17
ChangeLog
17
ChangeLog
@@ -1,3 +1,17 @@
|
|||||||
|
2001-12-27 Fumitoshi UKAI <ukai@debian.or.jp>
|
||||||
|
|
||||||
|
* [w3m-dev 02750] RFC2818 server identity check
|
||||||
|
* istream.c (ssl_certificate_validity): added
|
||||||
|
* istream.c (ssl_set_certificate_validity): added
|
||||||
|
* istream.c (ssl_get_certificate): use ssl_certificate_validity
|
||||||
|
* istream.h (ssl_set_certificate_validity): added
|
||||||
|
* url.c (ssl_verity_error_string): added
|
||||||
|
* url.c (openSSLHandle): add accept_this_site
|
||||||
|
* url.c (openSSLHandle): dont check by SSL_VERIFY_PEER,
|
||||||
|
use SSL_get_verify_result() instead
|
||||||
|
* url.c (openSSLHandle): check peer_certificate() and then
|
||||||
|
SSL_get_verify_result()
|
||||||
|
|
||||||
2001-12-27 Hironori Sakamoto <hsaka@mth.biglobe.ne.jp>
|
2001-12-27 Hironori Sakamoto <hsaka@mth.biglobe.ne.jp>
|
||||||
|
|
||||||
* [w3m-dev 02749] cleanup code for editor,mailer,extbrowser
|
* [w3m-dev 02749] cleanup code for editor,mailer,extbrowser
|
||||||
@@ -51,6 +65,7 @@
|
|||||||
|
|
||||||
2001-12-26 Fumitoshi UKAI <ukai@debian.or.jp>
|
2001-12-26 Fumitoshi UKAI <ukai@debian.or.jp>
|
||||||
|
|
||||||
|
* [w3m-dev 02745]
|
||||||
* istream.h: #include <x509v3.h> deleted
|
* istream.h: #include <x509v3.h> deleted
|
||||||
* istream.c: #include <x509v3.h>
|
* istream.c: #include <x509v3.h>
|
||||||
* istream.c (ssl_check_cert_ident): if subjectAltName dNSName found,
|
* istream.c (ssl_check_cert_ident): if subjectAltName dNSName found,
|
||||||
@@ -1671,4 +1686,4 @@
|
|||||||
* release-0-2-1
|
* release-0-2-1
|
||||||
* import w3m-0.2.1
|
* import w3m-0.2.1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.184 2001/12/26 18:29:33 ukai Exp $
|
$Id: ChangeLog,v 1.185 2001/12/26 18:46:33 ukai Exp $
|
||||||
|
|||||||
16
istream.c
16
istream.c
@@ -1,4 +1,4 @@
|
|||||||
/* $Id: istream.c,v 1.8 2001/12/26 12:58:49 ukai Exp $ */
|
/* $Id: istream.c,v 1.9 2001/12/26 18:46:33 ukai Exp $ */
|
||||||
#include "fm.h"
|
#include "fm.h"
|
||||||
#include "istream.h"
|
#include "istream.h"
|
||||||
#include <signal.h>
|
#include <signal.h>
|
||||||
@@ -357,6 +357,14 @@ ISeos(InputStream stream)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifdef USE_SSL
|
#ifdef USE_SSL
|
||||||
|
static Str ssl_certificate_validity;
|
||||||
|
|
||||||
|
void
|
||||||
|
ssl_set_certificate_validity(Str msg)
|
||||||
|
{
|
||||||
|
ssl_certificate_validity = msg;
|
||||||
|
}
|
||||||
|
|
||||||
Str
|
Str
|
||||||
ssl_get_certificate(InputStream stream)
|
ssl_get_certificate(InputStream stream)
|
||||||
{
|
{
|
||||||
@@ -377,8 +385,12 @@ ssl_get_certificate(InputStream stream)
|
|||||||
bp = BIO_new(BIO_s_mem());
|
bp = BIO_new(BIO_s_mem());
|
||||||
X509_print(bp, x);
|
X509_print(bp, x);
|
||||||
len = (int)BIO_ctrl(bp, BIO_CTRL_INFO, 0, (char *)&p);
|
len = (int)BIO_ctrl(bp, BIO_CTRL_INFO, 0, (char *)&p);
|
||||||
s = Strnew_charp_n(p, len);
|
s = ssl_certificate_validity ? Strdup(ssl_certificate_validity)
|
||||||
|
: Strnew_charp("valid certificate");
|
||||||
|
Strcat_charp(s, "\n");
|
||||||
|
Strcat_charp_n(s, p, len);
|
||||||
BIO_free_all(bp);
|
BIO_free_all(bp);
|
||||||
|
X509_free(x);
|
||||||
return s;
|
return s;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
/* $Id: istream.h,v 1.6 2001/12/26 12:58:49 ukai Exp $ */
|
/* $Id: istream.h,v 1.7 2001/12/26 18:46:33 ukai Exp $ */
|
||||||
#ifndef IO_STREAM_H
|
#ifndef IO_STREAM_H
|
||||||
#define IO_STREAM_H
|
#define IO_STREAM_H
|
||||||
|
|
||||||
@@ -125,6 +125,7 @@ extern int ISread(InputStream stream, Str buf, int count);
|
|||||||
extern int ISfileno(InputStream stream);
|
extern int ISfileno(InputStream stream);
|
||||||
extern int ISeos(InputStream stream);
|
extern int ISeos(InputStream stream);
|
||||||
#ifdef USE_SSL
|
#ifdef USE_SSL
|
||||||
|
extern void ssl_set_certificate_validity(Str msg);
|
||||||
extern Str ssl_get_certificate(InputStream stream);
|
extern Str ssl_get_certificate(InputStream stream);
|
||||||
extern Str ssl_check_cert_ident(SSL * handle, char *hostname);
|
extern Str ssl_check_cert_ident(SSL * handle, char *hostname);
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
168
url.c
168
url.c
@@ -1,4 +1,4 @@
|
|||||||
/* $Id: url.c,v 1.24 2001/12/26 12:58:49 ukai Exp $ */
|
/* $Id: url.c,v 1.25 2001/12/26 18:46:33 ukai Exp $ */
|
||||||
#include "fm.h"
|
#include "fm.h"
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
@@ -272,6 +272,81 @@ init_PRNG()
|
|||||||
}
|
}
|
||||||
#endif /* SSLEAY_VERSION_NUMBER >= 0x00905100 */
|
#endif /* SSLEAY_VERSION_NUMBER >= 0x00905100 */
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef USE_SSL_VERIFY
|
||||||
|
static const char *
|
||||||
|
ssl_verify_error_string(unsigned long verr)
|
||||||
|
{
|
||||||
|
/* see verify(1ssl) - we can't use ERR_error_string()? */
|
||||||
|
switch (verr) {
|
||||||
|
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
|
||||||
|
return "Unable to get issuer cert";
|
||||||
|
case X509_V_ERR_UNABLE_TO_GET_CRL:
|
||||||
|
return "Unable to get CRL";
|
||||||
|
case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
|
||||||
|
return "Unable to decrypt cert signature";
|
||||||
|
case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE:
|
||||||
|
return "Unable to decrypt CRL signature";
|
||||||
|
case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
|
||||||
|
return "Unable to decode issuer public key";
|
||||||
|
case X509_V_ERR_CERT_SIGNATURE_FAILURE:
|
||||||
|
return "Certificate signature failture";
|
||||||
|
case X509_V_ERR_CRL_SIGNATURE_FAILURE:
|
||||||
|
return "CRL signature failture";
|
||||||
|
case X509_V_ERR_CERT_NOT_YET_VALID:
|
||||||
|
return "Certificate not yet valid";
|
||||||
|
case X509_V_ERR_CERT_HAS_EXPIRED:
|
||||||
|
return "Certificate has expired";
|
||||||
|
case X509_V_ERR_CRL_NOT_YET_VALID:
|
||||||
|
return "CRL not yet valid";
|
||||||
|
case X509_V_ERR_CRL_HAS_EXPIRED:
|
||||||
|
return "CRL has expired";
|
||||||
|
case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
|
||||||
|
return "Error in certificate Not Before: field";
|
||||||
|
case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
|
||||||
|
return "Error in certificate Not After: field";
|
||||||
|
case X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD:
|
||||||
|
return "Error in CRL Last Update: field";
|
||||||
|
case X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD:
|
||||||
|
return "Error in CRL Next Update: field";
|
||||||
|
case X509_V_ERR_OUT_OF_MEM:
|
||||||
|
return "Out of memory";
|
||||||
|
case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
|
||||||
|
return "Depth zero self signed certificate";
|
||||||
|
case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
|
||||||
|
return "Self signed certificate in chain";
|
||||||
|
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
|
||||||
|
return "Unable to get issuer certificate locally";
|
||||||
|
case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
|
||||||
|
return "Unable to verify leaf signature";
|
||||||
|
case X509_V_ERR_CERT_CHAIN_TOO_LONG:
|
||||||
|
return "Certificate chain too long";
|
||||||
|
case X509_V_ERR_CERT_REVOKED:
|
||||||
|
return "Certificate revoked";
|
||||||
|
case X509_V_ERR_INVALID_CA:
|
||||||
|
return "Invalid CA";
|
||||||
|
case X509_V_ERR_PATH_LENGTH_EXCEEDED:
|
||||||
|
return "Path length exceeded";
|
||||||
|
case X509_V_ERR_INVALID_PURPOSE:
|
||||||
|
return "Invalid purpose";
|
||||||
|
case X509_V_ERR_CERT_UNTRUSTED:
|
||||||
|
return "Certificate untrusted";
|
||||||
|
case X509_V_ERR_CERT_REJECTED:
|
||||||
|
return "Certificate rejected";
|
||||||
|
case X509_V_ERR_SUBJECT_ISSUER_MISMATCH:
|
||||||
|
return "Subject Issuer mismatch";
|
||||||
|
case X509_V_ERR_AKID_SKID_MISMATCH:
|
||||||
|
return "akid skid mismatch";
|
||||||
|
case X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH:
|
||||||
|
return "akid issuer serial mismatch";
|
||||||
|
case X509_V_ERR_KEYUSAGE_NO_CERTSIGN:
|
||||||
|
return "Keyusage no certsign";
|
||||||
|
default:
|
||||||
|
return "unknown verification error";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
static SSL *
|
static SSL *
|
||||||
openSSLHandle(int sock, char *hostname)
|
openSSLHandle(int sock, char *hostname)
|
||||||
{
|
{
|
||||||
@@ -282,6 +357,7 @@ openSSLHandle(int sock, char *hostname)
|
|||||||
static char *old_ssl_forbid_method = NULL;
|
static char *old_ssl_forbid_method = NULL;
|
||||||
#ifdef USE_SSL_VERIFY
|
#ifdef USE_SSL_VERIFY
|
||||||
static int old_ssl_verify_server = -1;
|
static int old_ssl_verify_server = -1;
|
||||||
|
static Str accept_this_site = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (!old_ssl_forbid_method || !ssl_forbid_method ||
|
if (!old_ssl_forbid_method || !ssl_forbid_method ||
|
||||||
@@ -300,6 +376,7 @@ openSSLHandle(int sock, char *hostname)
|
|||||||
}
|
}
|
||||||
if (ssl_path_modified) {
|
if (ssl_path_modified) {
|
||||||
free_ssl_ctx();
|
free_ssl_ctx();
|
||||||
|
accept_this_site = NULL;
|
||||||
ssl_path_modified = 0;
|
ssl_path_modified = 0;
|
||||||
}
|
}
|
||||||
#endif /* defined(USE_SSL_VERIFY) */
|
#endif /* defined(USE_SSL_VERIFY) */
|
||||||
@@ -327,9 +404,13 @@ openSSLHandle(int sock, char *hostname)
|
|||||||
SSL_CTX_set_options(ssl_ctx, option);
|
SSL_CTX_set_options(ssl_ctx, option);
|
||||||
#ifdef USE_SSL_VERIFY
|
#ifdef USE_SSL_VERIFY
|
||||||
/* derived from openssl-0.9.5/apps/s_{client,cb}.c */
|
/* derived from openssl-0.9.5/apps/s_{client,cb}.c */
|
||||||
|
#if 1 /* use SSL_get_verify_result() to verify cert */
|
||||||
|
SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, NULL);
|
||||||
|
#else
|
||||||
SSL_CTX_set_verify(ssl_ctx,
|
SSL_CTX_set_verify(ssl_ctx,
|
||||||
ssl_verify_server ? SSL_VERIFY_PEER :
|
ssl_verify_server ? SSL_VERIFY_PEER :
|
||||||
SSL_VERIFY_NONE, NULL);
|
SSL_VERIFY_NONE, NULL);
|
||||||
|
#endif
|
||||||
if (ssl_cert_file != NULL && *ssl_cert_file != '\0') {
|
if (ssl_cert_file != NULL && *ssl_cert_file != '\0') {
|
||||||
int ng = 1;
|
int ng = 1;
|
||||||
if (SSL_CTX_use_certificate_file
|
if (SSL_CTX_use_certificate_file
|
||||||
@@ -364,35 +445,77 @@ openSSLHandle(int sock, char *hostname)
|
|||||||
* The chain length is automatically checked by OpenSSL when we
|
* The chain length is automatically checked by OpenSSL when we
|
||||||
* set the verify depth in the ctx.
|
* set the verify depth in the ctx.
|
||||||
*/
|
*/
|
||||||
if (ssl_verify_server && (SSL_get_verify_result(handle) != X509_V_OK)) {
|
if (ssl_verify_server) {
|
||||||
emsg = Strnew_charp("Accept SSL session "
|
X509 *x;
|
||||||
"which certificate doesn't verify (y/n)?");
|
x = SSL_get_peer_certificate(handle);
|
||||||
term_raw();
|
if (x == NULL) {
|
||||||
ans = inputChar(emsg->ptr);
|
if (accept_this_site
|
||||||
if (tolower(*ans) == 'y') {
|
&& strcasecmp(accept_this_site->ptr, hostname) == 0)
|
||||||
amsg = Strnew_charp("Accept unsecure SSL session: "
|
ans = "y";
|
||||||
"unverified certificate");
|
else {
|
||||||
|
emsg = Strnew_charp("No SSL peer certificate: accept (y/n)?");
|
||||||
|
term_raw();
|
||||||
|
ans = inputChar(emsg->ptr);
|
||||||
|
}
|
||||||
|
if (tolower(*ans) == 'y')
|
||||||
|
amsg =
|
||||||
|
Strnew_charp
|
||||||
|
("Accept SSL session without any peer certificate");
|
||||||
|
else {
|
||||||
|
char *e = "This SSL session was rejected "
|
||||||
|
"to prevent security violation: no peer certificate";
|
||||||
|
disp_err_message(e, FALSE);
|
||||||
|
free_ssl_ctx();
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
char *e = "This SSL session was rejected "
|
unsigned long verr;
|
||||||
"to prevent security violation";
|
X509_free(x);
|
||||||
disp_err_message(e, FALSE);
|
if ((verr = SSL_get_verify_result(handle)) != X509_V_OK) {
|
||||||
free_ssl_ctx();
|
const char *em = ssl_verify_error_string(verr);
|
||||||
return NULL;
|
if (accept_this_site
|
||||||
|
&& strcasecmp(accept_this_site->ptr, hostname) == 0)
|
||||||
|
ans = "y";
|
||||||
|
else {
|
||||||
|
emsg = Sprintf("%s: accept (y/n)?", em);
|
||||||
|
term_raw();
|
||||||
|
ans = inputChar(emsg->ptr);
|
||||||
|
}
|
||||||
|
if (tolower(*ans) == 'y') {
|
||||||
|
amsg = Sprintf("Accept unsecure SSL session: "
|
||||||
|
"unverified: %s", em);
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
char *e =
|
||||||
|
Sprintf("This SSL session was rejected: %s", em)->ptr;
|
||||||
|
disp_err_message(e, FALSE);
|
||||||
|
free_ssl_ctx();
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else
|
||||||
#endif
|
#endif
|
||||||
|
amsg = Strnew_charp("Certificate is not verified");
|
||||||
|
|
||||||
emsg = ssl_check_cert_ident(handle, hostname);
|
emsg = ssl_check_cert_ident(handle, hostname);
|
||||||
if (emsg != NULL) {
|
if (emsg != NULL) {
|
||||||
if (emsg->length > COLS - 16)
|
if (accept_this_site
|
||||||
Strshrink(emsg, emsg->length - (COLS - 16));
|
&& strcasecmp(accept_this_site->ptr, hostname) == 0)
|
||||||
term_raw();
|
ans = "y";
|
||||||
Strcat_charp(emsg, ": accept(y/n)?");
|
else {
|
||||||
ans = inputChar(emsg->ptr);
|
Str ep = Strdup(emsg);
|
||||||
|
if (ep->length > COLS - 16)
|
||||||
|
Strshrink(ep, ep->length - (COLS - 16));
|
||||||
|
term_raw();
|
||||||
|
Strcat_charp(ep, ": accept(y/n)?");
|
||||||
|
ans = inputChar(ep->ptr);
|
||||||
|
}
|
||||||
if (tolower(*ans) == 'y') {
|
if (tolower(*ans) == 'y') {
|
||||||
amsg = Strnew_charp("Accept unsecure SSL session:"
|
amsg = Strnew_charp("Accept unsecure SSL session:");
|
||||||
"certificate ident mismatch");
|
Strcat(amsg, emsg);
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
char *e = "This SSL session was rejected "
|
char *e = "This SSL session was rejected "
|
||||||
@@ -402,10 +525,13 @@ openSSLHandle(int sock, char *hostname)
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
ssl_set_certificate_validity(amsg);
|
||||||
if (amsg)
|
if (amsg)
|
||||||
disp_err_message(amsg->ptr, FALSE);
|
disp_err_message(amsg->ptr, FALSE);
|
||||||
|
accept_this_site = Strnew_charp(hostname);
|
||||||
return handle;
|
return handle;
|
||||||
eend:
|
eend:
|
||||||
|
accept_this_site = NULL;
|
||||||
emsg = Sprintf("SSL error: %s", ERR_error_string(ERR_get_error(), NULL));
|
emsg = Sprintf("SSL error: %s", ERR_error_string(ERR_get_error(), NULL));
|
||||||
disp_err_message(emsg->ptr, FALSE);
|
disp_err_message(emsg->ptr, FALSE);
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|||||||
Reference in New Issue
Block a user