp(fingerprint, old_fingerprint))
194 return 0; 258 return 0;
195 } else if (getintoption(CF_IGNSSL)) {
196 writecf(FS_ERR, "[SSL VERIFY ERROR ] FAILURE IGNORED!!!");
197 return 0;
198 }
199#else
200 /* show & verify fingerprint */
201 if ((result == X509_V_OK) || getintoption(CF_IGNSSL)) {
202 X509 *peercert = SSL_get_peer_certificate(sslp);
203
204 /* FIXME: this IS bad code */
205 char new_fingerprint[TMPSTRSIZE];
206 char old_fingerprint[TMPSTRSIZE];
207 FILE *fingerprint_file = NULL;
208
209 unsigned int fingerprint_len;
210 unsigned char fingerprint_bin[EVP_MAX_MD_SIZE];
211
212 /* show basic information about peer cert */
213 snprintf(tmpstr, TMPSTRSIZE, "[SSL SUBJECT ] %s", X509_NAME_oneline(X509_get_subject_name(peercert),0,0));
214 writecf(FS_SERV, tmpstr);
215 snprintf(tmpstr, TMPSTRSIZE, "[SSL ISSUER ] %s", X509_NAME_oneline(X509_get_issuer_name(peercert),0,0));
216 writecf(FS_SERV, tmpstr);
217
218 /* calculate fingerprint */
219 if (X509_digest(peercert,EVP_sha1(),fingerprint_bin,&fingerprint_len)) {
220 int j;
221 assert ( ( fingerprint_len > 1 ) && (fingerprint_len * 3 < TMPSTRSIZE ));
222 char * nf = new_fingerprint;
223 for (j=0; j<(int)fingerprint_len; j++)
224 nf += snprintf(nf, 4, "%02X:", fingerprint_bin[j]);
225 assert ( nf > new_fingerprint );
226 nf[-1] = 0;
227 snprintf(tmpstr, TMPSTRSIZE, "[SSL FINGERPRINT ] from server: %s", new_fingerprint);
228 writecf(FS_SERV, tmpstr);
229 }
230
231 // we don't need the peercert anymore
232 X509_free(peercert);
233
234 fingerprint_file = fopen(tilde_expand(getstroption(CF_FINGERPRINT)), "r");
235 if (fingerprint_file) {
236 char * r = fgets(old_fingerprint, TMPSTRSIZE, fingerprint_file);
237 fclose(fingerprint_file);
238
239 if (r) {
240 // chomp
241 char *nl = strchr(r, '\n');
242 if (nl) *nl = 0;
243
244 /* verify fingerprint matches stored version */
245 if (!strcmp(new_fingerprint, old_fingerprint))
246 return 0;
247 }
248
249 snprintf(tmpstr, TMPSTRSIZE, "[SSL FINGERPRINT ] from %s: %s", getstroption(CF_FINGERPRINT), r ? old_fingerprint : "<FILE READ ERROR>" );
250 writecf(FS_ERR, tmpstr);
251 writecf(FS_ERR, "[SSL CONNECT ERROR] Fingerprint mismatch! Server cert updated?");
252 return 1;
253 } else {
254 /* FIXME: there might be other errors than missing file */
255 fingerprint_file = fopen(tilde_expand(getstroption(CF_FINGERPRINT)), "w");
256 if (!fingerprint_file) {
257 snprintf (tmpstr, TMPSTRSIZE, "Can't write fingerprint file, %s.", strerror(errno));
258 writecf(FS_ERR, tmpstr);
259 } else {
260 fputs(new_fingerprint, fingerprint_file);
261 fclose(fingerprint_file);
262 writecf(FS_SERV, "Stored fingerprint.");
263 return 0;
264 }
265 }
266 }
267#endif
268 } 259 }
260
261 snprintf(tmpstr, TMPSTRSIZE, "[SSL FINGERPRINT ] from %s: %s", getstroption(CF_FINGERPRINT), r ? old_fingerprint : "<FILE READ ERROR>" );
262 writecf(FS_ERR, tmpstr);
263 writecf(FS_ERR, "[SSL CONNECT ERROR] Fingerprint mismatch! Server cert updated?");
264 return 1;
265 }
266
267 fingerprint_file = fopen(tilde_expand(getstroption(CF_FINGERPRINT)), "w");
268 if (!fingerprint_file) {
269 snprintf (tmpstr, TMPSTRSIZE, "[WARNING] Can't write fingerprint file, %s.", strerror(errno));
270 writecf(FS_ERR, tmpstr);
271 } else {
272 fputs(fingerprint, fingerprint_file);
273 fclose(fingerprint_file);
274 writecf(FS_SERV, "Stored fingerprint.");
269 } 275 }
276 return 0;
270 } 277 }
271 278
279ssl_error:
272 snprintf(tmpstr, TMPSTRSIZE, "[SSL CONNECT ERROR] %s", ERR_error_string (ERR_get_error (), NULL)); 280 snprintf(tmpstr, TMPSTRSIZE, "[SSL CONNECT ERROR] %s", ERR_error_string (ERR_get_error (), NULL));
273 writecf(FS_ERR, tmpstr); 281 writecf(FS_ERR, tmpstr);
274 282