Add domain_match network profile parameter

This is similar with domain_suffix_match, but required a full match of
the domain name rather than allowing suffix match (subdomains) or
wildcard certificates.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2015-01-14 15:31:28 +02:00
parent 2099fed400
commit cebee30f31
10 changed files with 138 additions and 17 deletions

View file

@ -41,7 +41,8 @@ enum tls_fail_reason {
TLS_FAIL_ALTSUBJECT_MISMATCH = 6, TLS_FAIL_ALTSUBJECT_MISMATCH = 6,
TLS_FAIL_BAD_CERTIFICATE = 7, TLS_FAIL_BAD_CERTIFICATE = 7,
TLS_FAIL_SERVER_CHAIN_PROBE = 8, TLS_FAIL_SERVER_CHAIN_PROBE = 8,
TLS_FAIL_DOMAIN_SUFFIX_MISMATCH = 9 TLS_FAIL_DOMAIN_SUFFIX_MISMATCH = 9,
TLS_FAIL_DOMAIN_MISMATCH = 10,
}; };
@ -107,7 +108,11 @@ struct tls_config {
* @altsubject_match: String to match in the alternative subject of the peer * @altsubject_match: String to match in the alternative subject of the peer
* certificate or %NULL to allow all alternative subjects * certificate or %NULL to allow all alternative subjects
* @suffix_match: String to suffix match in the dNSName or CN of the peer * @suffix_match: String to suffix match in the dNSName or CN of the peer
* certificate or %NULL to allow all domain names * certificate or %NULL to allow all domain names. This may allow subdomains an
* wildcard certificates. Each domain name label must have a full match.
* @domain_match: String to match in the dNSName or CN of the peer
* certificate or %NULL to allow all domain names. This requires a full,
* case-insensitive match.
* @client_cert: File or reference name for client X.509 certificate in PEM or * @client_cert: File or reference name for client X.509 certificate in PEM or
* DER format * DER format
* @client_cert_blob: client_cert as inlined data or %NULL if not used * @client_cert_blob: client_cert as inlined data or %NULL if not used
@ -151,6 +156,7 @@ struct tls_connection_params {
const char *subject_match; const char *subject_match;
const char *altsubject_match; const char *altsubject_match;
const char *suffix_match; const char *suffix_match;
const char *domain_match;
const char *client_cert; const char *client_cert;
const u8 *client_cert_blob; const u8 *client_cert_blob;
size_t client_cert_blob_len; size_t client_cert_blob_len;

View file

@ -58,6 +58,7 @@ struct tls_connection {
gnutls_certificate_credentials_t xcred; gnutls_certificate_credentials_t xcred;
char *suffix_match; char *suffix_match;
char *domain_match;
unsigned int flags; unsigned int flags;
}; };
@ -280,6 +281,7 @@ void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn)
wpabuf_free(conn->push_buf); wpabuf_free(conn->push_buf);
wpabuf_free(conn->pull_buf); wpabuf_free(conn->pull_buf);
os_free(conn->suffix_match); os_free(conn->suffix_match);
os_free(conn->domain_match);
os_free(conn); os_free(conn);
} }
@ -363,6 +365,21 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
return -1; return -1;
} }
#if GNUTLS_VERSION_NUMBER >= 0x030300
os_free(conn->domain_match);
conn->domain_match = NULL;
if (params->domain_match) {
conn->domain_match = os_strdup(params->domain_match);
if (conn->domain_match == NULL)
return -1;
}
#else /* < 3.3.0 */
if (params->domain_match) {
wpa_printf(MSG_INFO, "GnuTLS: domain_match not supported");
return -1;
}
#endif /* >= 3.3.0 */
conn->flags = params->flags; conn->flags = params->flags;
if (params->openssl_ciphers) { if (params->openssl_ciphers) {
@ -1111,6 +1128,25 @@ static int tls_connection_verify_peer(gnutls_session_t session)
goto out; goto out;
} }
#if GNUTLS_VERSION_NUMBER >= 0x030300
if (conn->domain_match &&
!gnutls_x509_crt_check_hostname2(
cert, conn->domain_match,
GNUTLS_VERIFY_DO_NOT_ALLOW_WILDCARDS)) {
wpa_printf(MSG_WARNING,
"TLS: Domain match '%s' not found",
conn->domain_match);
gnutls_tls_fail_event(
conn, &certs[i], i, buf,
"Domain mismatch",
TLS_FAIL_DOMAIN_MISMATCH);
err = GNUTLS_A_BAD_CERTIFICATE;
gnutls_x509_crt_deinit(cert);
os_free(buf);
goto out;
}
#endif /* >= 3.3.0 */
/* TODO: validate altsubject_match. /* TODO: validate altsubject_match.
* For now, any such configuration is rejected in * For now, any such configuration is rejected in
* tls_connection_set_params() */ * tls_connection_set_params() */

View file

@ -205,6 +205,11 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
return -1; return -1;
} }
if (params->domain_match) {
wpa_printf(MSG_INFO, "TLS: domain_match not supported");
return -1;
}
if (params->openssl_ciphers) { if (params->openssl_ciphers) {
wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported"); wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported");
return -1; return -1;

View file

@ -96,7 +96,7 @@ struct tls_connection {
ENGINE *engine; /* functional reference to the engine */ ENGINE *engine; /* functional reference to the engine */
EVP_PKEY *private_key; /* the private key if using engine */ EVP_PKEY *private_key; /* the private key if using engine */
#endif /* OPENSSL_NO_ENGINE */ #endif /* OPENSSL_NO_ENGINE */
char *subject_match, *altsubject_match, *suffix_match; char *subject_match, *altsubject_match, *suffix_match, *domain_match;
int read_alerts, write_alerts, failed; int read_alerts, write_alerts, failed;
tls_session_ticket_cb session_ticket_cb; tls_session_ticket_cb session_ticket_cb;
@ -1098,6 +1098,7 @@ void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn)
os_free(conn->subject_match); os_free(conn->subject_match);
os_free(conn->altsubject_match); os_free(conn->altsubject_match);
os_free(conn->suffix_match); os_free(conn->suffix_match);
os_free(conn->domain_match);
os_free(conn->session_ticket); os_free(conn->session_ticket);
os_free(conn); os_free(conn);
} }
@ -1190,7 +1191,8 @@ static int tls_match_altsubject(X509 *cert, const char *match)
#ifndef CONFIG_NATIVE_WINDOWS #ifndef CONFIG_NATIVE_WINDOWS
static int domain_suffix_match(const u8 *val, size_t len, const char *match) static int domain_suffix_match(const u8 *val, size_t len, const char *match,
int full)
{ {
size_t i, match_len; size_t i, match_len;
@ -1203,7 +1205,7 @@ static int domain_suffix_match(const u8 *val, size_t len, const char *match)
} }
match_len = os_strlen(match); match_len = os_strlen(match);
if (match_len > len) if (match_len > len || (full && match_len != len))
return 0; return 0;
if (os_strncasecmp((const char *) val + len - match_len, match, if (os_strncasecmp((const char *) val + len - match_len, match,
@ -1222,7 +1224,7 @@ static int domain_suffix_match(const u8 *val, size_t len, const char *match)
#endif /* CONFIG_NATIVE_WINDOWS */ #endif /* CONFIG_NATIVE_WINDOWS */
static int tls_match_suffix(X509 *cert, const char *match) static int tls_match_suffix(X509 *cert, const char *match, int full)
{ {
#ifdef CONFIG_NATIVE_WINDOWS #ifdef CONFIG_NATIVE_WINDOWS
/* wincrypt.h has conflicting X509_NAME definition */ /* wincrypt.h has conflicting X509_NAME definition */
@ -1235,7 +1237,8 @@ static int tls_match_suffix(X509 *cert, const char *match)
int dns_name = 0; int dns_name = 0;
X509_NAME *name; X509_NAME *name;
wpa_printf(MSG_DEBUG, "TLS: Match domain against suffix %s", match); wpa_printf(MSG_DEBUG, "TLS: Match domain against %s%s",
full ? "": "suffix ", match);
ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
@ -1248,8 +1251,10 @@ static int tls_match_suffix(X509 *cert, const char *match)
gen->d.dNSName->data, gen->d.dNSName->data,
gen->d.dNSName->length); gen->d.dNSName->length);
if (domain_suffix_match(gen->d.dNSName->data, if (domain_suffix_match(gen->d.dNSName->data,
gen->d.dNSName->length, match) == 1) { gen->d.dNSName->length, match, full) ==
wpa_printf(MSG_DEBUG, "TLS: Suffix match in dNSName found"); 1) {
wpa_printf(MSG_DEBUG, "TLS: %s in dNSName found",
full ? "Match" : "Suffix match");
return 1; return 1;
} }
} }
@ -1276,13 +1281,16 @@ static int tls_match_suffix(X509 *cert, const char *match)
continue; continue;
wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName", wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName",
cn->data, cn->length); cn->data, cn->length);
if (domain_suffix_match(cn->data, cn->length, match) == 1) { if (domain_suffix_match(cn->data, cn->length, match, full) == 1)
wpa_printf(MSG_DEBUG, "TLS: Suffix match in commonName found"); {
wpa_printf(MSG_DEBUG, "TLS: %s in commonName found",
full ? "Match" : "Suffix match");
return 1; return 1;
} }
} }
wpa_printf(MSG_DEBUG, "TLS: No CommonName suffix match found"); wpa_printf(MSG_DEBUG, "TLS: No CommonName %smatch found",
full ? "": "suffix ");
return 0; return 0;
#endif /* CONFIG_NATIVE_WINDOWS */ #endif /* CONFIG_NATIVE_WINDOWS */
} }
@ -1465,7 +1473,7 @@ static int tls_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
SSL *ssl; SSL *ssl;
struct tls_connection *conn; struct tls_connection *conn;
struct tls_context *context; struct tls_context *context;
char *match, *altmatch, *suffix_match; char *match, *altmatch, *suffix_match, *domain_match;
const char *err_str; const char *err_str;
err_cert = X509_STORE_CTX_get_current_cert(x509_ctx); err_cert = X509_STORE_CTX_get_current_cert(x509_ctx);
@ -1493,6 +1501,7 @@ static int tls_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
match = conn->subject_match; match = conn->subject_match;
altmatch = conn->altsubject_match; altmatch = conn->altsubject_match;
suffix_match = conn->suffix_match; suffix_match = conn->suffix_match;
domain_match = conn->domain_match;
if (!preverify_ok && !conn->ca_cert_verify) if (!preverify_ok && !conn->ca_cert_verify)
preverify_ok = 1; preverify_ok = 1;
@ -1562,13 +1571,21 @@ static int tls_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
"AltSubject mismatch", "AltSubject mismatch",
TLS_FAIL_ALTSUBJECT_MISMATCH); TLS_FAIL_ALTSUBJECT_MISMATCH);
} else if (depth == 0 && suffix_match && } else if (depth == 0 && suffix_match &&
!tls_match_suffix(err_cert, suffix_match)) { !tls_match_suffix(err_cert, suffix_match, 0)) {
wpa_printf(MSG_WARNING, "TLS: Domain suffix match '%s' not found", wpa_printf(MSG_WARNING, "TLS: Domain suffix match '%s' not found",
suffix_match); suffix_match);
preverify_ok = 0; preverify_ok = 0;
openssl_tls_fail_event(conn, err_cert, err, depth, buf, openssl_tls_fail_event(conn, err_cert, err, depth, buf,
"Domain suffix mismatch", "Domain suffix mismatch",
TLS_FAIL_DOMAIN_SUFFIX_MISMATCH); TLS_FAIL_DOMAIN_SUFFIX_MISMATCH);
} else if (depth == 0 && domain_match &&
!tls_match_suffix(err_cert, domain_match, 1)) {
wpa_printf(MSG_WARNING, "TLS: Domain match '%s' not found",
domain_match);
preverify_ok = 0;
openssl_tls_fail_event(conn, err_cert, err, depth, buf,
"Domain mismatch",
TLS_FAIL_DOMAIN_MISMATCH);
} else } else
openssl_tls_cert_event(conn, err_cert, depth, buf); openssl_tls_cert_event(conn, err_cert, depth, buf);
@ -1832,7 +1849,8 @@ int tls_global_set_verify(void *ssl_ctx, int check_crl)
static int tls_connection_set_subject_match(struct tls_connection *conn, static int tls_connection_set_subject_match(struct tls_connection *conn,
const char *subject_match, const char *subject_match,
const char *altsubject_match, const char *altsubject_match,
const char *suffix_match) const char *suffix_match,
const char *domain_match)
{ {
os_free(conn->subject_match); os_free(conn->subject_match);
conn->subject_match = NULL; conn->subject_match = NULL;
@ -1858,6 +1876,14 @@ static int tls_connection_set_subject_match(struct tls_connection *conn,
return -1; return -1;
} }
os_free(conn->domain_match);
conn->domain_match = NULL;
if (domain_match) {
conn->domain_match = os_strdup(domain_match);
if (conn->domain_match == NULL)
return -1;
}
return 0; return 0;
} }
@ -3322,7 +3348,8 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
if (tls_connection_set_subject_match(conn, if (tls_connection_set_subject_match(conn,
params->subject_match, params->subject_match,
params->altsubject_match, params->altsubject_match,
params->suffix_match)) params->suffix_match,
params->domain_match))
return -1; return -1;
if (engine_id && ca_cert_id) { if (engine_id && ca_cert_id) {

View file

@ -707,6 +707,11 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
return -1; return -1;
} }
if (params->domain_match) {
wpa_printf(MSG_INFO, "TLS: domain_match not supported");
return -1;
}
if (params->openssl_ciphers) { if (params->openssl_ciphers) {
wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported"); wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported");
return -1; return -1;

View file

@ -229,6 +229,21 @@ struct eap_peer_config {
*/ */
char *domain_suffix_match; char *domain_suffix_match;
/**
* domain_match - Constraint for server domain name
*
* If set, this FQDN is used as a full match requirement for the
* server certificate in SubjectAltName dNSName element(s). If a
* matching dNSName is found, this constraint is met. If no dNSName
* values are present, this constraint is matched against SubjectName CN
* using same full match comparison. This behavior is similar to
* domain_suffix_match, but has the requirement of a full match, i.e.,
* no subdomains or wildcard matches are allowed. Case-insensitive
* comparison is used, so "Example.com" matches "example.com", but would
* not match "test.Example.com".
*/
char *domain_match;
/** /**
* ca_cert2 - File path to CA certificate file (PEM/DER) (Phase 2) * ca_cert2 - File path to CA certificate file (PEM/DER) (Phase 2)
* *
@ -332,6 +347,14 @@ struct eap_peer_config {
*/ */
char *domain_suffix_match2; char *domain_suffix_match2;
/**
* domain_match2 - Constraint for server domain name
*
* This field is like domain_match, but used for phase 2 (inside
* EAP-TTLS/PEAP/FAST tunnel) authentication.
*/
char *domain_match2;
/** /**
* eap_methods - Allowed EAP methods * eap_methods - Allowed EAP methods
* *

View file

@ -91,6 +91,7 @@ static void eap_tls_params_from_conf1(struct tls_connection_params *params,
params->subject_match = (char *) config->subject_match; params->subject_match = (char *) config->subject_match;
params->altsubject_match = (char *) config->altsubject_match; params->altsubject_match = (char *) config->altsubject_match;
params->suffix_match = config->domain_suffix_match; params->suffix_match = config->domain_suffix_match;
params->domain_match = config->domain_match;
params->engine = config->engine; params->engine = config->engine;
params->engine_id = config->engine_id; params->engine_id = config->engine_id;
params->pin = config->pin; params->pin = config->pin;
@ -113,6 +114,7 @@ static void eap_tls_params_from_conf2(struct tls_connection_params *params,
params->subject_match = (char *) config->subject_match2; params->subject_match = (char *) config->subject_match2;
params->altsubject_match = (char *) config->altsubject_match2; params->altsubject_match = (char *) config->altsubject_match2;
params->suffix_match = config->domain_suffix_match2; params->suffix_match = config->domain_suffix_match2;
params->domain_match = config->domain_match2;
params->engine = config->engine2; params->engine = config->engine2;
params->engine_id = config->engine2_id; params->engine_id = config->engine2_id;
params->pin = config->pin2; params->pin = config->pin2;

View file

@ -1818,6 +1818,7 @@ static const struct parse_data ssid_fields[] = {
{ STRe(subject_match) }, { STRe(subject_match) },
{ STRe(altsubject_match) }, { STRe(altsubject_match) },
{ STRe(domain_suffix_match) }, { STRe(domain_suffix_match) },
{ STRe(domain_match) },
{ STRe(ca_cert2) }, { STRe(ca_cert2) },
{ STRe(ca_path2) }, { STRe(ca_path2) },
{ STRe(client_cert2) }, { STRe(client_cert2) },
@ -1827,6 +1828,7 @@ static const struct parse_data ssid_fields[] = {
{ STRe(subject_match2) }, { STRe(subject_match2) },
{ STRe(altsubject_match2) }, { STRe(altsubject_match2) },
{ STRe(domain_suffix_match2) }, { STRe(domain_suffix_match2) },
{ STRe(domain_match2) },
{ STRe(phase1) }, { STRe(phase1) },
{ STRe(phase2) }, { STRe(phase2) },
{ STRe(pcsc) }, { STRe(pcsc) },
@ -2052,6 +2054,7 @@ static void eap_peer_config_free(struct eap_peer_config *eap)
os_free(eap->subject_match); os_free(eap->subject_match);
os_free(eap->altsubject_match); os_free(eap->altsubject_match);
os_free(eap->domain_suffix_match); os_free(eap->domain_suffix_match);
os_free(eap->domain_match);
os_free(eap->ca_cert2); os_free(eap->ca_cert2);
os_free(eap->ca_path2); os_free(eap->ca_path2);
os_free(eap->client_cert2); os_free(eap->client_cert2);
@ -2061,6 +2064,7 @@ static void eap_peer_config_free(struct eap_peer_config *eap)
os_free(eap->subject_match2); os_free(eap->subject_match2);
os_free(eap->altsubject_match2); os_free(eap->altsubject_match2);
os_free(eap->domain_suffix_match2); os_free(eap->domain_suffix_match2);
os_free(eap->domain_match2);
os_free(eap->phase1); os_free(eap->phase1);
os_free(eap->phase2); os_free(eap->phase2);
os_free(eap->pcsc); os_free(eap->pcsc);

View file

@ -691,6 +691,7 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
STR(subject_match); STR(subject_match);
STR(altsubject_match); STR(altsubject_match);
STR(domain_suffix_match); STR(domain_suffix_match);
STR(domain_match);
STR(ca_cert2); STR(ca_cert2);
STR(ca_path2); STR(ca_path2);
STR(client_cert2); STR(client_cert2);
@ -700,6 +701,7 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
STR(subject_match2); STR(subject_match2);
STR(altsubject_match2); STR(altsubject_match2);
STR(domain_suffix_match2); STR(domain_suffix_match2);
STR(domain_match2);
STR(phase1); STR(phase1);
STR(phase2); STR(phase2);
STR(pcsc); STR(pcsc);

View file

@ -873,7 +873,8 @@ fast_reauth=1
# /C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com # /C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
# Note: Since this is a substring match, this cannot be used securily to # Note: Since this is a substring match, this cannot be used securily to
# do a suffix match against a possible domain name in the CN entry. For # do a suffix match against a possible domain name in the CN entry. For
# such a use case, domain_suffix_match should be used instead. # such a use case, domain_suffix_match or domain_match should be used
# instead.
# altsubject_match: Semicolon separated string of entries to be matched against # altsubject_match: Semicolon separated string of entries to be matched against
# the alternative subject name of the authentication server certificate. # the alternative subject name of the authentication server certificate.
# If this string is set, the server sertificate is only accepted if it # If this string is set, the server sertificate is only accepted if it
@ -896,6 +897,16 @@ fast_reauth=1
# #
# For example, domain_suffix_match=example.com would match # For example, domain_suffix_match=example.com would match
# test.example.com but would not match test-example.com. # test.example.com but would not match test-example.com.
# domain_match: Constraint for server domain name
# If set, this FQDN is used as a full match requirement for the
# server certificate in SubjectAltName dNSName element(s). If a
# matching dNSName is found, this constraint is met. If no dNSName
# values are present, this constraint is matched against SubjectName CN
# using same full match comparison. This behavior is similar to
# domain_suffix_match, but has the requirement of a full match, i.e.,
# no subdomains or wildcard matches are allowed. Case-insensitive
# comparison is used, so "Example.com" matches "example.com", but would
# not match "test.Example.com".
# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters # phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
# (string with field-value pairs, e.g., "peapver=0" or # (string with field-value pairs, e.g., "peapver=0" or
# "peapver=1 peaplabel=1") # "peapver=1 peaplabel=1")