зеркало из https://github.com/github/ruby.git
* ext/openssl/lib/openssl/ssl.rb (verify_certificate_identity): fix
hostname verification. Patched by nahi. * test/openssl/test_ssl.rb (test_verify_certificate_identity): test for above. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@41671 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
Родитель
044387a1d7
Коммит
bc47f294ee
|
@ -1,3 +1,12 @@
|
|||
Thu Jun 27 20:03:13 2013 CHIKANAGA Tomoyuki <nagachika@ruby-lang.org>
|
||||
|
||||
* ext/openssl/lib/openssl/ssl.rb (verify_certificate_identity): fix
|
||||
hostname verification. Patched by nahi.
|
||||
|
||||
* test/openssl/test_ssl.rb (test_verify_certificate_identity): test for
|
||||
above.
|
||||
|
||||
|
||||
Thu Jun 27 00:23:57 2013 Tanaka Akira <akr@fsij.org>
|
||||
|
||||
* bignum.c (rb_big_pow): Retry if y is a Bignum and it is
|
||||
|
|
|
@ -98,14 +98,22 @@ module OpenSSL
|
|||
should_verify_common_name = true
|
||||
cert.extensions.each{|ext|
|
||||
next if ext.oid != "subjectAltName"
|
||||
ext.value.split(/,\s+/).each{|general_name|
|
||||
if /\ADNS:(.*)/ =~ general_name
|
||||
id, ostr = OpenSSL::ASN1.decode(ext.to_der).value
|
||||
sequence = OpenSSL::ASN1.decode(ostr.value)
|
||||
sequence.value.each{|san|
|
||||
case san.tag
|
||||
when 2 # dNSName in GeneralName (RFC5280)
|
||||
should_verify_common_name = false
|
||||
reg = Regexp.escape($1).gsub(/\\\*/, "[^.]+")
|
||||
reg = Regexp.escape(san.value).gsub(/\\\*/, "[^.]+")
|
||||
return true if /\A#{reg}\z/i =~ hostname
|
||||
elsif /\AIP Address:(.*)/ =~ general_name
|
||||
when 7 # iPAddress in GeneralName (RFC5280)
|
||||
should_verify_common_name = false
|
||||
return true if $1 == hostname
|
||||
# follows GENERAL_NAME_print() in x509v3/v3_alt.c
|
||||
if san.value.size == 4
|
||||
return true if san.value.unpack('C*').join('.') == hostname
|
||||
elsif san.value.size == 16
|
||||
return true if san.value.unpack('n*').map { |e| sprintf("%X", e) }.join(':') == hostname
|
||||
end
|
||||
end
|
||||
}
|
||||
}
|
||||
|
|
|
@ -337,6 +337,28 @@ class OpenSSL::TestSSL < OpenSSL::SSLTestCase
|
|||
}
|
||||
end
|
||||
|
||||
def test_verify_certificate_identity
|
||||
# creating NULL byte SAN certificate
|
||||
ef = OpenSSL::X509::ExtensionFactory.new
|
||||
cert = OpenSSL::X509::Certificate.new
|
||||
cert.subject = OpenSSL::X509::Name.parse "/DC=some/DC=site/CN=Some Site"
|
||||
ext = ef.create_ext('subjectAltName', 'DNS:placeholder,IP:192.168.7.1,IP:13::17')
|
||||
ext_asn1 = OpenSSL::ASN1.decode(ext.to_der)
|
||||
san_list_der = ext_asn1.value.reduce(nil) { |memo,val| val.tag == 4 ? val.value : memo }
|
||||
san_list_asn1 = OpenSSL::ASN1.decode(san_list_der)
|
||||
san_list_asn1.value[0].value = 'www.example.com\0.evil.com'
|
||||
ext_asn1.value[1].value = san_list_asn1.to_der
|
||||
real_ext = OpenSSL::X509::Extension.new ext_asn1
|
||||
cert.add_extension(real_ext)
|
||||
|
||||
assert_equal(false, OpenSSL::SSL.verify_certificate_identity(cert, 'www.example.com'))
|
||||
assert_equal(true, OpenSSL::SSL.verify_certificate_identity(cert, 'www.example.com\0.evil.com'))
|
||||
assert_equal(false, OpenSSL::SSL.verify_certificate_identity(cert, '192.168.7.255'))
|
||||
assert_equal(true, OpenSSL::SSL.verify_certificate_identity(cert, '192.168.7.1'))
|
||||
assert_equal(false, OpenSSL::SSL.verify_certificate_identity(cert, '13::17'))
|
||||
assert_equal(true, OpenSSL::SSL.verify_certificate_identity(cert, '13:0:0:0:0:0:0:17'))
|
||||
end
|
||||
|
||||
def test_tlsext_hostname
|
||||
return unless OpenSSL::SSL::SSLSocket.instance_methods.include?(:hostname)
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче