/* * Copyright (C) 2003-2016 Free Software Foundation, Inc. * Copyright (C) 2015-2016 Red Hat, Inc. * Copyright (C) 2002 Andrew McDonald * * This file is part of GnuTLS. * * The GnuTLS is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * as published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program. If not, see * */ #include "gnutls_int.h" #include #include #include #include "errors.h" #include #include #include /** * gnutls_x509_crt_check_hostname: * @cert: should contain an gnutls_x509_crt_t type * @hostname: A null terminated string that contains a DNS name * * This function will check if the given certificate's subject matches * the given hostname. This is a basic implementation of the matching * described in RFC6125, and takes into account wildcards, * and the DNSName/IPAddress subject alternative name PKIX extension. * * For details see also gnutls_x509_crt_check_hostname2(). * * Returns: non-zero for a successful match, and zero on failure. **/ unsigned gnutls_x509_crt_check_hostname(gnutls_x509_crt_t cert, const char *hostname) { return gnutls_x509_crt_check_hostname2(cert, hostname, 0); } static int check_ip(gnutls_x509_crt_t cert, const void *ip, unsigned ip_size) { char temp[16]; size_t temp_size; unsigned i; int ret = 0; /* try matching against: * 1) a IPaddress alternative name (subjectAltName) extension * in the certificate */ /* Check through all included subjectAltName extensions, comparing * against all those of type IPAddress. */ for (i = 0; !(ret < 0); i++) { temp_size = sizeof(temp); ret = gnutls_x509_crt_get_subject_alt_name(cert, i, temp, &temp_size, NULL); if (ret == GNUTLS_SAN_IPADDRESS) { if (temp_size == ip_size && memcmp(temp, ip, ip_size) == 0) return 1; } else if (ret == GNUTLS_E_SHORT_MEMORY_BUFFER) { ret = 0; } } /* not found a matching IP */ return 0; } /** * gnutls_x509_crt_check_ip: * @cert: should contain an gnutls_x509_crt_t type * @ip: A pointer to the raw IP address * @ip_size: the number of bytes in ip (4 or 16) * @flags: should be zero * * This function will check if the IP allowed IP addresses in * the certificate's subject alternative name match the provided * IP address. * * Returns: non-zero for a successful match, and zero on failure. **/ unsigned gnutls_x509_crt_check_ip(gnutls_x509_crt_t cert, const unsigned char *ip, unsigned int ip_size, unsigned int flags) { return check_ip(cert, ip, ip_size); } /* whether gnutls_x509_crt_check_hostname2() will consider these * alternative name types. This is to satisfy RFC6125 requirement * that we do not fallback to CN-ID if we encounter a supported name * type. */ #define IS_SAN_SUPPORTED(san) (san==GNUTLS_SAN_DNSNAME||san==GNUTLS_SAN_IPADDRESS) /** * gnutls_x509_crt_check_hostname2: * @cert: should contain an gnutls_x509_crt_t type * @hostname: A null terminated string that contains a DNS name * @flags: gnutls_certificate_verify_flags * * This function will check if the given certificate's subject matches * the given hostname. This is a basic implementation of the matching * described in RFC6125, and takes into account wildcards, * and the DNSName/IPAddress subject alternative name PKIX extension. * * IPv4 addresses are accepted by this function in the dotted-decimal * format (e.g, ddd.ddd.ddd.ddd), and IPv6 addresses in the hexadecimal * x:x:x:x:x:x:x:x format. For them the IPAddress subject alternative * name extension is consulted. Previous versions to 3.6.0 of GnuTLS * in case of a non-match would consult (in a non-standard extension) * the DNSname and CN fields. This is no longer the case. * * When the flag %GNUTLS_VERIFY_DO_NOT_ALLOW_WILDCARDS is specified no * wildcards are considered. Otherwise they are only considered if the * domain name consists of three components or more, and the wildcard * starts at the leftmost position. * When the flag %GNUTLS_VERIFY_DO_NOT_ALLOW_IP_MATCHES is specified, * the input will be treated as a DNS name, and matching of textual IP addresses * against the IPAddress part of the alternative name will not be allowed. * * The function gnutls_x509_crt_check_ip() is available for matching * IP addresses. * * Returns: non-zero for a successful match, and zero on failure. * * Since: 3.3.0 **/ unsigned gnutls_x509_crt_check_hostname2(gnutls_x509_crt_t cert, const char *hostname, unsigned int flags) { char dnsname[MAX_CN]; size_t dnsnamesize; int found_dnsname = 0; int ret = 0; int i = 0; struct in_addr ipv4; char *p = NULL; char *a_hostname; unsigned have_other_addresses = 0; gnutls_datum_t out; /* check whether @hostname is an ip address */ if (!(flags & GNUTLS_VERIFY_DO_NOT_ALLOW_IP_MATCHES) && ((p=strchr(hostname, ':')) != NULL || inet_pton(AF_INET, hostname, &ipv4) != 0)) { if (p != NULL) { struct in6_addr ipv6; ret = inet_pton(AF_INET6, hostname, &ipv6); if (ret == 0) { gnutls_assert(); goto hostname_fallback; } ret = check_ip(cert, &ipv6, 16); } else { ret = check_ip(cert, &ipv4, 4); } /* Prior to 3.6.0 we were accepting misconfigured servers, that place their IP * in the DNS field of subjectAlternativeName. That is no longer the case. */ return ret; } hostname_fallback: /* convert the provided hostname to ACE-Labels domain. */ ret = gnutls_idna_map (hostname, strlen(hostname), &out, 0); if (ret < 0) { _gnutls_debug_log("unable to convert hostname %s to IDNA format\n", hostname); a_hostname = (char*)hostname; } else { a_hostname = (char*)out.data; } /* try matching against: * 1) a DNS name as an alternative name (subjectAltName) extension * in the certificate * 2) the common name (CN) in the certificate, if the certificate is acceptable for TLS_WWW_SERVER purpose * * either of these may be of the form: *.domain.tld * * only try (2) if there is no subjectAltName extension of * type dNSName, and there is a single CN. */ /* Check through all included subjectAltName extensions, comparing * against all those of type dNSName. */ for (i = 0; !(ret < 0); i++) { dnsnamesize = sizeof(dnsname); ret = gnutls_x509_crt_get_subject_alt_name(cert, i, dnsname, &dnsnamesize, NULL); if (ret == GNUTLS_SAN_DNSNAME) { found_dnsname = 1; if (_gnutls_has_embedded_null(dnsname, dnsnamesize)) { _gnutls_debug_log("certificate has %s with embedded null in name\n", dnsname); continue; } if (!_gnutls_str_is_print(dnsname, dnsnamesize)) { _gnutls_debug_log("invalid (non-ASCII) name in certificate %.*s\n", (int)dnsnamesize, dnsname); continue; } ret = _gnutls_hostname_compare(dnsname, dnsnamesize, a_hostname, flags); if (ret != 0) { ret = 1; goto cleanup; } } else { if (IS_SAN_SUPPORTED(ret)) have_other_addresses = 1; } } if (!have_other_addresses && !found_dnsname && _gnutls_check_key_purpose(cert, GNUTLS_KP_TLS_WWW_SERVER, 0) != 0) { /* did not get the necessary extension, use CN instead, if the * certificate would have been acceptable for a TLS WWW server purpose. * That is because only for that purpose the CN is a valid field to * store the hostname. */ /* enforce the RFC6125 (ยง1.8) requirement that only * a single CN must be present */ dnsnamesize = sizeof(dnsname); ret = gnutls_x509_crt_get_dn_by_oid (cert, OID_X520_COMMON_NAME, 1, 0, dnsname, &dnsnamesize); if (ret != GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) { ret = 0; goto cleanup; } dnsnamesize = sizeof(dnsname); ret = gnutls_x509_crt_get_dn_by_oid (cert, OID_X520_COMMON_NAME, 0, 0, dnsname, &dnsnamesize); if (ret < 0) { ret = 0; goto cleanup; } if (_gnutls_has_embedded_null(dnsname, dnsnamesize)) { _gnutls_debug_log("certificate has CN %s with embedded null in name\n", dnsname); ret = 0; goto cleanup; } if (!_gnutls_str_is_print(dnsname, dnsnamesize)) { _gnutls_debug_log("invalid (non-ASCII) name in certificate CN %.*s\n", (int)dnsnamesize, dnsname); ret = 0; goto cleanup; } ret = _gnutls_hostname_compare(dnsname, dnsnamesize, a_hostname, flags); if (ret != 0) { ret = 1; goto cleanup; } } /* not found a matching name */ ret = 0; cleanup: if (a_hostname != hostname) { gnutls_free(a_hostname); } return ret; }