OpenVPN
ssl_verify.c
Go to the documentation of this file.
1 /*
2  * OpenVPN -- An application to securely tunnel IP networks
3  * over a single TCP/UDP port, with support for SSL/TLS-based
4  * session authentication and key exchange,
5  * packet encryption, packet authentication, and
6  * packet compression.
7  *
8  * Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net>
9  * Copyright (C) 2010-2021 Fox Crypto B.V. <openvpn@foxcrypto.com>
10  *
11  * This program is free software; you can redistribute it and/or modify
12  * it under the terms of the GNU General Public License version 2
13  * as published by the Free Software Foundation.
14  *
15  * This program is distributed in the hope that it will be useful,
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18  * GNU General Public License for more details.
19  *
20  * You should have received a copy of the GNU General Public License along
21  * with this program; if not, write to the Free Software Foundation, Inc.,
22  * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23  */
24 
30 #ifdef HAVE_CONFIG_H
31 #include "config.h"
32 #endif
33 
34 #include "syshead.h"
35 #include <string.h>
36 
37 #include "base64.h"
38 #include "manage.h"
39 #include "otime.h"
40 #include "run_command.h"
41 #include "ssl_verify.h"
42 #include "ssl_verify_backend.h"
43 
44 #ifdef ENABLE_CRYPTO_OPENSSL
45 #include "ssl_verify_openssl.h"
46 #endif
47 #include "auth_token.h"
48 #include "push.h"
49 #include "ssl_util.h"
50 
51 static void
53 {
54  string_mod(str, CC_PRINT, CC_CRLF, '_');
55 }
56 
57 /*
58  * Export the untrusted IP address and port to the environment
59  */
60 static void
62 {
63  setenv_link_socket_actual(session->opt->es, "untrusted", &session->untrusted_addr, SA_IP_PORT);
64 }
65 
66 /*
67  * Remove authenticated state from all sessions in the given tunnel
68  */
69 static void
71 {
72  if (multi)
73  {
74  wipe_auth_token(multi);
75  for (int i = 0; i < TM_SIZE; ++i)
76  {
77  for (int j = 0; j < KS_SIZE; ++j)
78  {
79  multi->session[i].key[j].authenticated = KS_AUTH_FALSE;
80  }
81  }
82  }
83 }
84 
85 void
86 set_common_name(struct tls_session *session, const char *common_name)
87 {
88  if (session->common_name)
89  {
90  free(session->common_name);
91  session->common_name = NULL;
92  }
93  if (common_name)
94  {
95  /* FIXME: Last alloc will never be freed */
96  session->common_name = string_alloc(common_name, NULL);
97  }
98  /* update common name in env */
99  setenv_str(session->opt->es, "common_name", common_name);
100 }
101 
102 /*
103  * Retrieve the common name for the given tunnel's active session. If the
104  * common name is NULL or empty, return NULL if null is true, or "UNDEF" if
105  * null is false.
106  */
107 const char *
108 tls_common_name(const struct tls_multi *multi, const bool null)
109 {
110  const char *ret = NULL;
111  if (multi)
112  {
113  ret = multi->session[TM_ACTIVE].common_name;
114  }
115  if (ret && strlen(ret))
116  {
117  return ret;
118  }
119  else if (null)
120  {
121  return NULL;
122  }
123  else
124  {
125  return "UNDEF";
126  }
127 }
128 
129 /*
130  * Lock the common name for the given tunnel.
131  */
132 void
134 {
135  const char *cn = multi->session[TM_ACTIVE].common_name;
136  if (cn && !multi->locked_cn)
137  {
138  multi->locked_cn = string_alloc(cn, NULL);
139  }
140 }
141 
142 /*
143  * Lock the username for the given tunnel
144  */
145 static bool
146 tls_lock_username(struct tls_multi *multi, const char *username)
147 {
148  if (multi->locked_username)
149  {
150  /* If the username has been overridden, we accept both the original
151  * username and the changed username */
152  if (strcmp(username, multi->locked_username) != 0
153  && (!multi->locked_original_username || strcmp(username, multi->locked_original_username) != 0))
154  {
155  msg(D_TLS_ERRORS, "TLS Auth Error: username attempted to change from '%s' to '%s' -- tunnel disabled",
156  multi->locked_username,
157  username);
158 
159  /* disable the tunnel */
160  tls_deauthenticate(multi);
161  return false;
162  }
163  }
164  else
165  {
166  multi->locked_username = string_alloc(username, NULL);
167  }
168  return true;
169 }
170 
171 const char *
172 tls_username(const struct tls_multi *multi, const bool null)
173 {
174  const char *ret = NULL;
175  if (multi)
176  {
177  ret = multi->locked_username;
178  }
179  if (ret && strlen(ret))
180  {
181  return ret;
182  }
183  else if (null)
184  {
185  return NULL;
186  }
187  else
188  {
189  return "UNDEF";
190  }
191 }
192 
193 void
194 cert_hash_remember(struct tls_session *session, const int error_depth,
195  const struct buffer *cert_hash)
196 {
197  if (error_depth >= 0 && error_depth < MAX_CERT_DEPTH)
198  {
199  if (!session->cert_hash_set)
200  {
201  ALLOC_OBJ_CLEAR(session->cert_hash_set, struct cert_hash_set);
202  }
203  if (!session->cert_hash_set->ch[error_depth])
204  {
205  ALLOC_OBJ(session->cert_hash_set->ch[error_depth], struct cert_hash);
206  }
207 
208  struct cert_hash *ch = session->cert_hash_set->ch[error_depth];
209  ASSERT(sizeof(ch->sha256_hash) == BLEN(cert_hash));
210  memcpy(ch->sha256_hash, BPTR(cert_hash), sizeof(ch->sha256_hash));
211  }
212 }
213 
214 void
216 {
217  if (chs)
218  {
219  int i;
220  for (i = 0; i < MAX_CERT_DEPTH; ++i)
221  {
222  free(chs->ch[i]);
223  }
224  free(chs);
225  }
226 }
227 
228 bool
229 cert_hash_compare(const struct cert_hash_set *chs1, const struct cert_hash_set *chs2)
230 {
231  if (chs1 && chs2)
232  {
233  int i;
234  for (i = 0; i < MAX_CERT_DEPTH; ++i)
235  {
236  const struct cert_hash *ch1 = chs1->ch[i];
237  const struct cert_hash *ch2 = chs2->ch[i];
238 
239  if (!ch1 && !ch2)
240  {
241  continue;
242  }
243  else if (ch1 && ch2 && !memcmp(ch1->sha256_hash, ch2->sha256_hash,
244  sizeof(ch1->sha256_hash)))
245  {
246  continue;
247  }
248  else
249  {
250  return false;
251  }
252  }
253  return true;
254  }
255  else if (!chs1 && !chs2)
256  {
257  return true;
258  }
259  else
260  {
261  return false;
262  }
263 }
264 
265 static struct cert_hash_set *
266 cert_hash_copy(const struct cert_hash_set *chs)
267 {
268  struct cert_hash_set *dest = NULL;
269  if (chs)
270  {
271  int i;
272  ALLOC_OBJ_CLEAR(dest, struct cert_hash_set);
273  for (i = 0; i < MAX_CERT_DEPTH; ++i)
274  {
275  const struct cert_hash *ch = chs->ch[i];
276  if (ch)
277  {
278  ALLOC_OBJ(dest->ch[i], struct cert_hash);
279  memcpy(dest->ch[i]->sha256_hash, ch->sha256_hash,
280  sizeof(dest->ch[i]->sha256_hash));
281  }
282  }
283  }
284  return dest;
285 }
286 void
288 {
289  const struct cert_hash_set *chs = multi->session[TM_ACTIVE].cert_hash_set;
290  if (chs && !multi->locked_cert_hash_set)
291  {
292  multi->locked_cert_hash_set = cert_hash_copy(chs);
293  }
294 }
295 
296 /*
297  * Returns the string associated with the given certificate type.
298  */
299 static const char *
301 {
302  switch (type)
303  {
305  return "SERVER";
306 
308  return "CLIENT";
309 
310  default:
311  return "?";
312  }
313 }
314 
315 /*
316  * Verify the peer's certificate fields.
317  *
318  * @param opt the tls options to verify against
319  * @param peer_cert the peer's certificate
320  * @param subject the peer's extracted subject name
321  * @param subject the peer's extracted common name
322  */
323 static result_t
324 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert,
325  const char *subject, const char *common_name)
326 {
327  /* verify certificate nsCertType */
328  if (opt->ns_cert_type != NS_CERT_CHECK_NONE)
329  {
330  if (SUCCESS == x509_verify_ns_cert_type(peer_cert, opt->ns_cert_type))
331  {
332  msg(D_HANDSHAKE, "VERIFY OK: nsCertType=%s",
334  }
335  else
336  {
337  msg(D_HANDSHAKE, "VERIFY nsCertType ERROR: %s, require nsCertType=%s",
338  subject, print_nsCertType(opt->ns_cert_type));
339  return FAILURE; /* Reject connection */
340  }
341  }
342 
343  /* verify certificate ku */
344  if (opt->remote_cert_ku[0] != 0)
345  {
346  if (SUCCESS == x509_verify_cert_ku(peer_cert, opt->remote_cert_ku, MAX_PARMS))
347  {
348  msg(D_HANDSHAKE, "VERIFY KU OK");
349  }
350  else
351  {
352  msg(D_HANDSHAKE, "VERIFY KU ERROR");
353  return FAILURE; /* Reject connection */
354  }
355  }
356 
357  /* verify certificate eku */
358  if (opt->remote_cert_eku != NULL)
359  {
360  if (SUCCESS == x509_verify_cert_eku(peer_cert, opt->remote_cert_eku))
361  {
362  msg(D_HANDSHAKE, "VERIFY EKU OK");
363  }
364  else
365  {
366  msg(D_HANDSHAKE, "VERIFY EKU ERROR");
367  return FAILURE; /* Reject connection */
368  }
369  }
370 
371  /* verify X509 name or username against --verify-x509-[user]name */
373  {
375  && strcmp(opt->verify_x509_name, subject) == 0)
377  && strcmp(opt->verify_x509_name, common_name) == 0)
379  && strncmp(opt->verify_x509_name, common_name,
380  strlen(opt->verify_x509_name)) == 0) )
381  {
382  msg(D_HANDSHAKE, "VERIFY X509NAME OK: %s", subject);
383  }
384  else
385  {
386  msg(D_HANDSHAKE, "VERIFY X509NAME ERROR: %s, must be %s",
387  subject, opt->verify_x509_name);
388  return FAILURE; /* Reject connection */
389  }
390  }
391 
392  return SUCCESS;
393 }
394 
395 /*
396  * Export the subject, common_name, and raw certificate fields to the
397  * environment for later verification by scripts and plugins.
398  */
399 static void
400 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth,
401  const char *subject,
402  const struct x509_track *x509_track)
403 {
404  char envname[64];
405  char *serial = NULL;
406  struct gc_arena gc = gc_new();
407 
408  /* Save X509 fields in environment */
409  if (x509_track)
410  {
411  x509_setenv_track(x509_track, es, cert_depth, peer_cert);
412  }
413  else
414  {
415  x509_setenv(es, cert_depth, peer_cert);
416  }
417 
418  /* export subject name string as environmental variable */
419  snprintf(envname, sizeof(envname), "tls_id_%d", cert_depth);
420  setenv_str(es, envname, subject);
421 
422  /* export X509 cert fingerprints */
423  {
424  struct buffer sha1 = x509_get_sha1_fingerprint(peer_cert, &gc);
425  struct buffer sha256 = x509_get_sha256_fingerprint(peer_cert, &gc);
426 
427  snprintf(envname, sizeof(envname), "tls_digest_%d", cert_depth);
428  setenv_str(es, envname,
429  format_hex_ex(BPTR(&sha1), BLEN(&sha1), 0, 1, ":", &gc));
430 
431  snprintf(envname, sizeof(envname), "tls_digest_sha256_%d",
432  cert_depth);
433  setenv_str(es, envname,
434  format_hex_ex(BPTR(&sha256), BLEN(&sha256), 0, 1, ":", &gc));
435  }
436 
437  /* export serial number as environmental variable */
438  serial = backend_x509_get_serial(peer_cert, &gc);
439  snprintf(envname, sizeof(envname), "tls_serial_%d", cert_depth);
440  setenv_str(es, envname, serial);
441 
442  /* export serial number in hex as environmental variable */
443  serial = backend_x509_get_serial_hex(peer_cert, &gc);
444  snprintf(envname, sizeof(envname), "tls_serial_hex_%d", cert_depth);
445  setenv_str(es, envname, serial);
446 
447  gc_free(&gc);
448 }
449 
454 static bool
456  const char *pem_export_fname)
457 {
458  /* export the path to the current certificate in pem file format */
459  setenv_str(es, "peer_cert", pem_export_fname);
460 
461  return backend_x509_write_pem(peer_cert, pem_export_fname) == SUCCESS;
462 }
463 
464 static void
465 verify_cert_cert_delete_env(struct env_set *es, const char *pem_export_fname)
466 {
467  env_set_del(es, "peer_cert");
468  if (pem_export_fname)
469  {
470  unlink(pem_export_fname);
471  }
472 }
473 
474 /*
475  * call --tls-verify plug-in(s)
476  */
477 static result_t
478 verify_cert_call_plugin(const struct plugin_list *plugins, struct env_set *es,
479  int cert_depth, openvpn_x509_cert_t *cert, char *subject)
480 {
482  {
483  int ret;
484  struct argv argv = argv_new();
485 
486  argv_printf(&argv, "%d %s", cert_depth, subject);
487 
488  ret = plugin_call_ssl(plugins, OPENVPN_PLUGIN_TLS_VERIFY, &argv, NULL, es, cert_depth, cert);
489 
490  argv_free(&argv);
491 
492  if (ret == OPENVPN_PLUGIN_FUNC_SUCCESS)
493  {
494  msg(D_HANDSHAKE, "VERIFY PLUGIN OK: depth=%d, %s",
495  cert_depth, subject);
496  }
497  else
498  {
499  msg(D_HANDSHAKE, "VERIFY PLUGIN ERROR: depth=%d, %s",
500  cert_depth, subject);
501  return FAILURE; /* Reject connection */
502  }
503  }
504  return SUCCESS;
505 }
506 
507 /*
508  * run --tls-verify script
509  */
510 static result_t
511 verify_cert_call_command(const char *verify_command, struct env_set *es,
512  int cert_depth, char *subject)
513 {
514  int ret;
515  struct gc_arena gc = gc_new();
516  struct argv argv = argv_new();
517 
518  setenv_str(es, "script_type", "tls-verify");
519 
520  argv_parse_cmd(&argv, verify_command);
521  argv_printf_cat(&argv, "%d %s", cert_depth, subject);
522 
523  argv_msg_prefix(D_TLS_DEBUG, &argv, "TLS: executing verify command");
524  ret = openvpn_run_script(&argv, es, 0, "--tls-verify script");
525 
526  gc_free(&gc);
527  argv_free(&argv);
528 
529  if (ret)
530  {
531  msg(D_HANDSHAKE, "VERIFY SCRIPT OK: depth=%d, %s",
532  cert_depth, subject);
533  return SUCCESS;
534  }
535 
536  msg(D_HANDSHAKE, "VERIFY SCRIPT ERROR: depth=%d, %s",
537  cert_depth, subject);
538  return FAILURE; /* Reject connection */
539 }
540 
541 /*
542  * check peer cert against CRL directory
543  */
544 static result_t
545 verify_check_crl_dir(const char *crl_dir, openvpn_x509_cert_t *cert,
546  const char *subject, int cert_depth)
547 {
548  result_t ret = FAILURE;
549  char fn[256];
550  int fd = -1;
551  struct gc_arena gc = gc_new();
552 
553  char *serial = backend_x509_get_serial(cert, &gc);
554  if (!serial)
555  {
556  msg(D_HANDSHAKE, "VERIFY CRL: depth=%d, %s, serial number is not available",
557  cert_depth, subject);
558  goto cleanup;
559  }
560 
561  if (!snprintf(fn, sizeof(fn), "%s%c%s", crl_dir, PATH_SEPARATOR, serial))
562  {
563  msg(D_HANDSHAKE, "VERIFY CRL: filename overflow");
564  goto cleanup;
565  }
566  fd = platform_open(fn, O_RDONLY, 0);
567  if (fd >= 0)
568  {
569  msg(D_HANDSHAKE, "VERIFY CRL: depth=%d, %s, serial=%s is revoked",
570  cert_depth, subject, serial);
571  goto cleanup;
572  }
573 
574  ret = SUCCESS;
575 
576 cleanup:
577 
578  if (fd != -1)
579  {
580  close(fd);
581  }
582  gc_free(&gc);
583  return ret;
584 }
585 
586 result_t
587 verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth)
588 {
589  /* need to define these variables here so goto cleanup will always have
590  * them defined */
591  result_t ret = FAILURE;
592  struct gc_arena gc = gc_new();
593  const char *pem_export_fname = NULL;
594 
595  const struct tls_options *opt = session->opt;
596  ASSERT(opt);
597 
598  session->verified = false;
599 
600  /* get the X509 name */
601  char *subject = x509_get_subject(cert, &gc);
602  if (!subject)
603  {
604  msg(D_TLS_ERRORS, "VERIFY ERROR: depth=%d, could not extract X509 "
605  "subject string from certificate", cert_depth);
606  goto cleanup;
607  }
608 
609  /* enforce character class restrictions in X509 name */
610  string_mod_remap_name(subject);
611  string_replace_leading(subject, '-', '_');
612 
613  /* extract the username (default is CN) */
614  struct buffer buf = alloc_buf_gc(256, &gc);
615  for (int i = 0; opt->x509_username_field[i] != NULL; i++)
616  {
617  char username[TLS_USERNAME_LEN+1] = {0}; /* null-terminated */
618 
619  if (SUCCESS != backend_x509_get_username(username, sizeof(username),
620  opt->x509_username_field[i], cert))
621  {
622  if (!cert_depth)
623  {
624  msg(D_TLS_ERRORS, "VERIFY ERROR: could not extract %s from X509 "
625  "subject string ('%s') -- note that the field length is "
626  "limited to %d characters",
627  opt->x509_username_field[i],
628  subject,
630  goto cleanup;
631  }
632  break;
633  }
634  if (!buf_printf(&buf, i ? "_%s" : "%s", username))
635  {
636  if (!cert_depth)
637  {
638  msg(D_TLS_ERRORS, "VERIFY ERROR: could not append %s from X509 "
639  "certificate -- note that the username length is "
640  "limited to %d characters",
641  opt->x509_username_field[i],
642  buf.capacity - 1);
643  goto cleanup;
644  }
645  break;
646  }
647  }
648 
649  char *common_name = BSTR(&buf);
650  if (!common_name)
651  {
652  msg(D_TLS_ERRORS, "VERIFY ERROR: depth=%d, could not extract X509 "
653  "username string from certificate", cert_depth);
654  goto cleanup;
655  }
656 
657  /* enforce character class restrictions in common name */
658  string_mod_remap_name(common_name);
659 
660  /* warn if cert chain is too deep */
661  if (cert_depth >= MAX_CERT_DEPTH)
662  {
663  msg(D_TLS_ERRORS, "TLS Error: Convoluted certificate chain detected with depth [%d] greater than %d", cert_depth, MAX_CERT_DEPTH);
664  goto cleanup; /* Reject connection */
665  }
666 
667  if (cert_depth == opt->verify_hash_depth && opt->verify_hash)
668  {
669  struct buffer cert_fp = {0};
670 
671  switch (opt->verify_hash_algo)
672  {
673  case MD_SHA1:
674  cert_fp = x509_get_sha1_fingerprint(cert, &gc);
675  break;
676 
677  case MD_SHA256:
678  cert_fp = x509_get_sha256_fingerprint(cert, &gc);
679  break;
680 
681  default:
682  /* This should normally not happen at all; the algorithm used
683  * is parsed by add_option() [options.c] and set to a predefined
684  * value in an enumerated type. So if this unlikely scenario
685  * happens, consider this a failure
686  */
687  msg(M_WARN, "Unexpected invalid algorithm used with "
688  "--verify-hash (%i)", opt->verify_hash_algo);
689  ret = FAILURE;
690  goto cleanup;
691  }
692 
693  struct verify_hash_list *current_hash = opt->verify_hash;
694 
695  while (current_hash)
696  {
697  if (memcmp_constant_time(BPTR(&cert_fp), current_hash->hash,
698  BLEN(&cert_fp)) == 0)
699  {
700  break;
701  }
702  current_hash = current_hash->next;
703  }
704 
705  if (!current_hash)
706  {
707  const char *hex_fp = format_hex_ex(BPTR(&cert_fp), BLEN(&cert_fp),
708  0, 1, ":", &gc);
709  msg(D_TLS_ERRORS, "TLS Error: --tls-verify/--peer-fingerprint "
710  "certificate hash verification failed. (got certificate "
711  "fingerprint: %s)", hex_fp);
712  goto cleanup;
713  }
714  }
715 
716  /* save common name in session object */
717  if (cert_depth == 0)
718  {
719  set_common_name(session, common_name);
720  }
721 
722  session->verify_maxlevel = max_int(session->verify_maxlevel, cert_depth);
723 
724  if (opt->export_peer_cert_dir)
725  {
726  pem_export_fname = platform_create_temp_file(opt->export_peer_cert_dir,
727  "pef", &gc);
728 
729  if (!pem_export_fname
730  || !verify_cert_cert_export_env(opt->es, cert, pem_export_fname))
731  {
732  msg(D_TLS_ERRORS, "TLS Error: Failed to export certificate for "
733  "--tls-export-cert in %s", opt->export_peer_cert_dir);
734  goto cleanup;
735  }
736  }
737  /* export certificate values to the environment */
738  verify_cert_set_env(opt->es, cert, cert_depth, subject, opt->x509_track);
739 
740  /* export current untrusted IP */
742 
743  /* If this is the peer's own certificate, verify it */
744  if (cert_depth == 0 && SUCCESS != verify_peer_cert(opt, cert, subject, common_name))
745  {
746  goto cleanup;
747  }
748 
749  /* call --tls-verify plug-in(s), if registered */
750  if (SUCCESS != verify_cert_call_plugin(opt->plugins, opt->es, cert_depth, cert, subject))
751  {
752  goto cleanup;
753  }
754 
755  /* run --tls-verify script */
757  opt->es, cert_depth, subject))
758  {
759  goto cleanup;
760  }
761 
762  /* check peer cert against CRL */
763  if (opt->crl_file)
764  {
765  if (opt->ssl_flags & SSLF_CRL_VERIFY_DIR)
766  {
767  if (SUCCESS != verify_check_crl_dir(opt->crl_file, cert, subject, cert_depth))
768  {
769  goto cleanup;
770  }
771  }
772  else
773  {
774  if (tls_verify_crl_missing(opt))
775  {
776  msg(D_TLS_ERRORS, "VERIFY ERROR: CRL not loaded");
777  goto cleanup;
778  }
779  }
780  }
781 
782  msg(D_HANDSHAKE, "VERIFY OK: depth=%d, %s", cert_depth, subject);
783  session->verified = true;
784  ret = SUCCESS;
785 
786 cleanup:
787  verify_cert_cert_delete_env(opt->es, pem_export_fname);
788  if (ret != SUCCESS)
789  {
790  tls_clear_error(); /* always? */
791  session->verified = false; /* double sure? */
792  }
793 
794  gc_free(&gc);
795 
796  return ret;
797 }
798 
799 /* ***************************************************************************
800 * Functions for the management of deferred authentication when using
801 * user/password authentication.
802 *************************************************************************** */
803 
804 void
805 auth_set_client_reason(struct tls_multi *multi, const char *client_reason)
806 {
807  free(multi->client_reason);
808  multi->client_reason = NULL;
809 
810  if (client_reason && strlen(client_reason))
811  {
812  multi->client_reason = string_alloc(client_reason, NULL);
813  }
814 }
815 
816 #ifdef ENABLE_MANAGEMENT
817 
818 static inline enum auth_deferred_result
819 man_def_auth_test(const struct key_state *ks)
820 {
822  {
823  return ks->mda_status;
824  }
825  else
826  {
827  return ACF_DISABLED;
828  }
829 }
830 #endif /* ifdef ENABLE_MANAGEMENT */
831 
836 static void
838 {
839  if (ads && ads->auth_pending_file)
840  {
842  free(ads->auth_pending_file);
843  ads->auth_pending_file = NULL;
844  }
845 }
846 
850 static bool
851 check_auth_pending_method(const char *peer_info, const char *method)
852 {
853  struct gc_arena gc = gc_new();
854 
855  char *iv_sso = extract_var_peer_info(peer_info, "IV_SSO=", &gc);
856  if (!iv_sso)
857  {
858  gc_free(&gc);
859  return false;
860  }
861 
862  const char *client_method = strtok(iv_sso, ",");
863  bool supported = false;
864 
865  while (client_method)
866  {
867  if (0 == strcmp(client_method, method))
868  {
869  supported = true;
870  break;
871  }
872  client_method = strtok(NULL, ",");
873  }
874 
875  gc_free(&gc);
876  return supported;
877 }
878 
887 static bool
889  struct tls_multi *multi,
890  struct tls_session *session)
891 {
892  bool ret = true;
893  if (ads->auth_pending_file)
894  {
895  struct buffer_list *lines = buffer_list_file(ads->auth_pending_file,
896  1024);
897  if (lines && lines->head)
898  {
899  /* Must have at least three lines. further lines are ignored for
900  * forward compatibility */
901  if (!lines->head || !lines->head->next || !lines->head->next->next)
902  {
903  msg(M_WARN, "auth pending control file is not at least "
904  "three lines long.");
905  buffer_list_free(lines);
906  return false;
907  }
908  struct buffer *timeout_buf = &lines->head->buf;
909  struct buffer *iv_buf = &lines->head->next->buf;
910  struct buffer *extra_buf = &lines->head->next->next->buf;
911 
912  /* Remove newline chars at the end of the lines */
913  buf_chomp(timeout_buf);
914  buf_chomp(iv_buf);
915  buf_chomp(extra_buf);
916 
917  long timeout = strtol(BSTR(timeout_buf), NULL, 10);
918  if (timeout == 0)
919  {
920  msg(M_WARN, "could not parse auth pending file timeout");
921  buffer_list_free(lines);
922  return false;
923  }
924 
925  const char *pending_method = BSTR(iv_buf);
926  if (!check_auth_pending_method(multi->peer_info, pending_method))
927  {
928  char buf[128];
929  snprintf(buf, sizeof(buf),
930  "Authentication failed, required pending auth "
931  "method '%s' not supported", pending_method);
932  auth_set_client_reason(multi, buf);
933  msg(M_INFO, "Client does not supported auth pending method "
934  "'%s'", pending_method);
935  ret = false;
936  }
937  else
938  {
939  send_auth_pending_messages(multi, session, BSTR(extra_buf), timeout);
940  }
941  }
942 
943  buffer_list_free(lines);
944  }
946  return ret;
947 }
948 
949 
954 void
956 {
957  if (ads->auth_control_file)
958  {
960  free(ads->auth_control_file);
961  ads->auth_control_file = NULL;
962  }
963  if (ads->auth_failed_reason_file)
964  {
966  free(ads->auth_failed_reason_file);
967  ads->auth_failed_reason_file = NULL;
968  }
970 }
971 
978 static bool
980  const struct tls_options *opt)
981 {
982  struct gc_arena gc = gc_new();
983 
985  const char *acf = platform_create_temp_file(opt->tmp_dir, "acf", &gc);
986  const char *apf = platform_create_temp_file(opt->tmp_dir, "apf", &gc);
987  const char *afr = platform_create_temp_file(opt->tmp_dir, "afr", &gc);
988 
989  if (acf && apf)
990  {
991  ads->auth_control_file = string_alloc(acf, NULL);
992  ads->auth_pending_file = string_alloc(apf, NULL);
993  ads->auth_failed_reason_file = string_alloc(afr, NULL);
994 
995  setenv_str(opt->es, "auth_control_file", ads->auth_control_file);
996  setenv_str(opt->es, "auth_pending_file", ads->auth_pending_file);
997  setenv_str(opt->es, "auth_failed_reason_file", ads->auth_failed_reason_file);
998  }
999 
1000  gc_free(&gc);
1001  return (acf && apf);
1002 }
1003 
1008 static char *
1010  struct gc_arena *gc)
1011 {
1012  char *ret = NULL;
1013  if (ads->auth_failed_reason_file)
1014  {
1015  struct buffer reason = buffer_read_from_file(ads->auth_failed_reason_file, gc);
1016 
1017  if (BLEN(&reason))
1018  {
1019  ret = BSTR(&reason);
1020  }
1021 
1022  }
1023  return ret;
1024 }
1025 
1026 
1037 static enum auth_deferred_result
1039 {
1040  if (ads->auth_control_file)
1041  {
1042  unsigned int ret = ads->auth_control_status;
1043  if (ret == ACF_PENDING && !cached)
1044  {
1045  FILE *fp = fopen(ads->auth_control_file, "r");
1046  if (fp)
1047  {
1048  const int c = fgetc(fp);
1049  if (c == '1')
1050  {
1051  ret = ACF_SUCCEEDED;
1052  }
1053  else if (c == '0')
1054  {
1055  ret = ACF_FAILED;
1056  }
1057  fclose(fp);
1058  ads->auth_control_status = ret;
1059  }
1060  }
1061  return ret;
1062  }
1063  return ACF_DISABLED;
1064 }
1065 
1073 static void
1074 update_key_auth_status(bool cached, struct key_state *ks)
1075 {
1076  if (ks->authenticated == KS_AUTH_FALSE)
1077  {
1078  return;
1079  }
1080  else
1081  {
1082  enum auth_deferred_result auth_plugin = ACF_DISABLED;
1083  enum auth_deferred_result auth_script = ACF_DISABLED;
1084  enum auth_deferred_result auth_man = ACF_DISABLED;
1085  auth_plugin = key_state_test_auth_control_file(&ks->plugin_auth, cached);
1086  auth_script = key_state_test_auth_control_file(&ks->script_auth, cached);
1087 #ifdef ENABLE_MANAGEMENT
1088  auth_man = man_def_auth_test(ks);
1089 #endif
1090  ASSERT(auth_plugin < 4 && auth_script < 4 && auth_man < 4);
1091 
1092  if (auth_plugin == ACF_FAILED || auth_script == ACF_FAILED
1093  || auth_man == ACF_FAILED)
1094  {
1096  return;
1097  }
1098  else if (auth_plugin == ACF_PENDING || auth_script == ACF_PENDING
1099  || auth_man == ACF_PENDING)
1100  {
1101  if (now >= ks->auth_deferred_expire)
1102  {
1103  /* Window to authenticate the key has expired, mark
1104  * the key as unauthenticated */
1106  }
1107  }
1108  else
1109  {
1110  /* all auth states (auth_plugin, auth_script, auth_man)
1111  * are either ACF_DISABLED or ACF_SUCCEDED now, which
1112  * translates to "not checked" or "auth succeeded"
1113  */
1115  }
1116  }
1117 }
1118 
1119 
1126 static time_t cache_intervals[] = {0, 0, 0, 0, 0, 1, 1, 2, 2, 4, 8};
1127 
1132 static bool
1134 {
1135  unsigned int idx = min_uint(multi->tas_cache_num_updates, SIZE(cache_intervals) - 1);
1136  time_t latency = cache_intervals[idx];
1137  return multi->tas_cache_last_update + latency >= now;
1138 }
1139 
1140 enum tls_auth_status
1142 {
1143  bool deferred = false;
1144 
1145  /* at least one valid key has successfully completed authentication */
1146  bool success = false;
1147 
1148  /* at least one key is enabled for decryption */
1149  int active = 0;
1150 
1151  /* at least one key already failed authentication */
1152  bool failed_auth = false;
1153 
1154  bool cached = tls_authentication_status_use_cache(multi);
1155 
1156  for (int i = 0; i < KEY_SCAN_SIZE; ++i)
1157  {
1158  struct key_state *ks = get_key_scan(multi, i);
1159  if (TLS_AUTHENTICATED(multi, ks))
1160  {
1161  active++;
1162  update_key_auth_status(cached, ks);
1163 
1164  if (ks->authenticated == KS_AUTH_FALSE)
1165  {
1166  failed_auth = true;
1167  }
1168  else if (ks->authenticated == KS_AUTH_DEFERRED)
1169  {
1170  deferred = true;
1171  }
1172  else if (ks->authenticated == KS_AUTH_TRUE)
1173  {
1174  success = true;
1175  }
1176  }
1177  }
1178 
1179  /* we did not rely on a cached result, remember the cache update time */
1180  if (!cached)
1181  {
1182  multi->tas_cache_last_update = now;
1183  multi->tas_cache_num_updates++;
1184  }
1185 
1186 #if 0
1187  dmsg(D_TLS_ERRORS, "TAS: a=%d s=%d d=%d f=%d", active, success, deferred, failed_auth);
1188 #endif
1189  if (failed_auth)
1190  {
1191  struct gc_arena gc = gc_new();
1192  const struct key_state *ks = get_primary_key(multi);
1193  const char *plugin_message = key_state_check_auth_failed_message_file(&ks->plugin_auth, &gc);
1194  const char *script_message = key_state_check_auth_failed_message_file(&ks->script_auth, &gc);
1195 
1196  if (plugin_message)
1197  {
1198  auth_set_client_reason(multi, plugin_message);
1199  }
1200  if (script_message)
1201  {
1202  auth_set_client_reason(multi, script_message);
1203  }
1204 
1205  /* We have at least one session that failed authentication. There
1206  * might be still another session with valid keys.
1207  * Although our protocol allows keeping the VPN session alive
1208  * with the other session (and we actually did that in earlier
1209  * version, this behaviour is really strange from a user (admin)
1210  * experience */
1211  gc_free(&gc);
1213  }
1214  else if (success)
1215  {
1217  }
1218  else if (active == 0 || deferred)
1219  {
1220  /* We have a deferred authentication and no currently active key
1221  * (first auth, no renegotiation) */
1223  }
1224  else
1225  {
1226  /* at least one key is active but none is fully authenticated (!success)
1227  * and all active are either failed authed or expired deferred auth */
1229  }
1230 }
1231 
1232 #ifdef ENABLE_MANAGEMENT
1233 /*
1234  * For deferred auth, this is where the management interface calls (on server)
1235  * to indicate auth failure/success.
1236  */
1237 bool
1238 tls_authenticate_key(struct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason)
1239 {
1240  bool ret = false;
1241  if (multi)
1242  {
1243  int i;
1244  auth_set_client_reason(multi, client_reason);
1245  for (i = 0; i < KEY_SCAN_SIZE; ++i)
1246  {
1247  struct key_state *ks = get_key_scan(multi, i);
1248  if (ks->mda_key_id == mda_key_id)
1249  {
1250  ks->mda_status = auth ? ACF_SUCCEEDED : ACF_FAILED;
1251  ret = true;
1252  }
1253  }
1254  }
1255  return ret;
1256 }
1257 #endif /* ifdef ENABLE_MANAGEMENT */
1258 
1259 
1260 /* ****************************************************************************
1261  * Functions to verify username and password
1262  *
1263  * Authenticate a client using username/password.
1264  * Runs on server.
1265  *
1266  * If you want to add new authentication methods,
1267  * this is the place to start.
1268  *************************************************************************** */
1269 
1273 static void
1275  struct auth_deferred_status *status)
1276 {
1277  struct gc_arena gc = gc_new();
1279  if (msg)
1280  {
1281  auth_set_client_reason(multi, msg);
1282  }
1283  gc_free(&gc);
1284 }
1285 /*
1286  * Verify the user name and password using a script
1287  */
1288 static int
1290  const struct user_pass *up)
1291 {
1292  struct gc_arena gc = gc_new();
1293  struct argv argv = argv_new();
1294  const char *tmp_file = "";
1295  int retval = OPENVPN_PLUGIN_FUNC_ERROR;
1296  struct key_state *ks = &session->key[KS_PRIMARY]; /* primary key */
1297 
1298  /* Set environmental variables prior to calling script */
1299  setenv_str(session->opt->es, "script_type", "user-pass-verify");
1300 
1301  /* format command line */
1302  argv_parse_cmd(&argv, session->opt->auth_user_pass_verify_script);
1303 
1304  if (session->opt->auth_user_pass_verify_script_via_file)
1305  {
1306  struct status_output *so;
1307 
1308  tmp_file = platform_create_temp_file(session->opt->tmp_dir, "up",
1309  &gc);
1310  if (tmp_file)
1311  {
1312  so = status_open(tmp_file, 0, -1, NULL, STATUS_OUTPUT_WRITE);
1313  status_printf(so, "%s", up->username);
1314  status_printf(so, "%s", up->password);
1315  if (!status_close(so))
1316  {
1317  msg(D_TLS_ERRORS, "TLS Auth Error: could not write username/password to file: %s",
1318  tmp_file);
1319  goto done;
1320  }
1321  /* pass temp file name to script */
1322  argv_printf_cat(&argv, "%s", tmp_file);
1323  }
1324  }
1325  else
1326  {
1327  setenv_str(session->opt->es, "username", up->username);
1328  setenv_str(session->opt->es, "password", up->password);
1329  }
1330 
1331  /* pre-create files for deferred auth control */
1333  {
1334  msg(D_TLS_ERRORS, "TLS Auth Error (%s): "
1335  "could not create deferred auth control file", __func__);
1336  retval = OPENVPN_PLUGIN_FUNC_ERROR;
1337  goto error;
1338  }
1339 
1340  /* call command */
1341  int script_ret = openvpn_run_script(&argv, session->opt->es, S_EXITCODE,
1342  "--auth-user-pass-verify");
1343  switch (script_ret)
1344  {
1345  case 0:
1346  retval = OPENVPN_PLUGIN_FUNC_SUCCESS;
1347  break;
1348 
1349  case 2:
1351  break;
1352 
1353  default:
1354  check_for_client_reason(multi, &ks->script_auth);
1355  retval = OPENVPN_PLUGIN_FUNC_ERROR;
1356  break;
1357  }
1358  if (retval == OPENVPN_PLUGIN_FUNC_DEFERRED)
1359  {
1360  /* Check if we the plugin has written the pending auth control
1361  * file and send the pending auth to the client */
1363  multi, session))
1364  {
1365  retval = OPENVPN_PLUGIN_FUNC_ERROR;
1367  }
1368 
1369  }
1370  else
1371  {
1372  /* purge auth control filename (and file itself) for non-deferred returns */
1374  }
1375  if (!session->opt->auth_user_pass_verify_script_via_file)
1376  {
1377  setenv_del(session->opt->es, "password");
1378  }
1379 
1380 done:
1381  if (tmp_file && strlen(tmp_file) > 0)
1382  {
1383  platform_unlink(tmp_file);
1384  }
1385 
1386 error:
1387  argv_free(&argv);
1388  gc_free(&gc);
1389  return retval;
1390 }
1391 
1392 #ifdef ENABLE_PLUGIN
1393 void
1394 verify_crresponse_plugin(struct tls_multi *multi, const char *cr_response)
1395 {
1396  struct tls_session *session = &multi->session[TM_ACTIVE];
1397  setenv_str(session->opt->es, "crresponse", cr_response);
1398 
1399  plugin_call(session->opt->plugins, OPENVPN_PLUGIN_CLIENT_CRRESPONSE, NULL,
1400  NULL, session->opt->es);
1401 
1402  setenv_del(session->opt->es, "crresponse");
1403 }
1404 #endif
1405 
1406 void
1407 verify_crresponse_script(struct tls_multi *multi, const char *cr_response)
1408 {
1409 
1410  struct tls_session *session = &multi->session[TM_ACTIVE];
1411 
1412  if (!session->opt->client_crresponse_script)
1413  {
1414  return;
1415  }
1416  struct argv argv = argv_new();
1417  struct gc_arena gc = gc_new();
1418 
1419  setenv_str(session->opt->es, "script_type", "client-crresponse");
1420 
1421  /* Since cr response might be sensitive, like a stupid way to query
1422  * a password via 2FA, we pass it via file instead environment */
1423  const char *tmp_file = platform_create_temp_file(session->opt->tmp_dir, "cr", &gc);
1424  static const char *openerrmsg = "TLS CR Response Error: could not write "
1425  "crtext challenge response to file: %s";
1426 
1427  if (tmp_file)
1428  {
1429  struct status_output *so = status_open(tmp_file, 0, -1, NULL,
1431  status_printf(so, "%s", cr_response);
1432  if (!status_close(so))
1433  {
1434  msg(D_TLS_ERRORS, openerrmsg, tmp_file);
1435  tls_deauthenticate(multi);
1436  goto done;
1437  }
1438  }
1439  else
1440  {
1441  msg(D_TLS_ERRORS, openerrmsg, "creating file failed");
1442  tls_deauthenticate(multi);
1443  goto done;
1444  }
1445 
1446  argv_parse_cmd(&argv, session->opt->client_crresponse_script);
1447  argv_printf_cat(&argv, "%s", tmp_file);
1448 
1449 
1450  if (!openvpn_run_script(&argv, session->opt->es, 0, "--client-crresponse"))
1451  {
1452  tls_deauthenticate(multi);
1453  }
1454 done:
1455  argv_free(&argv);
1456  gc_free(&gc);
1457 }
1458 
1459 /*
1460  * Verify the username and password using a plugin
1461  */
1462 static int
1464  const struct user_pass *up)
1465 {
1466  int retval = OPENVPN_PLUGIN_FUNC_ERROR;
1467  struct key_state *ks = &session->key[KS_PRIMARY]; /* primary key */
1468 
1469  /* set password in private env space */
1470  setenv_str(session->opt->es, "password", up->password);
1471 
1472  /* generate filename for deferred auth control file */
1474  {
1475  msg(D_TLS_ERRORS, "TLS Auth Error (%s): "
1476  "could not create deferred auth control file", __func__);
1477  return retval;
1478  }
1479 
1480  /* call command */
1481  retval = plugin_call(session->opt->plugins, OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY, NULL, NULL, session->opt->es);
1482 
1483  if (retval == OPENVPN_PLUGIN_FUNC_DEFERRED)
1484  {
1485  /* Check if the plugin has written the pending auth control
1486  * file and send the pending auth to the client */
1488  {
1489  retval = OPENVPN_PLUGIN_FUNC_ERROR;
1490  }
1491  }
1492 
1493  if (retval == OPENVPN_PLUGIN_FUNC_ERROR)
1494  {
1495  check_for_client_reason(multi, &ks->plugin_auth);
1496  }
1497 
1498  if (retval != OPENVPN_PLUGIN_FUNC_DEFERRED)
1499  {
1500  /* purge auth control filename (and file itself) for non-deferred returns */
1502  }
1503 
1504  setenv_del(session->opt->es, "password");
1505 
1506  return retval;
1507 }
1508 
1509 
1510 #ifdef ENABLE_MANAGEMENT
1511 /*
1512  * management deferred internal ssl_verify.c status codes
1513  */
1514 #define KMDA_ERROR 0
1515 #define KMDA_SUCCESS 1
1516 #define KMDA_UNDEF 2
1517 #define KMDA_DEF 3
1518 
1519 static int
1521  const struct user_pass *up)
1522 {
1523  int retval = KMDA_ERROR;
1524  struct key_state *ks = &session->key[KS_PRIMARY]; /* primary key */
1525 
1526  /* set username/password in private env space */
1527  setenv_str(session->opt->es, "password", up->password);
1528 
1529  if (management)
1530  {
1531  management_notify_client_needing_auth(management, ks->mda_key_id, session->opt->mda_context, session->opt->es);
1532  }
1533 
1534  setenv_del(session->opt->es, "password");
1535 
1536  retval = KMDA_SUCCESS;
1537 
1538  return retval;
1539 }
1540 #endif /* ifdef ENABLE_MANAGEMENT */
1541 
1542 static bool
1544  struct tls_session *session)
1545 {
1546  /* Is username defined? */
1547  if ((session->opt->ssl_flags & SSLF_AUTH_USER_PASS_OPTIONAL) || strlen(up->username))
1548  {
1549  setenv_str(session->opt->es, "username", up->username);
1550 
1551  /* setenv incoming cert common name for script */
1552  setenv_str(session->opt->es, "common_name", session->common_name);
1553 
1554  /* setenv client real IP address */
1556 
1557  /*
1558  * if we are using auth-gen-token, send also the session id of auth gen token to
1559  * allow the management to figure out if it is a new session or a continued one
1560  */
1561  add_session_token_env(session, multi, up);
1562  return true;
1563  }
1564  else
1565  {
1566  msg(D_TLS_ERRORS, "TLS Auth Error: peer provided a blank username");
1567  return false;
1568  }
1569 }
1570 
1577 void
1578 verify_user_pass(struct user_pass *up, struct tls_multi *multi,
1579  struct tls_session *session)
1580 {
1581  struct key_state *ks = &session->key[KS_PRIMARY]; /* primary key */
1582 
1583  ASSERT(up && !up->protected);
1584 
1585 #ifdef ENABLE_MANAGEMENT
1586  int man_def_auth = KMDA_UNDEF;
1587 
1589  {
1590  man_def_auth = KMDA_DEF;
1591  }
1592 #endif
1593 
1594  /* enforce character class restrictions in username/password */
1596  string_mod(up->password, CC_PRINT, CC_CRLF, '_');
1597 
1598  /*
1599  * If auth token succeeds we skip the auth
1600  * methods unless otherwise specified
1601  */
1602  bool skip_auth = false;
1603 
1604  /* Replace username early if override-username is in effect but only
1605  * if client is sending the original username */
1606  if (multi->locked_original_username
1607  && strncmp(up->username, multi->locked_original_username, sizeof(up->username)) == 0)
1608  {
1609  msg(D_MULTI_LOW, "TLS: Replacing client provided username '%s' with "
1610  "username from override-user '%s'", up->username,
1611  multi->locked_username);
1612  strncpy(up->username, multi->locked_username, sizeof(up->username));
1613  }
1614 
1615  /*
1616  * If server is configured with --auth-gen-token and the client sends
1617  * something that looks like an authentication token, this
1618  * round will be done internally using the token instead of
1619  * calling any external authentication modules.
1620  */
1621  if (session->opt->auth_token_generate && is_auth_token(up->password))
1622  {
1624 
1625  /* If this is the first time we see an auth-token in this multi session,
1626  * save it as initial auth token. This ensures using the
1627  * same session ID and initial timestamp in new tokens */
1628  if (!multi->auth_token_initial)
1629  {
1630  multi->auth_token_initial = strdup(up->password);
1631  }
1632 
1633  if (session->opt->auth_token_call_auth)
1634  {
1635  /*
1636  * we do not care about the result here because it is
1637  * the responsibility of the external authentication to
1638  * decide what to do with the result
1639  */
1640  }
1642  {
1643  /*
1644  * We do not want the EXPIRED or EMPTY USER flags here so check
1645  * for equality with AUTH_TOKEN_HMAC_OK
1646  */
1647  msg(M_WARN, "TLS: Username/auth-token authentication "
1648  "succeeded for username '%s'",
1649  up->username);
1650  skip_auth = true;
1651  }
1652  else
1653  {
1654  wipe_auth_token(multi);
1656  msg(M_WARN, "TLS: Username/auth-token authentication "
1657  "failed for username '%s'", up->username);
1658  return;
1659  }
1660  }
1661 
1662  int plugin_status = OPENVPN_PLUGIN_FUNC_SUCCESS;
1663  int script_status = OPENVPN_PLUGIN_FUNC_SUCCESS;
1664  /* Set the environment variables used by all auth variants */
1665  if (!set_verify_user_pass_env(up, multi, session))
1666  {
1667  skip_auth = true;
1668  plugin_status = OPENVPN_PLUGIN_FUNC_ERROR;
1669  }
1670 
1671  /* call plugin(s) and/or script */
1672  if (!skip_auth)
1673  {
1674 #ifdef ENABLE_MANAGEMENT
1675  if (man_def_auth == KMDA_DEF)
1676  {
1677  man_def_auth = verify_user_pass_management(session, up);
1678  }
1679 #endif
1681  {
1682  plugin_status = verify_user_pass_plugin(session, multi, up);
1683  }
1684 
1685  if (session->opt->auth_user_pass_verify_script)
1686  {
1687  script_status = verify_user_pass_script(session, multi, up);
1688  }
1689  }
1690 
1691  /* check sizing of username if it will become our common name */
1692  if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME)
1693  && strlen(up->username)>TLS_USERNAME_LEN)
1694  {
1695  msg(D_TLS_ERRORS,
1696  "TLS Auth Error: --username-as-common name specified and username is longer than the maximum permitted Common Name length of %d characters",
1698  plugin_status = OPENVPN_PLUGIN_FUNC_ERROR;
1699  script_status = OPENVPN_PLUGIN_FUNC_ERROR;
1700  }
1701  /* auth succeeded? */
1702  bool plugin_ok = plugin_status == OPENVPN_PLUGIN_FUNC_SUCCESS
1703  || plugin_status == OPENVPN_PLUGIN_FUNC_DEFERRED;
1704 
1705  bool script_ok = script_status == OPENVPN_PLUGIN_FUNC_SUCCESS
1706  || script_status == OPENVPN_PLUGIN_FUNC_DEFERRED;
1707 
1708  if (script_ok && plugin_ok && tls_lock_username(multi, up->username)
1709 #ifdef ENABLE_MANAGEMENT
1710  && man_def_auth != KMDA_ERROR
1711 #endif
1712  )
1713  {
1715  if (plugin_status == OPENVPN_PLUGIN_FUNC_DEFERRED
1716  || script_status == OPENVPN_PLUGIN_FUNC_DEFERRED)
1717  {
1719  }
1720 #ifdef ENABLE_MANAGEMENT
1721  if (man_def_auth != KMDA_UNDEF)
1722  {
1723  if (skip_auth)
1724  {
1725  ks->mda_status = ACF_DISABLED;
1726  }
1727  else
1728  {
1730  }
1731  }
1732 #endif
1733  if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME))
1734  {
1736  }
1737 
1738  if ((session->opt->auth_token_generate))
1739  {
1740  /*
1741  * If we accepted a (not expired) token, i.e.
1742  * initial auth via token on new connection, we need
1743  * to store the auth-token in multi->auth_token, so
1744  * the initial timestamp and session id can be extracted from it
1745  */
1746  if (!multi->auth_token
1749  {
1750  multi->auth_token = strdup(up->password);
1751  }
1752 
1753  /*
1754  * Server is configured with --auth-gen-token. Generate or renew
1755  * the token.
1756  */
1757  generate_auth_token(up, multi);
1758  }
1759 
1760  msg(D_HANDSHAKE, "TLS: Username/Password authentication %s for username '%s' %s",
1761  (ks->authenticated == KS_AUTH_DEFERRED) ? "deferred" : "succeeded",
1762  up->username,
1763  (session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME) ? "[CN SET]" : "");
1764  }
1765  else
1766  {
1768  msg(D_TLS_ERRORS, "TLS Auth Error: Auth Username/Password verification failed for peer");
1769  }
1770 }
1771 
1772 void
1774 {
1775  struct key_state *ks = &session->key[KS_PRIMARY]; /* primary key */
1776 
1777  /* While it shouldn't really happen, don't allow the common name to be NULL */
1778  if (!session->common_name)
1779  {
1780  set_common_name(session, "");
1781  }
1782 
1783  /* Don't allow the CN to change once it's been locked */
1784  if (ks->authenticated > KS_AUTH_FALSE && multi->locked_cn)
1785  {
1786  const char *cn = session->common_name;
1787  if (cn && strcmp(cn, multi->locked_cn))
1788  {
1789  msg(D_TLS_ERRORS, "TLS Auth Error: TLS object CN attempted to change from '%s' to '%s' -- tunnel disabled",
1790  multi->locked_cn,
1791  cn);
1792 
1793  /* change the common name back to its original value and disable the tunnel */
1795  tls_deauthenticate(multi);
1796  }
1797  }
1798 
1799  /* Don't allow the cert hashes to change once they have been locked */
1800  if (ks->authenticated > KS_AUTH_FALSE && multi->locked_cert_hash_set)
1801  {
1802  const struct cert_hash_set *chs = session->cert_hash_set;
1803  if (chs && !cert_hash_compare(chs, multi->locked_cert_hash_set))
1804  {
1805  msg(D_TLS_ERRORS, "TLS Auth Error: TLS object CN=%s client-provided SSL certs unexpectedly changed during mid-session reauth",
1806  session->common_name);
1807 
1808  /* disable the tunnel */
1809  tls_deauthenticate(multi);
1810  }
1811  }
1812 
1813  /* verify --client-config-dir based authentication */
1814  if (ks->authenticated > KS_AUTH_FALSE && session->opt->client_config_dir_exclusive)
1815  {
1816  struct gc_arena gc = gc_new();
1817 
1818  const char *cn = session->common_name;
1819  const char *path = platform_gen_path(session->opt->client_config_dir_exclusive,
1820  cn, &gc);
1821  if (!cn || !strcmp(cn, CCD_DEFAULT) || !platform_test_file(path))
1822  {
1824  wipe_auth_token(multi);
1825  msg(D_TLS_ERRORS, "TLS Auth Error: --client-config-dir authentication failed for common name '%s' file='%s'",
1826  session->common_name,
1827  path ? path : "UNDEF");
1828  }
1829 
1830  gc_free(&gc);
1831  }
1832 }
1833 
1834 void
1836 {
1837  struct env_item *item = es->list;
1838  while (item)
1839  {
1840  struct env_item *next = item->next;
1841  if (item->string
1842  && 0 == strncmp("X509_", item->string, strlen("X509_")))
1843  {
1844  env_set_del(es, item->string);
1845  }
1846  item = next;
1847  }
1848 }
status_open
struct status_output * status_open(const char *filename, const int refresh_freq, const int msglevel, const struct virtual_output *vout, const unsigned int flags)
Definition: status.c:61
auth_deferred_status::auth_failed_reason_file
char * auth_failed_reason_file
Definition: ssl_common.h:162
buffer_read_from_file
struct buffer buffer_read_from_file(const char *filename, struct gc_arena *gc)
buffer_read_from_file - copy the content of a file into a buffer
Definition: buffer.c:1358
platform_create_temp_file
const char * platform_create_temp_file(const char *directory, const char *prefix, struct gc_arena *gc)
Create a temporary file in directory, returns the filename of the created file.
Definition: platform.c:541
D_TLS_DEBUG
#define D_TLS_DEBUG
Definition: errlevel.h:165
tls_multi::auth_token
char * auth_token
If server sends a generated auth-token, this is the token to use for future user/pass authentications...
Definition: ssl_common.h:659
TLS_USERNAME_LEN
#define TLS_USERNAME_LEN
Maximum length of common name.
Definition: ssl_verify.h:55
x509_verify_cert_eku
result_t x509_verify_cert_eku(openvpn_x509_cert_t *x509, const char *const expected_oid)
Definition: ssl_verify_openssl.c:740
MAX_CERT_DEPTH
#define MAX_CERT_DEPTH
Maximum certificate depth we will allow.
Definition: ssl_verify.h:52
min_uint
static unsigned int min_uint(unsigned int x, unsigned int y)
Definition: integer.h:63
tls_authentication_status
enum tls_auth_status tls_authentication_status(struct tls_multi *multi)
Return current session authentication state of the tls_multi structure This will return TLS_AUTHENTIC...
Definition: ssl_verify.c:1141
M_INFO
#define M_INFO
Definition: errlevel.h:55
plugin_call_ssl
int plugin_call_ssl(const struct plugin_list *pl, const int type, const struct argv *av, struct plugin_return *pr, struct env_set *es, int certdepth, openvpn_x509_cert_t *current_cert)
Definition: plugin.c:797
env_item::next
struct env_item * next
Definition: env_set.h:39
key_state::auth_token_state_flags
unsigned int auth_token_state_flags
The state of the auth-token sent from the client.
Definition: ssl_common.h:203
tls_session::cert_hash_set
struct cert_hash_set * cert_hash_set
Definition: ssl_common.h:508
tls_options::verify_x509_name
const char * verify_x509_name
Definition: ssl_common.h:344
verify_crresponse_script
void verify_crresponse_script(struct tls_multi *multi, const char *cr_response)
Runs the –client-crresponse script if one is defined.
Definition: ssl_verify.c:1407
verify_cert_call_plugin
static result_t verify_cert_call_plugin(const struct plugin_list *plugins, struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert, char *subject)
Definition: ssl_verify.c:478
auth_deferred_status::auth_control_status
unsigned int auth_control_status
Definition: ssl_common.h:163
gc_new
static struct gc_arena gc_new(void)
Definition: buffer.h:1025
run_command.h
VERIFY_X509_SUBJECT_RDN_PREFIX
#define VERIFY_X509_SUBJECT_RDN_PREFIX
Definition: ssl_verify.h:70
auth_token.h
ssl_verify_backend.h
verify_auth_token
unsigned int verify_auth_token(struct user_pass *up, struct tls_multi *multi, struct tls_session *session)
Verifies the auth token to be in the format that generate_auth_token create and checks if the token i...
Definition: auth_token.c:294
VERIFY_X509_SUBJECT_DN
#define VERIFY_X509_SUBJECT_DN
Definition: ssl_verify.h:68
auth_deferred_status::auth_pending_file
char * auth_pending_file
Definition: ssl_common.h:161
env_item::string
char * string
Definition: env_set.h:38
x509_get_sha256_fingerprint
struct buffer x509_get_sha256_fingerprint(openvpn_x509_cert_t *cert, struct gc_arena *gc)
Retrieve the certificate's SHA256 fingerprint.
Definition: ssl_verify_openssl.c:358
SA_IP_PORT
#define SA_IP_PORT
Definition: socket.h:411
auth_deferred_status
Definition: ssl_common.h:158
argv
Definition: argv.h:35
key_state_check_auth_pending_file
static bool key_state_check_auth_pending_file(struct auth_deferred_status *ads, struct tls_multi *multi, struct tls_session *session)
Checks if the deferred state should also send auth pending request to the client.
Definition: ssl_verify.c:888
is_auth_token
static bool is_auth_token(const char *password)
Return if the password string has the format of a password.
Definition: auth_token.h:127
TM_SIZE
#define TM_SIZE
Size of the tls_multi.session array.
Definition: ssl_common.h:539
TLS_AUTHENTICATED
#define TLS_AUTHENTICATED(multi, ks)
Check whether the ks key_state has finished the key exchange part of the OpenVPN hand shake.
Definition: ssl_verify.h:113
manage.h
KS_PRIMARY
#define KS_PRIMARY
Primary key state index.
Definition: ssl_common.h:456
VERIFY_X509_SUBJECT_RDN
#define VERIFY_X509_SUBJECT_RDN
Definition: ssl_verify.h:69
tls_multi::locked_cert_hash_set
struct cert_hash_set * locked_cert_hash_set
Definition: ssl_common.h:640
es
struct env_set * es
Definition: test_pkcs11.c:141
cert_hash_set::ch
struct cert_hash * ch[MAX_CERT_DEPTH]
Array of certificate hashes.
Definition: ssl_verify.h:64
tls_multi::session
struct tls_session session[TM_SIZE]
Array of tls_session objects representing control channel sessions with the remote peer.
Definition: ssl_common.h:690
verify_cert
result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth)
Definition: ssl_verify.c:587
KMDA_UNDEF
#define KMDA_UNDEF
Definition: ssl_verify.c:1516
verify_hash_list::next
struct verify_hash_list * next
Definition: options.h:245
BSTR
#define BSTR(buf)
Definition: buffer.h:129
add_session_token_env
void add_session_token_env(struct tls_session *session, struct tls_multi *multi, const struct user_pass *up)
Put the session id, and auth token status into the environment if auth-token is enabled.
Definition: auth_token.c:38
user_pass::username
char username[USER_PASS_LEN]
Definition: misc.h:72
SSLF_USERNAME_AS_COMMON_NAME
#define SSLF_USERNAME_AS_COMMON_NAME
Definition: ssl_common.h:417
tls_multi::tas_cache_num_updates
unsigned int tas_cache_num_updates
The number of times we updated the cache.
Definition: ssl_common.h:647
D_HANDSHAKE
#define D_HANDSHAKE
Definition: errlevel.h:72
cert_hash::sha256_hash
unsigned char sha256_hash[256/8]
Definition: ssl_verify.h:59
buffer::capacity
int capacity
Size in bytes of memory allocated by malloc().
Definition: buffer.h:62
TLS_AUTHENTICATION_SUCCEEDED
@ TLS_AUTHENTICATION_SUCCEEDED
Definition: ssl_verify.h:74
argv_printf_cat
bool argv_printf_cat(struct argv *argres, const char *format,...)
printf() inspired argv concatenation.
Definition: argv.c:464
alloc_buf_gc
struct buffer alloc_buf_gc(size_t size, struct gc_arena *gc)
Definition: buffer.c:88
openvpn_run_script
static int openvpn_run_script(const struct argv *a, const struct env_set *es, const unsigned int flags, const char *hook)
Will run a script and return the exit code of the script if between 0 and 255, -1 otherwise.
Definition: run_command.h:87
argv_free
void argv_free(struct argv *a)
Frees all memory allocations allocated by the struct argv related functions.
Definition: argv.c:102
CC_CRLF
#define CC_CRLF
carriage return or newline
Definition: buffer.h:920
session::key
char key[48]
Definition: keyingmaterialexporter.c:58
OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY
#define OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY
Definition: openvpn-plugin.h:122
backend_x509_get_username
result_t backend_x509_get_username(char *common_name, int cn_len, char *x509_username_field, openvpn_x509_cert_t *peer_cert)
Definition: ssl_verify_openssl.c:260
tls_options::remote_cert_eku
const char * remote_cert_eku
Definition: ssl_common.h:349
verify_final_auth_checks
void verify_final_auth_checks(struct tls_multi *multi, struct tls_session *session)
Perform final authentication checks, including locking of the cn, the allowed certificate hashes,...
Definition: ssl_verify.c:1773
tls_options::verify_hash_depth
int verify_hash_depth
Definition: ssl_common.h:351
x509_setenv_track
void x509_setenv_track(const struct x509_track *xt, struct env_set *es, const int depth, openvpn_x509_cert_t *x509)
Definition: ssl_verify_openssl.c:464
ssl_verify_openssl.h
MAX_PARMS
#define MAX_PARMS
Definition: options.h:52
get_primary_key
static const struct key_state * get_primary_key(const struct tls_multi *multi)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition: ssl_common.h:737
KS_AUTH_FALSE
@ KS_AUTH_FALSE
Key state is not authenticated
Definition: ssl_common.h:148
dmsg
#define dmsg(flags,...)
Definition: error.h:148
ENABLE_MANAGEMENT
#define ENABLE_MANAGEMENT
Definition: config.h:53
result_t
result_t
Result of verification function.
Definition: ssl_verify_backend.h:36
key_state_test_auth_control_file
static enum auth_deferred_result key_state_test_auth_control_file(struct auth_deferred_status *ads, bool cached)
Checks the auth control status from a file.
Definition: ssl_verify.c:1038
format_hex_ex
char * format_hex_ex(const uint8_t *data, int size, int maxoutput, unsigned int space_break_flags, const char *separator, struct gc_arena *gc)
Definition: buffer.c:483
SSLF_AUTH_USER_PASS_OPTIONAL
#define SSLF_AUTH_USER_PASS_OPTIONAL
Definition: ssl_common.h:418
argv_msg_prefix
void argv_msg_prefix(const int msglev, const struct argv *a, const char *prefix)
Similar to argv_msg() but prefixes the messages being written with a given string.
Definition: argv.c:260
verify_hash_list
Definition: options.h:240
backend_x509_get_serial
char * backend_x509_get_serial(openvpn_x509_cert_t *cert, struct gc_arena *gc)
Definition: ssl_verify_openssl.c:298
argv_parse_cmd
void argv_parse_cmd(struct argv *argres, const char *cmdstr)
Parses a command string, tokenizes it and puts each element into a separate struct argv argument slot...
Definition: argv.c:483
verify_cert_call_command
static result_t verify_cert_call_command(const char *verify_command, struct env_set *es, int cert_depth, char *subject)
Definition: ssl_verify.c:511
PATH_SEPARATOR
#define PATH_SEPARATOR
Definition: syshead.h:426
tls_verify_crl_missing
bool tls_verify_crl_missing(const struct tls_options *opt)
Return true iff a CRL is configured, but is not loaded.
Definition: ssl_verify_openssl.c:790
STATUS_OUTPUT_WRITE
#define STATUS_OUTPUT_WRITE
Definition: status.h:51
tls_options::tmp_dir
const char * tmp_dir
Definition: ssl_common.h:387
tls_multi
Security parameter state for a single VPN tunnel.
Definition: ssl_common.h:596
check_auth_pending_method
static bool check_auth_pending_method(const char *peer_info, const char *method)
Check peer_info if the client supports the requested pending auth method.
Definition: ssl_verify.c:851
key_state_rm_auth_pending_file
static void key_state_rm_auth_pending_file(struct auth_deferred_status *ads)
Removes auth_pending file from the file system and key_state structure.
Definition: ssl_verify.c:837
backend_x509_write_pem
result_t backend_x509_write_pem(openvpn_x509_cert_t *cert, const char *filename)
Definition: ssl_verify_openssl.c:325
key_state::authenticated
enum ks_auth_state authenticated
Definition: ssl_common.h:251
verify_peer_cert
static result_t verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, const char *subject, const char *common_name)
Definition: ssl_verify.c:324
key_state
Security parameter state of one TLS and data channel key session.
Definition: ssl_common.h:199
key_state_gen_auth_control_files
static bool key_state_gen_auth_control_files(struct auth_deferred_status *ads, const struct tls_options *opt)
Generates and creates the control files used for deferred authentification in the temporary directory...
Definition: ssl_verify.c:979
KEY_SCAN_SIZE
#define KEY_SCAN_SIZE
Definition: ssl_common.h:555
plugin_call
static int plugin_call(const struct plugin_list *pl, const int type, const struct argv *av, struct plugin_return *pr, struct env_set *es)
Definition: plugin.h:202
tls_auth_status
tls_auth_status
Definition: ssl_verify.h:72
MD_SHA256
@ MD_SHA256
Definition: crypto_backend.h:54
buffer_list_file
struct buffer_list * buffer_list_file(const char *fn, int max_line_len)
Definition: buffer.c:1335
ssl_util.h
KMDA_DEF
#define KMDA_DEF
Definition: ssl_verify.c:1517
env_set::list
struct env_item * list
Definition: env_set.h:44
TM_ACTIVE
#define TM_ACTIVE
Active tls_session.
Definition: ssl_common.h:535
x509_verify_cert_ku
result_t x509_verify_cert_ku(openvpn_x509_cert_t *x509, const unsigned *const expected_ku, int expected_len)
Definition: ssl_verify_openssl.c:679
string_alloc
char * string_alloc(const char *str, struct gc_arena *gc)
Definition: buffer.c:649
ssl_verify.h
ASSERT
#define ASSERT(x)
Definition: error.h:195
string_replace_leading
void string_replace_leading(char *str, const char match, const char replace)
Definition: buffer.c:1109
platform_test_file
bool platform_test_file(const char *filename)
Return true if filename can be opened for read.
Definition: platform.c:660
tls_username
const char * tls_username(const struct tls_multi *multi, const bool null)
Returns the username field for the given tunnel.
Definition: ssl_verify.c:172
buffer_entry::buf
struct buffer buf
Definition: buffer.h:1116
buf_chomp
void buf_chomp(struct buffer *buf)
Definition: buffer.c:554
tls_x509_clear_env
void tls_x509_clear_env(struct env_set *es)
Remove any X509_ env variables from env_set es.
Definition: ssl_verify.c:1835
key_state::mda_status
enum auth_deferred_result mda_status
Definition: ssl_common.h:256
OPENVPN_PLUGIN_FUNC_ERROR
#define OPENVPN_PLUGIN_FUNC_ERROR
Definition: openvpn-plugin.h:149
get_key_scan
static struct key_state * get_key_scan(struct tls_multi *multi, int index)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition: ssl_common.h:714
tls_options::verify_hash
struct verify_hash_list * verify_hash
Definition: ssl_common.h:350
tls_options
Definition: ssl_common.h:297
tls_options::x509_track
const struct x509_track * x509_track
Definition: ssl_common.h:432
tls_lock_common_name
void tls_lock_common_name(struct tls_multi *multi)
Locks the common name field for the given tunnel.
Definition: ssl_verify.c:133
BLEN
#define BLEN(buf)
Definition: buffer.h:127
tls_options::export_peer_cert_dir
const char * export_peer_cert_dir
Definition: ssl_common.h:388
ALLOC_OBJ
#define ALLOC_OBJ(dptr, type)
Definition: buffer.h:1055
CC_PRINT
#define CC_PRINT
printable (>= 32, != 127)
Definition: buffer.h:891
tls_session::key
struct key_state key[KS_SIZE]
Definition: ssl_common.h:515
set_common_name
void set_common_name(struct tls_session *session, const char *common_name)
Sets the common name field for the given tunnel.
Definition: ssl_verify.c:86
SSLF_CRL_VERIFY_DIR
#define SSLF_CRL_VERIFY_DIR
Definition: ssl_common.h:420
send_auth_pending_messages
bool send_auth_pending_messages(struct tls_multi *tls_multi, struct tls_session *session, const char *extra, unsigned int timeout)
Sends the auth pending control messages to a client.
Definition: push.c:439
string_mod
bool string_mod(char *str, const unsigned int inclusive, const unsigned int exclusive, const char replace)
Modifies a string in place by replacing certain classes of characters of it with a specified characte...
Definition: buffer.c:1041
tls_options::ssl_flags
unsigned int ssl_flags
Definition: ssl_common.h:426
buffer_entry::next
struct buffer_entry * next
Definition: buffer.h:1117
push.h
management_notify_client_needing_auth
void management_notify_client_needing_auth(struct management *management, const unsigned int mda_key_id, struct man_def_auth_context *mdac, const struct env_set *es)
Definition: manage.c:2939
M_WARN
#define M_WARN
Definition: error.h:91
OPENVPN_PLUGIN_FUNC_DEFERRED
#define OPENVPN_PLUGIN_FUNC_DEFERRED
Definition: openvpn-plugin.h:150
tls_authentication_status_use_cache
static bool tls_authentication_status_use_cache(struct tls_multi *multi)
uses cache_intervals times to determine if we should update the cache.
Definition: ssl_verify.c:1133
verify_cert_set_env
static void verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, const char *subject, const struct x509_track *x509_track)
Definition: ssl_verify.c:400
check_for_client_reason
static void check_for_client_reason(struct tls_multi *multi, struct auth_deferred_status *status)
Check if the script/plugin left a message in the auth failed message file and relay it to the user.
Definition: ssl_verify.c:1274
verify_crresponse_plugin
void verify_crresponse_plugin(struct tls_multi *multi, const char *cr_response)
Call the plugin OPENVPN_PLUGIN_CLIENT_CRRESPONSE.
Definition: ssl_verify.c:1394
tls_deauthenticate
static void tls_deauthenticate(struct tls_multi *multi)
Definition: ssl_verify.c:70
tls_multi::locked_cn
char * locked_cn
Definition: ssl_common.h:629
x509_get_sha1_fingerprint
struct buffer x509_get_sha1_fingerprint(openvpn_x509_cert_t *cert, struct gc_arena *gc)
Retrieve the certificate's SHA1 fingerprint.
Definition: ssl_verify_openssl.c:348
status_printf
void status_printf(struct status_output *so, const char *format,...)
Definition: status.c:222
D_MULTI_LOW
#define D_MULTI_LOW
Definition: errlevel.h:86
verify_user_pass_script
static int verify_user_pass_script(struct tls_session *session, struct tls_multi *multi, const struct user_pass *up)
Definition: ssl_verify.c:1289
TLS_AUTHENTICATION_FAILED
@ TLS_AUTHENTICATION_FAILED
Definition: ssl_verify.h:75
cert_hash_remember
void cert_hash_remember(struct tls_session *session, const int error_depth, const struct buffer *cert_hash)
Definition: ssl_verify.c:194
CCD_DEFAULT
#define CCD_DEFAULT
Definition: common.h:62
tls_options::verify_command
const char * verify_command
Definition: ssl_common.h:342
base64.h
set_verify_user_pass_env
static bool set_verify_user_pass_env(struct user_pass *up, struct tls_multi *multi, struct tls_session *session)
Definition: ssl_verify.c:1543
status_output
Definition: status.h:48
tls_session::common_name
char * common_name
Definition: ssl_common.h:506
verify_cert_cert_export_env
static bool verify_cert_cert_export_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, const char *pem_export_fname)
Exports the certificate in peer_cert into the environment and adds the filname.
Definition: ssl_verify.c:455
OPENVPN_PLUGIN_TLS_VERIFY
#define OPENVPN_PLUGIN_TLS_VERIFY
Definition: openvpn-plugin.h:121
string_mod_remap_name
static void string_mod_remap_name(char *str)
Definition: ssl_verify.c:52
tls_lock_username
static bool tls_lock_username(struct tls_multi *multi, const char *username)
Definition: ssl_verify.c:146
KS_AUTH_TRUE
@ KS_AUTH_TRUE
Key state is authenticated.
Definition: ssl_common.h:151
management_enable_def_auth
static bool management_enable_def_auth(const struct management *man)
Definition: manage.h:459
tls_multi::peer_info
char * peer_info
Definition: ssl_common.h:658
SIZE
#define SIZE(x)
Definition: basic.h:30
buffer
Wrapper structure for dynamically allocated memory.
Definition: buffer.h:60
ACF_SUCCEEDED
@ ACF_SUCCEEDED
deferred auth has suceeded
Definition: ssl_common.h:170
verify_user_pass_management
static int verify_user_pass_management(struct tls_session *session, const struct user_pass *up)
Definition: ssl_verify.c:1520
x509_setenv
void x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert)
Definition: ssl_verify_openssl.c:553
cert_hash_compare
bool cert_hash_compare(const struct cert_hash_set *chs1, const struct cert_hash_set *chs2)
Compares certificates hashes, returns true if hashes are equal.
Definition: ssl_verify.c:229
tls_lock_cert_hash_set
void tls_lock_cert_hash_set(struct tls_multi *multi)
Locks the certificate hash set used in the given tunnel.
Definition: ssl_verify.c:287
SUCCESS
@ SUCCESS
Definition: ssl_verify_backend.h:36
tls_options::verify_x509_type
int verify_x509_type
Definition: ssl_common.h:343
D_TLS_ERRORS
#define D_TLS_ERRORS
Definition: errlevel.h:59
tls_authenticate_key
bool tls_authenticate_key(struct tls_multi *multi, const unsigned int mda_key_id, const bool auth, const char *client_reason)
Definition: ssl_verify.c:1238
tls_options::x509_username_field
char * x509_username_field[2]
Definition: ssl_common.h:357
verify_hash_list::hash
uint8_t hash[SHA256_DIGEST_LENGTH]
Definition: options.h:244
auth_deferred_status::auth_control_file
char * auth_control_file
Definition: ssl_common.h:160
platform_unlink
bool platform_unlink(const char *filename)
Definition: platform.c:488
tls_options::ns_cert_type
int ns_cert_type
Definition: ssl_common.h:347
VERIFY_X509_NONE
#define VERIFY_X509_NONE
Definition: ssl_verify.h:67
tls_session
Security parameter state of a single session within a VPN tunnel.
Definition: ssl_common.h:479
generate_auth_token
void generate_auth_token(const struct user_pass *up, struct tls_multi *multi)
Generate an auth token based on username and timestamp.
Definition: auth_token.c:164
key_state::mda_key_id
unsigned int mda_key_id
Definition: ssl_common.h:255
verify_user_pass_plugin
static int verify_user_pass_plugin(struct tls_session *session, struct tls_multi *multi, const struct user_pass *up)
Definition: ssl_verify.c:1463
status_close
bool status_close(struct status_output *so)
Definition: status.c:188
syshead.h
BPTR
#define BPTR(buf)
Definition: buffer.h:124
setenv_untrusted
static void setenv_untrusted(struct tls_session *session)
Definition: ssl_verify.c:61
tls_multi::locked_original_username
char * locked_original_username
The username that client initially used before being overridden by –override-user.
Definition: ssl_common.h:638
tls_options::verify_hash_algo
hash_algo_type verify_hash_algo
Definition: ssl_common.h:353
cert_hash_set
Structure containing the hashes for a full certificate chain.
Definition: ssl_verify.h:63
gc_arena
Garbage collection arena used to keep track of dynamically allocated memory.
Definition: buffer.h:116
key_state_rm_auth_control_files
void key_state_rm_auth_control_files(struct auth_deferred_status *ads)
Removes auth_pending and auth_control files from file system and key_state structure.
Definition: ssl_verify.c:955
setenv_str
void setenv_str(struct env_set *es, const char *name, const char *value)
Definition: env_set.c:283
KMDA_ERROR
#define KMDA_ERROR
Definition: ssl_verify.c:1514
env_set
Definition: env_set.h:42
openvpn_x509_cert_t
X509 openvpn_x509_cert_t
Definition: openvpn-plugin.h:40
env_set_del
bool env_set_del(struct env_set *es, const char *str)
Definition: env_set.c:183
key_state::plugin_auth
struct auth_deferred_status plugin_auth
Definition: ssl_common.h:260
plugin_list
Definition: plugin.h:94
argv_new
struct argv argv_new(void)
Allocates a new struct argv and ensures it is initialised.
Definition: argv.c:88
argv_printf
bool argv_printf(struct argv *argres, const char *format,...)
printf() variant which populates a struct argv.
Definition: argv.c:440
memcmp_constant_time
int memcmp_constant_time(const void *a, const void *b, size_t size)
As memcmp(), but constant-time.
Definition: crypto_openssl.c:1346
tls_multi::client_reason
char * client_reason
Definition: ssl_common.h:652
AUTH_TOKEN_HMAC_OK
#define AUTH_TOKEN_HMAC_OK
Auth-token sent from client has valid hmac.
Definition: ssl_common.h:667
S_EXITCODE
#define S_EXITCODE
Instead of returning 1/0 for success/fail, return exit code when between 0 and 255 and -1 otherwise.
Definition: run_command.h:49
platform_gen_path
const char * platform_gen_path(const char *directory, const char *filename, struct gc_arena *gc)
Put a directory and filename together.
Definition: platform.c:594
man_def_auth_test
static enum auth_deferred_result man_def_auth_test(const struct key_state *ks)
Definition: ssl_verify.c:819
ACF_PENDING
@ ACF_PENDING
deferred auth still pending
Definition: ssl_common.h:169
cert_hash_copy
static struct cert_hash_set * cert_hash_copy(const struct cert_hash_set *chs)
Definition: ssl_verify.c:266
auth_deferred_result
auth_deferred_result
Definition: ssl_common.h:168
key_state::script_auth
struct auth_deferred_status script_auth
Definition: ssl_common.h:261
tls_options::crl_file
const char * crl_file
Definition: ssl_common.h:345
max_int
static int max_int(int x, int y)
Definition: integer.h:89
AUTH_TOKEN_EXPIRED
#define AUTH_TOKEN_EXPIRED
Auth-token sent from client has expired.
Definition: ssl_common.h:669
otime.h
x509_verify_ns_cert_type
result_t x509_verify_ns_cert_type(openvpn_x509_cert_t *cert, const int usage)
Definition: ssl_verify_openssl.c:612
cert_hash_free
void cert_hash_free(struct cert_hash_set *chs)
Frees the given set of certificate hashes.
Definition: ssl_verify.c:215
status
static SERVICE_STATUS status
Definition: interactive.c:53
auth_set_client_reason
void auth_set_client_reason(struct tls_multi *multi, const char *client_reason)
Sets the reason why authentication of a client failed.
Definition: ssl_verify.c:805
management
Definition: manage.h:335
gc_free
static void gc_free(struct gc_arena *a)
Definition: buffer.h:1033
ACF_FAILED
@ ACF_FAILED
deferred auth has failed
Definition: ssl_common.h:172
cert_hash
Structure containing the hash for a single certificate.
Definition: ssl_verify.h:58
KS_AUTH_DEFERRED
@ KS_AUTH_DEFERRED
Key state authentication is being deferred, by async auth.
Definition: ssl_common.h:149
ALLOC_OBJ_CLEAR
#define ALLOC_OBJ_CLEAR(dptr, type)
Definition: buffer.h:1060
verify_check_crl_dir
static result_t verify_check_crl_dir(const char *crl_dir, openvpn_x509_cert_t *cert, const char *subject, int cert_depth)
Definition: ssl_verify.c:545
now
time_t now
Definition: otime.c:34
wipe_auth_token
void wipe_auth_token(struct tls_multi *multi)
Wipes the authentication token out of the memory, frees and cleans up related buffers and flags.
Definition: auth_token.c:401
x509_get_subject
char * x509_get_subject(openvpn_x509_cert_t *cert, struct gc_arena *gc)
Definition: ssl_verify_openssl.c:368
verify_cert_cert_delete_env
static void verify_cert_cert_delete_env(struct env_set *es, const char *pem_export_fname)
Definition: ssl_verify.c:465
env_item
Definition: env_set.h:37
key_state::auth_deferred_expire
time_t auth_deferred_expire
Definition: ssl_common.h:252
tls_multi::tas_cache_last_update
time_t tas_cache_last_update
Time of last when we updated the cached state of tls_authentication_status deferred files.
Definition: ssl_common.h:644
OPENVPN_PLUGIN_FUNC_SUCCESS
#define OPENVPN_PLUGIN_FUNC_SUCCESS
Definition: openvpn-plugin.h:148
config.h
cache_intervals
static time_t cache_intervals[]
The minimum times to have passed to update the cache.
Definition: ssl_verify.c:1126
key_state_check_auth_failed_message_file
static char * key_state_check_auth_failed_message_file(const struct auth_deferred_status *ads, struct gc_arena *gc)
Checks if the auth failed reason file has any content and if yes it will be returned as string alloca...
Definition: ssl_verify.c:1009
buffer_list_free
void buffer_list_free(struct buffer_list *ol)
Frees a buffer list and all the buffers in it.
Definition: buffer.c:1167
MD_SHA1
@ MD_SHA1
Definition: crypto_backend.h:53
update_key_auth_status
static void update_key_auth_status(bool cached, struct key_state *ks)
This method takes a key_state and if updates the state of the key if it is deferred.
Definition: ssl_verify.c:1074
print_nsCertType
static const char * print_nsCertType(int type)
Definition: ssl_verify.c:300
tls_options::remote_cert_ku
unsigned remote_cert_ku[MAX_PARMS]
Definition: ssl_common.h:348
user_pass::password
char password[USER_PASS_LEN]
Definition: misc.h:73
user_pass::protected
bool protected
Definition: misc.h:63
session
Definition: keyingmaterialexporter.c:56
plugin_defined
bool plugin_defined(const struct plugin_list *pl, const int type)
Definition: plugin.c:932
platform_open
int platform_open(const char *path, int flags, int mode)
Definition: platform.c:514
setenv_link_socket_actual
void setenv_link_socket_actual(struct env_set *es, const char *name_prefix, const struct link_socket_actual *act, const unsigned int flags)
Definition: socket.c:3147
tls_multi::locked_username
char * locked_username
The locked username is the username we assume the client is using.
Definition: ssl_common.h:634
tls_multi::auth_token_initial
char * auth_token_initial
The first auth-token we sent to a client.
Definition: ssl_common.h:663
extract_var_peer_info
char * extract_var_peer_info(const char *peer_info, const char *var, struct gc_arena *gc)
Extracts a variable from peer info, the returned string will be allocated using the supplied gc_arena...
Definition: ssl_util.c:32
user_pass
Definition: misc.h:56
KS_SIZE
#define KS_SIZE
Size of the tls_session.key array.
Definition: ssl_common.h:459
setenv_del
void setenv_del(struct env_set *es, const char *name)
Definition: env_set.c:328
backend_x509_get_serial_hex
char * backend_x509_get_serial_hex(openvpn_x509_cert_t *cert, struct gc_arena *gc)
Definition: ssl_verify_openssl.c:317
ACF_DISABLED
@ ACF_DISABLED
deferred auth is not used
Definition: ssl_common.h:171
buffer_list
Definition: buffer.h:1120
msg
#define msg(flags,...)
Definition: error.h:144
verify_user_pass
void verify_user_pass(struct user_pass *up, struct tls_multi *multi, struct tls_session *session)
Main username/password verification entry point.
Definition: ssl_verify.c:1578
tls_clear_error
void tls_clear_error(void)
Clear the underlying SSL library's error state.
tls_options::es
struct env_set * es
Definition: ssl_common.h:405
buf_printf
bool buf_printf(struct buffer *buf, const char *format,...)
Definition: buffer.c:240
x509_track
Definition: ssl_verify.h:228
buffer_list::head
struct buffer_entry * head
Definition: buffer.h:1122
TLS_AUTHENTICATION_DEFERRED
@ TLS_AUTHENTICATION_DEFERRED
Definition: ssl_verify.h:76
KMDA_SUCCESS
#define KMDA_SUCCESS
Definition: ssl_verify.c:1515
tls_options::plugins
const struct plugin_list * plugins
Definition: ssl_common.h:407
NS_CERT_CHECK_SERVER
#define NS_CERT_CHECK_SERVER
Do not perform Netscape certificate type verification.
Definition: ssl_verify.h:243
NS_CERT_CHECK_NONE
#define NS_CERT_CHECK_NONE
Do not perform Netscape certificate type verification.
Definition: ssl_verify.h:241
NS_CERT_CHECK_CLIENT
#define NS_CERT_CHECK_CLIENT
Do not perform Netscape certificate type verification.
Definition: ssl_verify.h:245
tls_common_name
const char * tls_common_name(const struct tls_multi *multi, const bool null)
Returns the common name field for the given tunnel.
Definition: ssl_verify.c:108
gc
struct gc_arena gc
Definition: test_ssl.c:155
FAILURE
@ FAILURE
Definition: ssl_verify_backend.h:36
cleanup
static int cleanup(void **state)
Definition: test_pkcs11.c:290