Use C99 initialisations for iterators
[exim.git] / src / src / tls-openssl.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
f9ba5e22 5/* Copyright (c) University of Cambridge 1995 - 2018 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
f5d78688
JH
8/* Portions Copyright (c) The OpenSSL Project 1999 */
9
059ec3d9
PH
10/* This module provides the TLS (aka SSL) support for Exim using the OpenSSL
11library. It is #included into the tls.c file when that library is used. The
12code herein is based on a patch that was originally contributed by Steve
13Haslam. It was adapted from stunnel, a GPL program by Michal Trojnara.
14
15No cryptographic code is included in Exim. All this module does is to call
16functions from the OpenSSL library. */
17
18
19/* Heading stuff */
20
21#include <openssl/lhash.h>
22#include <openssl/ssl.h>
23#include <openssl/err.h>
24#include <openssl/rand.h>
10ca4f1c
JH
25#ifndef OPENSSL_NO_ECDH
26# include <openssl/ec.h>
27#endif
f2de3a33 28#ifndef DISABLE_OCSP
e51c7be2 29# include <openssl/ocsp.h>
3f7eeb86 30#endif
c0635b6d 31#ifdef SUPPORT_DANE
05e796ad 32# include "danessl.h"
85098ee7
JH
33#endif
34
3f7eeb86 35
f2de3a33
JH
36#ifndef DISABLE_OCSP
37# define EXIM_OCSP_SKEW_SECONDS (300L)
38# define EXIM_OCSP_MAX_AGE (-1L)
3f7eeb86 39#endif
059ec3d9 40
3bcbbbe2 41#if OPENSSL_VERSION_NUMBER >= 0x0090806fL && !defined(OPENSSL_NO_TLSEXT)
e51c7be2 42# define EXIM_HAVE_OPENSSL_TLSEXT
3bcbbbe2 43#endif
c8dfb21d
JH
44#if OPENSSL_VERSION_NUMBER >= 0x00908000L
45# define EXIM_HAVE_RSA_GENKEY_EX
46#endif
47#if OPENSSL_VERSION_NUMBER >= 0x10100000L
48# define EXIM_HAVE_OCSP_RESP_COUNT
49#else
50# define EXIM_HAVE_EPHEM_RSA_KEX
51# define EXIM_HAVE_RAND_PSEUDO
52#endif
53#if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
8442641e 54# define EXIM_HAVE_SHA256
c8dfb21d 55#endif
34e3241d 56
d7978c0f
JH
57/* X509_check_host provides sane certificate hostname checking, but was added
58to OpenSSL late, after other projects forked off the code-base. So in
59addition to guarding against the base version number, beware that LibreSSL
60does not (at this time) support this function.
61
62If LibreSSL gains a different API, perhaps via libtls, then we'll probably
63opt to disentangle and ask a LibreSSL user to provide glue for a third
64crypto provider for libtls instead of continuing to tie the OpenSSL glue
65into even twistier knots. If LibreSSL gains the same API, we can just
66change this guard and punt the issue for a while longer. */
67
34e3241d
PP
68#ifndef LIBRESSL_VERSION_NUMBER
69# if OPENSSL_VERSION_NUMBER >= 0x010100000L
70# define EXIM_HAVE_OPENSSL_CHECKHOST
8420742d 71# define EXIM_HAVE_OPENSSL_DH_BITS
7a8b9519 72# define EXIM_HAVE_OPENSSL_TLS_METHOD
7434882d
JH
73# else
74# define EXIM_NEED_OPENSSL_INIT
34e3241d
PP
75# endif
76# if OPENSSL_VERSION_NUMBER >= 0x010000000L \
2dfb468b 77 && (OPENSSL_VERSION_NUMBER & 0x0000ff000L) >= 0x000002000L
34e3241d
PP
78# define EXIM_HAVE_OPENSSL_CHECKHOST
79# endif
11aa88b0 80#endif
10ca4f1c 81
11aa88b0
RA
82#if !defined(LIBRESSL_VERSION_NUMBER) \
83 || LIBRESSL_VERSION_NUMBER >= 0x20010000L
10ca4f1c
JH
84# if !defined(OPENSSL_NO_ECDH)
85# if OPENSSL_VERSION_NUMBER >= 0x0090800fL
8442641e 86# define EXIM_HAVE_ECDH
10ca4f1c
JH
87# endif
88# if OPENSSL_VERSION_NUMBER >= 0x10002000L
10ca4f1c
JH
89# define EXIM_HAVE_OPENSSL_EC_NIST2NID
90# endif
91# endif
2dfb468b 92#endif
3bcbbbe2 93
67791ce4
JH
94#if !defined(EXIM_HAVE_OPENSSL_TLSEXT) && !defined(DISABLE_OCSP)
95# warning "OpenSSL library version too old; define DISABLE_OCSP in Makefile"
96# define DISABLE_OCSP
97#endif
98
a6510420
JH
99#ifdef EXIM_HAVE_OPENSSL_CHECKHOST
100# include <openssl/x509v3.h>
101#endif
102
8442641e
JH
103/*************************************************
104* OpenSSL option parse *
105*************************************************/
106
107typedef struct exim_openssl_option {
108 uschar *name;
109 long value;
110} exim_openssl_option;
111/* We could use a macro to expand, but we need the ifdef and not all the
112options document which version they were introduced in. Policylet: include
113all options unless explicitly for DTLS, let the administrator choose which
114to apply.
115
116This list is current as of:
117 ==> 1.0.1b <==
118Plus SSL_OP_SAFARI_ECDHE_ECDSA_BUG from 2013-June patch/discussion on openssl-dev
119Plus SSL_OP_NO_TLSv1_3 for 1.1.2-dev
120*/
121static exim_openssl_option exim_openssl_options[] = {
122/* KEEP SORTED ALPHABETICALLY! */
123#ifdef SSL_OP_ALL
124 { US"all", SSL_OP_ALL },
125#endif
126#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
127 { US"allow_unsafe_legacy_renegotiation", SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION },
128#endif
129#ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
130 { US"cipher_server_preference", SSL_OP_CIPHER_SERVER_PREFERENCE },
131#endif
132#ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
133 { US"dont_insert_empty_fragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS },
134#endif
135#ifdef SSL_OP_EPHEMERAL_RSA
136 { US"ephemeral_rsa", SSL_OP_EPHEMERAL_RSA },
137#endif
138#ifdef SSL_OP_LEGACY_SERVER_CONNECT
139 { US"legacy_server_connect", SSL_OP_LEGACY_SERVER_CONNECT },
140#endif
141#ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
142 { US"microsoft_big_sslv3_buffer", SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER },
143#endif
144#ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
145 { US"microsoft_sess_id_bug", SSL_OP_MICROSOFT_SESS_ID_BUG },
146#endif
147#ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING
148 { US"msie_sslv2_rsa_padding", SSL_OP_MSIE_SSLV2_RSA_PADDING },
149#endif
150#ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
151 { US"netscape_challenge_bug", SSL_OP_NETSCAPE_CHALLENGE_BUG },
152#endif
153#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
154 { US"netscape_reuse_cipher_change_bug", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
155#endif
156#ifdef SSL_OP_NO_COMPRESSION
157 { US"no_compression", SSL_OP_NO_COMPRESSION },
158#endif
159#ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
160 { US"no_session_resumption_on_renegotiation", SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION },
161#endif
162#ifdef SSL_OP_NO_SSLv2
163 { US"no_sslv2", SSL_OP_NO_SSLv2 },
164#endif
165#ifdef SSL_OP_NO_SSLv3
166 { US"no_sslv3", SSL_OP_NO_SSLv3 },
167#endif
168#ifdef SSL_OP_NO_TICKET
169 { US"no_ticket", SSL_OP_NO_TICKET },
170#endif
171#ifdef SSL_OP_NO_TLSv1
172 { US"no_tlsv1", SSL_OP_NO_TLSv1 },
173#endif
174#ifdef SSL_OP_NO_TLSv1_1
175#if SSL_OP_NO_TLSv1_1 == 0x00000400L
176 /* Error in chosen value in 1.0.1a; see first item in CHANGES for 1.0.1b */
177#warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring
178#else
179 { US"no_tlsv1_1", SSL_OP_NO_TLSv1_1 },
180#endif
181#endif
182#ifdef SSL_OP_NO_TLSv1_2
183 { US"no_tlsv1_2", SSL_OP_NO_TLSv1_2 },
184#endif
185#ifdef SSL_OP_NO_TLSv1_3
186 { US"no_tlsv1_3", SSL_OP_NO_TLSv1_3 },
187#endif
188#ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG
189 { US"safari_ecdhe_ecdsa_bug", SSL_OP_SAFARI_ECDHE_ECDSA_BUG },
190#endif
191#ifdef SSL_OP_SINGLE_DH_USE
192 { US"single_dh_use", SSL_OP_SINGLE_DH_USE },
193#endif
194#ifdef SSL_OP_SINGLE_ECDH_USE
195 { US"single_ecdh_use", SSL_OP_SINGLE_ECDH_USE },
196#endif
197#ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG
198 { US"ssleay_080_client_dh_bug", SSL_OP_SSLEAY_080_CLIENT_DH_BUG },
199#endif
200#ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
201 { US"sslref2_reuse_cert_type_bug", SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG },
202#endif
203#ifdef SSL_OP_TLS_BLOCK_PADDING_BUG
204 { US"tls_block_padding_bug", SSL_OP_TLS_BLOCK_PADDING_BUG },
205#endif
206#ifdef SSL_OP_TLS_D5_BUG
207 { US"tls_d5_bug", SSL_OP_TLS_D5_BUG },
208#endif
209#ifdef SSL_OP_TLS_ROLLBACK_BUG
210 { US"tls_rollback_bug", SSL_OP_TLS_ROLLBACK_BUG },
211#endif
212};
213
214#ifndef MACRO_PREDEF
215static int exim_openssl_options_size = nelem(exim_openssl_options);
216#endif
217
218#ifdef MACRO_PREDEF
219void
220options_tls(void)
221{
8442641e
JH
222uschar buf[64];
223
d7978c0f 224for (struct exim_openssl_option * o = exim_openssl_options;
8442641e
JH
225 o < exim_openssl_options + nelem(exim_openssl_options); o++)
226 {
227 /* Trailing X is workaround for problem with _OPT_OPENSSL_NO_TLSV1
228 being a ".ifdef _OPT_OPENSSL_NO_TLSV1_3" match */
229
230 spf(buf, sizeof(buf), US"_OPT_OPENSSL_%T_X", o->name);
231 builtin_macro_create(buf);
232 }
233}
234#else
235
236/******************************************************************************/
237
059ec3d9
PH
238/* Structure for collecting random data for seeding. */
239
240typedef struct randstuff {
9e3331ea
TK
241 struct timeval tv;
242 pid_t p;
059ec3d9
PH
243} randstuff;
244
245/* Local static variables */
246
a2ff477a
JH
247static BOOL client_verify_callback_called = FALSE;
248static BOOL server_verify_callback_called = FALSE;
059ec3d9
PH
249static const uschar *sid_ctx = US"exim";
250
d4f09789
PP
251/* We have three different contexts to care about.
252
253Simple case: client, `client_ctx`
254 As a client, we can be doing a callout or cut-through delivery while receiving
255 a message. So we have a client context, which should have options initialised
74f1a423
JH
256 from the SMTP Transport. We may also concurrently want to make TLS connections
257 to utility daemons, so client-contexts are allocated and passed around in call
258 args rather than using a gobal.
d4f09789
PP
259
260Server:
261 There are two cases: with and without ServerNameIndication from the client.
262 Given TLS SNI, we can be using different keys, certs and various other
263 configuration settings, because they're re-expanded with $tls_sni set. This
264 allows vhosting with TLS. This SNI is sent in the handshake.
265 A client might not send SNI, so we need a fallback, and an initial setup too.
266 So as a server, we start out using `server_ctx`.
267 If SNI is sent by the client, then we as server, mid-negotiation, try to clone
268 `server_sni` from `server_ctx` and then initialise settings by re-expanding
269 configuration.
270*/
271
74f1a423
JH
272typedef struct {
273 SSL_CTX * ctx;
274 SSL * ssl;
275} exim_openssl_client_tls_ctx;
276
817d9f57 277static SSL_CTX *server_ctx = NULL;
817d9f57 278static SSL *server_ssl = NULL;
389ca47a 279
35731706 280#ifdef EXIM_HAVE_OPENSSL_TLSEXT
817d9f57 281static SSL_CTX *server_sni = NULL;
35731706 282#endif
059ec3d9
PH
283
284static char ssl_errstring[256];
285
286static int ssl_session_timeout = 200;
a2ff477a
JH
287static BOOL client_verify_optional = FALSE;
288static BOOL server_verify_optional = FALSE;
059ec3d9 289
f5d78688 290static BOOL reexpand_tls_files_for_sni = FALSE;
059ec3d9
PH
291
292
7be682ca
PP
293typedef struct tls_ext_ctx_cb {
294 uschar *certificate;
295 uschar *privatekey;
f5d78688 296 BOOL is_server;
a6510420 297#ifndef DISABLE_OCSP
c3033f13 298 STACK_OF(X509) *verify_stack; /* chain for verifying the proof */
f5d78688
JH
299 union {
300 struct {
301 uschar *file;
302 uschar *file_expanded;
303 OCSP_RESPONSE *response;
304 } server;
305 struct {
44662487
JH
306 X509_STORE *verify_store; /* non-null if status requested */
307 BOOL verify_required;
f5d78688
JH
308 } client;
309 } u_ocsp;
3f7eeb86 310#endif
7be682ca
PP
311 uschar *dhparam;
312 /* these are cached from first expand */
313 uschar *server_cipher_list;
314 /* only passed down to tls_error: */
315 host_item *host;
55414b25 316 const uschar * verify_cert_hostnames;
0cbf2b82 317#ifndef DISABLE_EVENT
a7538db1
JH
318 uschar * event_action;
319#endif
7be682ca
PP
320} tls_ext_ctx_cb;
321
322/* should figure out a cleanup of API to handle state preserved per
323implementation, for various reasons, which can be void * in the APIs.
324For now, we hack around it. */
817d9f57
JH
325tls_ext_ctx_cb *client_static_cbinfo = NULL;
326tls_ext_ctx_cb *server_static_cbinfo = NULL;
7be682ca
PP
327
328static int
983207c1 329setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
cf0c6164 330 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr );
059ec3d9 331
3f7eeb86 332/* Callbacks */
3bcbbbe2 333#ifdef EXIM_HAVE_OPENSSL_TLSEXT
3f7eeb86 334static int tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg);
3bcbbbe2 335#endif
f2de3a33 336#ifndef DISABLE_OCSP
f5d78688 337static int tls_server_stapling_cb(SSL *s, void *arg);
3f7eeb86
PP
338#endif
339
059ec3d9
PH
340
341/*************************************************
342* Handle TLS error *
343*************************************************/
344
345/* Called from lots of places when errors occur before actually starting to do
346the TLS handshake, that is, while the session is still in clear. Always returns
347DEFER for a server and FAIL for a client so that most calls can use "return
348tls_error(...)" to do this processing and then give an appropriate return. A
349single function is used for both server and client, because it is called from
350some shared functions.
351
352Argument:
353 prefix text to include in the logged error
354 host NULL if setting up a server;
355 the connected host if setting up a client
7199e1ee 356 msg error message or NULL if we should ask OpenSSL
cf0c6164 357 errstr pointer to output error message
059ec3d9
PH
358
359Returns: OK/DEFER/FAIL
360*/
361
362static int
cf0c6164 363tls_error(uschar * prefix, const host_item * host, uschar * msg, uschar ** errstr)
059ec3d9 364{
c562fd30 365if (!msg)
7199e1ee 366 {
0abc5a13 367 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
cf0c6164 368 msg = US ssl_errstring;
7199e1ee
TF
369 }
370
5a2a0989
JH
371msg = string_sprintf("(%s): %s", prefix, msg);
372DEBUG(D_tls) debug_printf("TLS error '%s'\n", msg);
373if (errstr) *errstr = msg;
cf0c6164 374return host ? FAIL : DEFER;
059ec3d9
PH
375}
376
377
378
379/*************************************************
380* Callback to generate RSA key *
381*************************************************/
382
383/*
384Arguments:
3ae79556 385 s SSL connection (not used)
059ec3d9
PH
386 export not used
387 keylength keylength
388
389Returns: pointer to generated key
390*/
391
392static RSA *
393rsa_callback(SSL *s, int export, int keylength)
394{
395RSA *rsa_key;
c8dfb21d
JH
396#ifdef EXIM_HAVE_RSA_GENKEY_EX
397BIGNUM *bn = BN_new();
398#endif
399
059ec3d9
PH
400export = export; /* Shut picky compilers up */
401DEBUG(D_tls) debug_printf("Generating %d bit RSA key...\n", keylength);
c8dfb21d
JH
402
403#ifdef EXIM_HAVE_RSA_GENKEY_EX
404if ( !BN_set_word(bn, (unsigned long)RSA_F4)
f2cb6292 405 || !(rsa_key = RSA_new())
c8dfb21d
JH
406 || !RSA_generate_key_ex(rsa_key, keylength, bn, NULL)
407 )
408#else
23bb6982 409if (!(rsa_key = RSA_generate_key(keylength, RSA_F4, NULL, NULL)))
c8dfb21d
JH
410#endif
411
059ec3d9 412 {
0abc5a13 413 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
059ec3d9
PH
414 log_write(0, LOG_MAIN|LOG_PANIC, "TLS error (RSA_generate_key): %s",
415 ssl_errstring);
416 return NULL;
417 }
418return rsa_key;
419}
420
421
422
f5d78688 423/* Extreme debug
f2de3a33 424#ifndef DISABLE_OCSP
f5d78688
JH
425void
426x509_store_dump_cert_s_names(X509_STORE * store)
427{
428STACK_OF(X509_OBJECT) * roots= store->objs;
f5d78688
JH
429static uschar name[256];
430
d7978c0f 431for (int i= 0; i < sk_X509_OBJECT_num(roots); i++)
f5d78688
JH
432 {
433 X509_OBJECT * tmp_obj= sk_X509_OBJECT_value(roots, i);
434 if(tmp_obj->type == X509_LU_X509)
435 {
70e384dd
JH
436 X509_NAME * sn = X509_get_subject_name(tmp_obj->data.x509);
437 if (X509_NAME_oneline(sn, CS name, sizeof(name)))
438 {
439 name[sizeof(name)-1] = '\0';
440 debug_printf(" %s\n", name);
441 }
f5d78688
JH
442 }
443 }
444}
445#endif
446*/
447
059ec3d9 448
0cbf2b82 449#ifndef DISABLE_EVENT
f69979cf
JH
450static int
451verify_event(tls_support * tlsp, X509 * cert, int depth, const uschar * dn,
452 BOOL *calledp, const BOOL *optionalp, const uschar * what)
453{
454uschar * ev;
455uschar * yield;
456X509 * old_cert;
457
458ev = tlsp == &tls_out ? client_static_cbinfo->event_action : event_action;
459if (ev)
460 {
aaba7d03 461 DEBUG(D_tls) debug_printf("verify_event: %s %d\n", what, depth);
f69979cf
JH
462 old_cert = tlsp->peercert;
463 tlsp->peercert = X509_dup(cert);
464 /* NB we do not bother setting peerdn */
465 if ((yield = event_raise(ev, US"tls:cert", string_sprintf("%d", depth))))
466 {
467 log_write(0, LOG_MAIN, "[%s] %s verify denied by event-action: "
468 "depth=%d cert=%s: %s",
469 tlsp == &tls_out ? deliver_host_address : sender_host_address,
470 what, depth, dn, yield);
471 *calledp = TRUE;
472 if (!*optionalp)
473 {
474 if (old_cert) tlsp->peercert = old_cert; /* restore 1st failing cert */
475 return 1; /* reject (leaving peercert set) */
476 }
477 DEBUG(D_tls) debug_printf("Event-action verify failure overridden "
478 "(host in tls_try_verify_hosts)\n");
479 }
480 X509_free(tlsp->peercert);
481 tlsp->peercert = old_cert;
482 }
483return 0;
484}
485#endif
486
059ec3d9
PH
487/*************************************************
488* Callback for verification *
489*************************************************/
490
491/* The SSL library does certificate verification if set up to do so. This
492callback has the current yes/no state is in "state". If verification succeeded,
f69979cf
JH
493we set the certificate-verified flag. If verification failed, what happens
494depends on whether the client is required to present a verifiable certificate
495or not.
059ec3d9
PH
496
497If verification is optional, we change the state to yes, but still log the
498verification error. For some reason (it really would help to have proper
499documentation of OpenSSL), this callback function then gets called again, this
f69979cf
JH
500time with state = 1. We must take care not to set the private verified flag on
501the second time through.
059ec3d9
PH
502
503Note: this function is not called if the client fails to present a certificate
504when asked. We get here only if a certificate has been received. Handling of
505optional verification for this case is done when requesting SSL to verify, by
506setting SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the non-optional case.
507
a7538db1
JH
508May be called multiple times for different issues with a certificate, even
509for a given "depth" in the certificate chain.
510
059ec3d9 511Arguments:
f2f2c91b
JH
512 preverify_ok current yes/no state as 1/0
513 x509ctx certificate information.
514 tlsp per-direction (client vs. server) support data
515 calledp has-been-called flag
516 optionalp verification-is-optional flag
059ec3d9 517
f2f2c91b 518Returns: 0 if verification should fail, otherwise 1
059ec3d9
PH
519*/
520
521static int
70e384dd
JH
522verify_callback(int preverify_ok, X509_STORE_CTX * x509ctx,
523 tls_support * tlsp, BOOL * calledp, BOOL * optionalp)
059ec3d9 524{
421aff85 525X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
a7538db1 526int depth = X509_STORE_CTX_get_error_depth(x509ctx);
f69979cf 527uschar dn[256];
059ec3d9 528
70e384dd
JH
529if (!X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn)))
530 {
531 DEBUG(D_tls) debug_printf("X509_NAME_oneline() error\n");
532 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
533 tlsp == &tls_out ? deliver_host_address : sender_host_address);
534 return 0;
535 }
f69979cf 536dn[sizeof(dn)-1] = '\0';
059ec3d9 537
f2f2c91b 538if (preverify_ok == 0)
059ec3d9 539 {
f77197ae
JH
540 uschar * extra = verify_mode ? string_sprintf(" (during %c-verify for [%s])",
541 *verify_mode, sender_host_address)
542 : US"";
543 log_write(0, LOG_MAIN, "[%s] SSL verify error%s: depth=%d error=%s cert=%s",
544 tlsp == &tls_out ? deliver_host_address : sender_host_address,
545 extra, depth,
546 X509_verify_cert_error_string(X509_STORE_CTX_get_error(x509ctx)), dn);
a2ff477a 547 *calledp = TRUE;
9d1c15ef
JH
548 if (!*optionalp)
549 {
f69979cf
JH
550 if (!tlsp->peercert)
551 tlsp->peercert = X509_dup(cert); /* record failing cert */
552 return 0; /* reject */
9d1c15ef 553 }
059ec3d9
PH
554 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
555 "tls_try_verify_hosts)\n");
059ec3d9
PH
556 }
557
a7538db1 558else if (depth != 0)
059ec3d9 559 {
f69979cf 560 DEBUG(D_tls) debug_printf("SSL verify ok: depth=%d SN=%s\n", depth, dn);
f2de3a33 561#ifndef DISABLE_OCSP
f5d78688
JH
562 if (tlsp == &tls_out && client_static_cbinfo->u_ocsp.client.verify_store)
563 { /* client, wanting stapling */
564 /* Add the server cert's signing chain as the one
565 for the verification of the OCSP stapled information. */
94431adb 566
f5d78688 567 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
421aff85 568 cert))
f5d78688 569 ERR_clear_error();
c3033f13 570 sk_X509_push(client_static_cbinfo->verify_stack, cert);
f5d78688 571 }
a7538db1 572#endif
0cbf2b82 573#ifndef DISABLE_EVENT
f69979cf
JH
574 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
575 return 0; /* reject, with peercert set */
f5d78688 576#endif
059ec3d9
PH
577 }
578else
579 {
55414b25 580 const uschar * verify_cert_hostnames;
e51c7be2 581
e51c7be2
JH
582 if ( tlsp == &tls_out
583 && ((verify_cert_hostnames = client_static_cbinfo->verify_cert_hostnames)))
afdb5e9c 584 /* client, wanting hostname check */
e51c7be2 585 {
f69979cf 586
740f36d4 587#ifdef EXIM_HAVE_OPENSSL_CHECKHOST
f69979cf
JH
588# ifndef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
589# define X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 0
590# endif
591# ifndef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
592# define X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS 0
593# endif
e51c7be2 594 int sep = 0;
55414b25 595 const uschar * list = verify_cert_hostnames;
e51c7be2 596 uschar * name;
d8e7834a
JH
597 int rc;
598 while ((name = string_nextinlist(&list, &sep, NULL, 0)))
f40d5be3 599 if ((rc = X509_check_host(cert, CCS name, 0,
8d692470 600 X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
740f36d4
JH
601 | X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS,
602 NULL)))
d8e7834a
JH
603 {
604 if (rc < 0)
605 {
93a6fce2 606 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
f77197ae 607 tlsp == &tls_out ? deliver_host_address : sender_host_address);
d8e7834a
JH
608 name = NULL;
609 }
e51c7be2 610 break;
d8e7834a 611 }
e51c7be2 612 if (!name)
f69979cf 613#else
e51c7be2 614 if (!tls_is_name_for_cert(verify_cert_hostnames, cert))
f69979cf 615#endif
e51c7be2 616 {
f77197ae
JH
617 uschar * extra = verify_mode
618 ? string_sprintf(" (during %c-verify for [%s])",
619 *verify_mode, sender_host_address)
620 : US"";
e51c7be2 621 log_write(0, LOG_MAIN,
f77197ae
JH
622 "[%s] SSL verify error%s: certificate name mismatch: DN=\"%s\" H=\"%s\"",
623 tlsp == &tls_out ? deliver_host_address : sender_host_address,
624 extra, dn, verify_cert_hostnames);
a3ef7310
JH
625 *calledp = TRUE;
626 if (!*optionalp)
f69979cf
JH
627 {
628 if (!tlsp->peercert)
629 tlsp->peercert = X509_dup(cert); /* record failing cert */
630 return 0; /* reject */
631 }
a3ef7310
JH
632 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
633 "tls_try_verify_hosts)\n");
e51c7be2 634 }
f69979cf 635 }
e51c7be2 636
0cbf2b82 637#ifndef DISABLE_EVENT
f69979cf
JH
638 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
639 return 0; /* reject, with peercert set */
e51c7be2
JH
640#endif
641
93dcb1c2 642 DEBUG(D_tls) debug_printf("SSL%s verify ok: depth=0 SN=%s\n",
f69979cf 643 *calledp ? "" : " authenticated", dn);
93dcb1c2
JH
644 if (!*calledp) tlsp->certificate_verified = TRUE;
645 *calledp = TRUE;
059ec3d9
PH
646 }
647
a7538db1 648return 1; /* accept, at least for this level */
059ec3d9
PH
649}
650
a2ff477a 651static int
f2f2c91b 652verify_callback_client(int preverify_ok, X509_STORE_CTX *x509ctx)
a2ff477a 653{
f2f2c91b
JH
654return verify_callback(preverify_ok, x509ctx, &tls_out,
655 &client_verify_callback_called, &client_verify_optional);
a2ff477a
JH
656}
657
658static int
f2f2c91b 659verify_callback_server(int preverify_ok, X509_STORE_CTX *x509ctx)
a2ff477a 660{
f2f2c91b
JH
661return verify_callback(preverify_ok, x509ctx, &tls_in,
662 &server_verify_callback_called, &server_verify_optional);
a2ff477a
JH
663}
664
059ec3d9 665
c0635b6d 666#ifdef SUPPORT_DANE
53a7196b 667
e5cccda9
JH
668/* This gets called *by* the dane library verify callback, which interposes
669itself.
670*/
671static int
f2f2c91b 672verify_callback_client_dane(int preverify_ok, X509_STORE_CTX * x509ctx)
e5cccda9
JH
673{
674X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
f69979cf 675uschar dn[256];
83b27293 676int depth = X509_STORE_CTX_get_error_depth(x509ctx);
5c75db2e 677#ifndef DISABLE_EVENT
f69979cf 678BOOL dummy_called, optional = FALSE;
83b27293 679#endif
e5cccda9 680
70e384dd
JH
681if (!X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn)))
682 {
683 DEBUG(D_tls) debug_printf("X509_NAME_oneline() error\n");
684 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
685 deliver_host_address);
686 return 0;
687 }
f69979cf 688dn[sizeof(dn)-1] = '\0';
e5cccda9 689
f2f2c91b
JH
690DEBUG(D_tls) debug_printf("verify_callback_client_dane: %s depth %d %s\n",
691 preverify_ok ? "ok":"BAD", depth, dn);
e5cccda9 692
0cbf2b82 693#ifndef DISABLE_EVENT
f69979cf
JH
694 if (verify_event(&tls_out, cert, depth, dn,
695 &dummy_called, &optional, US"DANE"))
696 return 0; /* reject, with peercert set */
83b27293
JH
697#endif
698
f2f2c91b 699if (preverify_ok == 1)
6fbf3599
JH
700 {
701 tls_out.dane_verified = tls_out.certificate_verified = TRUE;
702#ifndef DISABLE_OCSP
703 if (client_static_cbinfo->u_ocsp.client.verify_store)
704 { /* client, wanting stapling */
705 /* Add the server cert's signing chain as the one
706 for the verification of the OCSP stapled information. */
707
708 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
709 cert))
710 ERR_clear_error();
711 sk_X509_push(client_static_cbinfo->verify_stack, cert);
712 }
713#endif
714 }
f2f2c91b
JH
715else
716 {
717 int err = X509_STORE_CTX_get_error(x509ctx);
718 DEBUG(D_tls)
719 debug_printf(" - err %d '%s'\n", err, X509_verify_cert_error_string(err));
3c51463e 720 if (err == X509_V_ERR_APPLICATION_VERIFICATION)
f2f2c91b
JH
721 preverify_ok = 1;
722 }
723return preverify_ok;
e5cccda9 724}
53a7196b 725
c0635b6d 726#endif /*SUPPORT_DANE*/
e5cccda9 727
059ec3d9
PH
728
729/*************************************************
730* Information callback *
731*************************************************/
732
733/* The SSL library functions call this from time to time to indicate what they
7be682ca
PP
734are doing. We copy the string to the debugging output when TLS debugging has
735been requested.
059ec3d9
PH
736
737Arguments:
738 s the SSL connection
739 where
740 ret
741
742Returns: nothing
743*/
744
745static void
746info_callback(SSL *s, int where, int ret)
747{
0abc5a13
JH
748DEBUG(D_tls)
749 {
750 const uschar * str;
751
752 if (where & SSL_ST_CONNECT)
48224640 753 str = US"SSL_connect";
0abc5a13 754 else if (where & SSL_ST_ACCEPT)
48224640 755 str = US"SSL_accept";
0abc5a13 756 else
48224640 757 str = US"SSL info (undefined)";
0abc5a13
JH
758
759 if (where & SSL_CB_LOOP)
760 debug_printf("%s: %s\n", str, SSL_state_string_long(s));
761 else if (where & SSL_CB_ALERT)
762 debug_printf("SSL3 alert %s:%s:%s\n",
48224640 763 str = where & SSL_CB_READ ? US"read" : US"write",
0abc5a13
JH
764 SSL_alert_type_string_long(ret), SSL_alert_desc_string_long(ret));
765 else if (where & SSL_CB_EXIT)
766 if (ret == 0)
767 debug_printf("%s: failed in %s\n", str, SSL_state_string_long(s));
768 else if (ret < 0)
769 debug_printf("%s: error in %s\n", str, SSL_state_string_long(s));
770 else if (where & SSL_CB_HANDSHAKE_START)
771 debug_printf("%s: hshake start: %s\n", str, SSL_state_string_long(s));
772 else if (where & SSL_CB_HANDSHAKE_DONE)
773 debug_printf("%s: hshake done: %s\n", str, SSL_state_string_long(s));
774 }
059ec3d9
PH
775}
776
777
778
779/*************************************************
780* Initialize for DH *
781*************************************************/
782
783/* If dhparam is set, expand it, and load up the parameters for DH encryption.
784
785Arguments:
038597d2 786 sctx The current SSL CTX (inbound or outbound)
a799883d 787 dhparam DH parameter file or fixed parameter identity string
7199e1ee 788 host connected host, if client; NULL if server
cf0c6164 789 errstr error string pointer
059ec3d9
PH
790
791Returns: TRUE if OK (nothing to set up, or setup worked)
792*/
793
794static BOOL
cf0c6164 795init_dh(SSL_CTX *sctx, uschar *dhparam, const host_item *host, uschar ** errstr)
059ec3d9 796{
059ec3d9
PH
797BIO *bio;
798DH *dh;
799uschar *dhexpanded;
a799883d 800const char *pem;
6600985a 801int dh_bitsize;
059ec3d9 802
cf0c6164 803if (!expand_check(dhparam, US"tls_dhparam", &dhexpanded, errstr))
059ec3d9
PH
804 return FALSE;
805
0df4ab80 806if (!dhexpanded || !*dhexpanded)
a799883d 807 bio = BIO_new_mem_buf(CS std_dh_prime_default(), -1);
a799883d 808else if (dhexpanded[0] == '/')
059ec3d9 809 {
0df4ab80 810 if (!(bio = BIO_new_file(CS dhexpanded, "r")))
059ec3d9 811 {
7199e1ee 812 tls_error(string_sprintf("could not read dhparams file %s", dhexpanded),
cf0c6164 813 host, US strerror(errno), errstr);
a799883d 814 return FALSE;
059ec3d9 815 }
a799883d
PP
816 }
817else
818 {
819 if (Ustrcmp(dhexpanded, "none") == 0)
059ec3d9 820 {
a799883d
PP
821 DEBUG(D_tls) debug_printf("Requested no DH parameters.\n");
822 return TRUE;
059ec3d9 823 }
a799883d 824
0df4ab80 825 if (!(pem = std_dh_prime_named(dhexpanded)))
a799883d
PP
826 {
827 tls_error(string_sprintf("Unknown standard DH prime \"%s\"", dhexpanded),
cf0c6164 828 host, US strerror(errno), errstr);
a799883d
PP
829 return FALSE;
830 }
831 bio = BIO_new_mem_buf(CS pem, -1);
832 }
833
0df4ab80 834if (!(dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL)))
a799883d 835 {
059ec3d9 836 BIO_free(bio);
a799883d 837 tls_error(string_sprintf("Could not read tls_dhparams \"%s\"", dhexpanded),
cf0c6164 838 host, NULL, errstr);
a799883d
PP
839 return FALSE;
840 }
841
6600985a
PP
842/* note: our default limit of 2236 is not a multiple of 8; the limit comes from
843 * an NSS limit, and the GnuTLS APIs handle bit-sizes fine, so we went with
844 * 2236. But older OpenSSL can only report in bytes (octets), not bits.
845 * If someone wants to dance at the edge, then they can raise the limit or use
846 * current libraries. */
847#ifdef EXIM_HAVE_OPENSSL_DH_BITS
848/* Added in commit 26c79d5641d; `git describe --contains` says OpenSSL_1_1_0-pre1~1022
849 * This predates OpenSSL_1_1_0 (before a, b, ...) so is in all 1.1.0 */
850dh_bitsize = DH_bits(dh);
851#else
852dh_bitsize = 8 * DH_size(dh);
853#endif
854
a799883d
PP
855/* Even if it is larger, we silently return success rather than cause things
856 * to fail out, so that a too-large DH will not knock out all TLS; it's a
857 * debatable choice. */
6600985a 858if (dh_bitsize > tls_dh_max_bits)
a799883d
PP
859 {
860 DEBUG(D_tls)
170f4904 861 debug_printf("dhparams file %d bits, is > tls_dh_max_bits limit of %d\n",
6600985a 862 dh_bitsize, tls_dh_max_bits);
a799883d
PP
863 }
864else
865 {
866 SSL_CTX_set_tmp_dh(sctx, dh);
867 DEBUG(D_tls)
868 debug_printf("Diffie-Hellman initialized from %s with %d-bit prime\n",
6600985a 869 dhexpanded ? dhexpanded : US"default", dh_bitsize);
059ec3d9
PH
870 }
871
a799883d
PP
872DH_free(dh);
873BIO_free(bio);
874
875return TRUE;
059ec3d9
PH
876}
877
878
879
880
038597d2
PP
881/*************************************************
882* Initialize for ECDH *
883*************************************************/
884
885/* Load parameters for ECDH encryption.
886
887For now, we stick to NIST P-256 because: it's simple and easy to configure;
888it avoids any patent issues that might bite redistributors; despite events in
889the news and concerns over curve choices, we're not cryptographers, we're not
890pretending to be, and this is "good enough" to be better than no support,
891protecting against most adversaries. Given another year or two, there might
892be sufficient clarity about a "right" way forward to let us make an informed
893decision, instead of a knee-jerk reaction.
894
895Longer-term, we should look at supporting both various named curves and
896external files generated with "openssl ecparam", much as we do for init_dh().
897We should also support "none" as a value, to explicitly avoid initialisation.
898
899Patches welcome.
900
901Arguments:
902 sctx The current SSL CTX (inbound or outbound)
903 host connected host, if client; NULL if server
cf0c6164 904 errstr error string pointer
038597d2
PP
905
906Returns: TRUE if OK (nothing to set up, or setup worked)
907*/
908
909static BOOL
cf0c6164 910init_ecdh(SSL_CTX * sctx, host_item * host, uschar ** errstr)
038597d2 911{
63f0dbe0
JH
912#ifdef OPENSSL_NO_ECDH
913return TRUE;
914#else
915
10ca4f1c
JH
916EC_KEY * ecdh;
917uschar * exp_curve;
918int nid;
919BOOL rv;
920
038597d2
PP
921if (host) /* No ECDH setup for clients, only for servers */
922 return TRUE;
923
10ca4f1c 924# ifndef EXIM_HAVE_ECDH
038597d2
PP
925DEBUG(D_tls)
926 debug_printf("No OpenSSL API to define ECDH parameters, skipping\n");
927return TRUE;
038597d2 928# else
10ca4f1c 929
cf0c6164 930if (!expand_check(tls_eccurve, US"tls_eccurve", &exp_curve, errstr))
10ca4f1c
JH
931 return FALSE;
932if (!exp_curve || !*exp_curve)
933 return TRUE;
934
8e53a4fc 935/* "auto" needs to be handled carefully.
4c04137d 936 * OpenSSL < 1.0.2: we do not select anything, but fallback to prime256v1
8e53a4fc 937 * OpenSSL < 1.1.0: we have to call SSL_CTX_set_ecdh_auto
4c04137d 938 * (openssl/ssl.h defines SSL_CTRL_SET_ECDH_AUTO)
8e53a4fc
HSHR
939 * OpenSSL >= 1.1.0: we do not set anything, the libray does autoselection
940 * https://github.com/openssl/openssl/commit/fe6ef2472db933f01b59cad82aa925736935984b
941 */
10ca4f1c 942if (Ustrcmp(exp_curve, "auto") == 0)
038597d2 943 {
8e53a4fc 944#if OPENSSL_VERSION_NUMBER < 0x10002000L
10ca4f1c 945 DEBUG(D_tls) debug_printf(
8e53a4fc 946 "ECDH OpenSSL < 1.0.2: temp key parameter settings: overriding \"auto\" with \"prime256v1\"\n");
78a3bbd5 947 exp_curve = US"prime256v1";
8e53a4fc
HSHR
948#else
949# if defined SSL_CTRL_SET_ECDH_AUTO
950 DEBUG(D_tls) debug_printf(
951 "ECDH OpenSSL 1.0.2+ temp key parameter settings: autoselection\n");
10ca4f1c
JH
952 SSL_CTX_set_ecdh_auto(sctx, 1);
953 return TRUE;
8e53a4fc
HSHR
954# else
955 DEBUG(D_tls) debug_printf(
956 "ECDH OpenSSL 1.1.0+ temp key parameter settings: default selection\n");
957 return TRUE;
958# endif
959#endif
10ca4f1c 960 }
038597d2 961
10ca4f1c
JH
962DEBUG(D_tls) debug_printf("ECDH: curve '%s'\n", exp_curve);
963if ( (nid = OBJ_sn2nid (CCS exp_curve)) == NID_undef
964# ifdef EXIM_HAVE_OPENSSL_EC_NIST2NID
965 && (nid = EC_curve_nist2nid(CCS exp_curve)) == NID_undef
966# endif
967 )
968 {
cf0c6164
JH
969 tls_error(string_sprintf("Unknown curve name tls_eccurve '%s'", exp_curve),
970 host, NULL, errstr);
10ca4f1c
JH
971 return FALSE;
972 }
038597d2 973
10ca4f1c
JH
974if (!(ecdh = EC_KEY_new_by_curve_name(nid)))
975 {
cf0c6164 976 tls_error(US"Unable to create ec curve", host, NULL, errstr);
10ca4f1c 977 return FALSE;
038597d2 978 }
10ca4f1c
JH
979
980/* The "tmp" in the name here refers to setting a temporary key
981not to the stability of the interface. */
982
983if ((rv = SSL_CTX_set_tmp_ecdh(sctx, ecdh) == 0))
cf0c6164 984 tls_error(string_sprintf("Error enabling '%s' curve", exp_curve), host, NULL, errstr);
10ca4f1c
JH
985else
986 DEBUG(D_tls) debug_printf("ECDH: enabled '%s' curve\n", exp_curve);
987
988EC_KEY_free(ecdh);
989return !rv;
990
991# endif /*EXIM_HAVE_ECDH*/
992#endif /*OPENSSL_NO_ECDH*/
038597d2
PP
993}
994
995
996
997
f2de3a33 998#ifndef DISABLE_OCSP
3f7eeb86
PP
999/*************************************************
1000* Load OCSP information into state *
1001*************************************************/
f5d78688 1002/* Called to load the server OCSP response from the given file into memory, once
3f7eeb86
PP
1003caller has determined this is needed. Checks validity. Debugs a message
1004if invalid.
1005
1006ASSUMES: single response, for single cert.
1007
1008Arguments:
1009 sctx the SSL_CTX* to update
1010 cbinfo various parts of session state
1011 expanded the filename putatively holding an OCSP response
1012
1013*/
1014
1015static void
f5d78688 1016ocsp_load_response(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo, const uschar *expanded)
3f7eeb86 1017{
ee5b1e28
JH
1018BIO * bio;
1019OCSP_RESPONSE * resp;
1020OCSP_BASICRESP * basic_response;
1021OCSP_SINGLERESP * single_response;
1022ASN1_GENERALIZEDTIME * rev, * thisupd, * nextupd;
ee5b1e28 1023STACK_OF(X509) * sk;
3f7eeb86
PP
1024unsigned long verify_flags;
1025int status, reason, i;
1026
f5d78688
JH
1027cbinfo->u_ocsp.server.file_expanded = string_copy(expanded);
1028if (cbinfo->u_ocsp.server.response)
3f7eeb86 1029 {
f5d78688
JH
1030 OCSP_RESPONSE_free(cbinfo->u_ocsp.server.response);
1031 cbinfo->u_ocsp.server.response = NULL;
3f7eeb86
PP
1032 }
1033
ee5b1e28 1034if (!(bio = BIO_new_file(CS cbinfo->u_ocsp.server.file_expanded, "rb")))
3f7eeb86
PP
1035 {
1036 DEBUG(D_tls) debug_printf("Failed to open OCSP response file \"%s\"\n",
f5d78688 1037 cbinfo->u_ocsp.server.file_expanded);
3f7eeb86
PP
1038 return;
1039 }
1040
1041resp = d2i_OCSP_RESPONSE_bio(bio, NULL);
1042BIO_free(bio);
1043if (!resp)
1044 {
1045 DEBUG(D_tls) debug_printf("Error reading OCSP response.\n");
1046 return;
1047 }
1048
ee5b1e28 1049if ((status = OCSP_response_status(resp)) != OCSP_RESPONSE_STATUS_SUCCESSFUL)
3f7eeb86
PP
1050 {
1051 DEBUG(D_tls) debug_printf("OCSP response not valid: %s (%d)\n",
1052 OCSP_response_status_str(status), status);
f5d78688 1053 goto bad;
3f7eeb86
PP
1054 }
1055
ee5b1e28 1056if (!(basic_response = OCSP_response_get1_basic(resp)))
3f7eeb86
PP
1057 {
1058 DEBUG(D_tls)
1059 debug_printf("OCSP response parse error: unable to extract basic response.\n");
f5d78688 1060 goto bad;
3f7eeb86
PP
1061 }
1062
c3033f13 1063sk = cbinfo->verify_stack;
3f7eeb86
PP
1064verify_flags = OCSP_NOVERIFY; /* check sigs, but not purpose */
1065
1066/* May need to expose ability to adjust those flags?
1067OCSP_NOSIGS OCSP_NOVERIFY OCSP_NOCHAIN OCSP_NOCHECKS OCSP_NOEXPLICIT
1068OCSP_TRUSTOTHER OCSP_NOINTERN */
1069
4c04137d 1070/* This does a full verify on the OCSP proof before we load it for serving
ee5b1e28
JH
1071up; possibly overkill - just date-checks might be nice enough.
1072
1073OCSP_basic_verify takes a "store" arg, but does not
1074use it for the chain verification, which is all we do
1075when OCSP_NOVERIFY is set. The content from the wire
1076"basic_response" and a cert-stack "sk" are all that is used.
1077
c3033f13
JH
1078We have a stack, loaded in setup_certs() if tls_verify_certificates
1079was a file (not a directory, or "system"). It is unfortunate we
1080cannot used the connection context store, as that would neatly
1081handle the "system" case too, but there seems to be no library
1082function for getting a stack from a store.
e3555426 1083[ In OpenSSL 1.1 - ? X509_STORE_CTX_get0_chain(ctx) ? ]
c3033f13
JH
1084We do not free the stack since it could be needed a second time for
1085SNI handling.
1086
4c04137d 1087Separately we might try to replace using OCSP_basic_verify() - which seems to not
5ec37a55 1088be a public interface into the OpenSSL library (there's no manual entry) -
ee5b1e28 1089But what with? We also use OCSP_basic_verify in the client stapling callback.
4c04137d 1090And there we NEED it; we must verify that status... unless the
ee5b1e28
JH
1091library does it for us anyway? */
1092
1093if ((i = OCSP_basic_verify(basic_response, sk, NULL, verify_flags)) < 0)
3f7eeb86 1094 {
ee5b1e28
JH
1095 DEBUG(D_tls)
1096 {
0abc5a13 1097 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
3f7eeb86 1098 debug_printf("OCSP response verify failure: %s\n", US ssl_errstring);
f5d78688
JH
1099 }
1100 goto bad;
3f7eeb86
PP
1101 }
1102
1103/* Here's the simplifying assumption: there's only one response, for the
1104one certificate we use, and nothing for anything else in a chain. If this
1105proves false, we need to extract a cert id from our issued cert
1106(tls_certificate) and use that for OCSP_resp_find_status() (which finds the
1107right cert in the stack and then calls OCSP_single_get0_status()).
1108
1109I'm hoping to avoid reworking a bunch more of how we handle state here. */
ee5b1e28
JH
1110
1111if (!(single_response = OCSP_resp_get0(basic_response, 0)))
3f7eeb86
PP
1112 {
1113 DEBUG(D_tls)
1114 debug_printf("Unable to get first response from OCSP basic response.\n");
f5d78688 1115 goto bad;
3f7eeb86
PP
1116 }
1117
1118status = OCSP_single_get0_status(single_response, &reason, &rev, &thisupd, &nextupd);
f5d78688 1119if (status != V_OCSP_CERTSTATUS_GOOD)
3f7eeb86 1120 {
f5d78688
JH
1121 DEBUG(D_tls) debug_printf("OCSP response bad cert status: %s (%d) %s (%d)\n",
1122 OCSP_cert_status_str(status), status,
1123 OCSP_crl_reason_str(reason), reason);
1124 goto bad;
3f7eeb86
PP
1125 }
1126
1127if (!OCSP_check_validity(thisupd, nextupd, EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1128 {
1129 DEBUG(D_tls) debug_printf("OCSP status invalid times.\n");
f5d78688 1130 goto bad;
3f7eeb86
PP
1131 }
1132
f5d78688 1133supply_response:
47195144 1134 cbinfo->u_ocsp.server.response = resp; /*XXX stack?*/
f5d78688
JH
1135return;
1136
1137bad:
8768d548 1138 if (f.running_in_test_harness)
018058b2
JH
1139 {
1140 extern char ** environ;
d7978c0f 1141 if (environ) for (uschar ** p = USS environ; *p; p++)
018058b2
JH
1142 if (Ustrncmp(*p, "EXIM_TESTHARNESS_DISABLE_OCSPVALIDITYCHECK", 42) == 0)
1143 {
1144 DEBUG(D_tls) debug_printf("Supplying known bad OCSP response\n");
1145 goto supply_response;
1146 }
1147 }
f5d78688 1148return;
3f7eeb86 1149}
f2de3a33 1150#endif /*!DISABLE_OCSP*/
3f7eeb86
PP
1151
1152
1153
1154
23bb6982
JH
1155/* Create and install a selfsigned certificate, for use in server mode */
1156
1157static int
cf0c6164 1158tls_install_selfsign(SSL_CTX * sctx, uschar ** errstr)
23bb6982
JH
1159{
1160X509 * x509 = NULL;
1161EVP_PKEY * pkey;
1162RSA * rsa;
1163X509_NAME * name;
1164uschar * where;
1165
1166where = US"allocating pkey";
1167if (!(pkey = EVP_PKEY_new()))
1168 goto err;
1169
1170where = US"allocating cert";
1171if (!(x509 = X509_new()))
1172 goto err;
1173
1174where = US"generating pkey";
6aac3239 1175if (!(rsa = rsa_callback(NULL, 0, 2048)))
23bb6982
JH
1176 goto err;
1177
4c04137d 1178where = US"assigning pkey";
23bb6982
JH
1179if (!EVP_PKEY_assign_RSA(pkey, rsa))
1180 goto err;
1181
1182X509_set_version(x509, 2); /* N+1 - version 3 */
1613fd68 1183ASN1_INTEGER_set(X509_get_serialNumber(x509), 1);
23bb6982
JH
1184X509_gmtime_adj(X509_get_notBefore(x509), 0);
1185X509_gmtime_adj(X509_get_notAfter(x509), (long)60 * 60); /* 1 hour */
1186X509_set_pubkey(x509, pkey);
1187
1188name = X509_get_subject_name(x509);
1189X509_NAME_add_entry_by_txt(name, "C",
4dc2379a 1190 MBSTRING_ASC, CUS "UK", -1, -1, 0);
23bb6982 1191X509_NAME_add_entry_by_txt(name, "O",
4dc2379a 1192 MBSTRING_ASC, CUS "Exim Developers", -1, -1, 0);
23bb6982 1193X509_NAME_add_entry_by_txt(name, "CN",
4dc2379a 1194 MBSTRING_ASC, CUS smtp_active_hostname, -1, -1, 0);
23bb6982
JH
1195X509_set_issuer_name(x509, name);
1196
1197where = US"signing cert";
1198if (!X509_sign(x509, pkey, EVP_md5()))
1199 goto err;
1200
1201where = US"installing selfsign cert";
1202if (!SSL_CTX_use_certificate(sctx, x509))
1203 goto err;
1204
1205where = US"installing selfsign key";
1206if (!SSL_CTX_use_PrivateKey(sctx, pkey))
1207 goto err;
1208
1209return OK;
1210
1211err:
cf0c6164 1212 (void) tls_error(where, NULL, NULL, errstr);
23bb6982
JH
1213 if (x509) X509_free(x509);
1214 if (pkey) EVP_PKEY_free(pkey);
1215 return DEFER;
1216}
1217
1218
1219
1220
ba86e143
JH
1221static int
1222tls_add_certfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1223 uschar ** errstr)
1224{
1225DEBUG(D_tls) debug_printf("tls_certificate file %s\n", file);
1226if (!SSL_CTX_use_certificate_chain_file(sctx, CS file))
1227 return tls_error(string_sprintf(
1228 "SSL_CTX_use_certificate_chain_file file=%s", file),
1229 cbinfo->host, NULL, errstr);
1230return 0;
1231}
1232
1233static int
1234tls_add_pkeyfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1235 uschar ** errstr)
1236{
1237DEBUG(D_tls) debug_printf("tls_privatekey file %s\n", file);
1238if (!SSL_CTX_use_PrivateKey_file(sctx, CS file, SSL_FILETYPE_PEM))
1239 return tls_error(string_sprintf(
1240 "SSL_CTX_use_PrivateKey_file file=%s", file), cbinfo->host, NULL, errstr);
1241return 0;
1242}
1243
1244
7be682ca
PP
1245/*************************************************
1246* Expand key and cert file specs *
1247*************************************************/
1248
f5d78688 1249/* Called once during tls_init and possibly again during TLS setup, for a
7be682ca
PP
1250new context, if Server Name Indication was used and tls_sni was seen in
1251the certificate string.
1252
1253Arguments:
1254 sctx the SSL_CTX* to update
1255 cbinfo various parts of session state
cf0c6164 1256 errstr error string pointer
7be682ca
PP
1257
1258Returns: OK/DEFER/FAIL
1259*/
1260
1261static int
cf0c6164
JH
1262tls_expand_session_files(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo,
1263 uschar ** errstr)
7be682ca
PP
1264{
1265uschar *expanded;
1266
23bb6982 1267if (!cbinfo->certificate)
7be682ca 1268 {
ba86e143 1269 if (!cbinfo->is_server) /* client */
23bb6982 1270 return OK;
afdb5e9c 1271 /* server */
cf0c6164 1272 if (tls_install_selfsign(sctx, errstr) != OK)
23bb6982 1273 return DEFER;
7be682ca 1274 }
23bb6982
JH
1275else
1276 {
ba86e143
JH
1277 int err;
1278
23bb6982
JH
1279 if (Ustrstr(cbinfo->certificate, US"tls_sni") ||
1280 Ustrstr(cbinfo->certificate, US"tls_in_sni") ||
1281 Ustrstr(cbinfo->certificate, US"tls_out_sni")
1282 )
1283 reexpand_tls_files_for_sni = TRUE;
7be682ca 1284
cf0c6164 1285 if (!expand_check(cbinfo->certificate, US"tls_certificate", &expanded, errstr))
23bb6982
JH
1286 return DEFER;
1287
ba86e143
JH
1288 if (expanded)
1289 if (cbinfo->is_server)
1290 {
1291 const uschar * file_list = expanded;
1292 int sep = 0;
1293 uschar * file;
1294
1295 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1296 if ((err = tls_add_certfile(sctx, cbinfo, file, errstr)))
1297 return err;
1298 }
1299 else /* would there ever be a need for multiple client certs? */
1300 if ((err = tls_add_certfile(sctx, cbinfo, expanded, errstr)))
1301 return err;
7be682ca 1302
5a2a0989
JH
1303 if ( cbinfo->privatekey
1304 && !expand_check(cbinfo->privatekey, US"tls_privatekey", &expanded, errstr))
23bb6982 1305 return DEFER;
7be682ca 1306
23bb6982
JH
1307 /* If expansion was forced to fail, key_expanded will be NULL. If the result
1308 of the expansion is an empty string, ignore it also, and assume the private
1309 key is in the same file as the certificate. */
1310
1311 if (expanded && *expanded)
ba86e143
JH
1312 if (cbinfo->is_server)
1313 {
1314 const uschar * file_list = expanded;
1315 int sep = 0;
1316 uschar * file;
1317
1318 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1319 if ((err = tls_add_pkeyfile(sctx, cbinfo, file, errstr)))
1320 return err;
1321 }
1322 else /* would there ever be a need for multiple client certs? */
1323 if ((err = tls_add_pkeyfile(sctx, cbinfo, expanded, errstr)))
1324 return err;
7be682ca
PP
1325 }
1326
f2de3a33 1327#ifndef DISABLE_OCSP
f40d5be3 1328if (cbinfo->is_server && cbinfo->u_ocsp.server.file)
3f7eeb86 1329 {
47195144 1330 /*XXX stack*/
cf0c6164 1331 if (!expand_check(cbinfo->u_ocsp.server.file, US"tls_ocsp_file", &expanded, errstr))
3f7eeb86
PP
1332 return DEFER;
1333
f40d5be3 1334 if (expanded && *expanded)
3f7eeb86
PP
1335 {
1336 DEBUG(D_tls) debug_printf("tls_ocsp_file %s\n", expanded);
f40d5be3
JH
1337 if ( cbinfo->u_ocsp.server.file_expanded
1338 && (Ustrcmp(expanded, cbinfo->u_ocsp.server.file_expanded) == 0))
3f7eeb86 1339 {
f40d5be3
JH
1340 DEBUG(D_tls) debug_printf(" - value unchanged, using existing values\n");
1341 }
1342 else
f40d5be3 1343 ocsp_load_response(sctx, cbinfo, expanded);
3f7eeb86
PP
1344 }
1345 }
1346#endif
1347
7be682ca
PP
1348return OK;
1349}
1350
1351
1352
1353
1354/*************************************************
1355* Callback to handle SNI *
1356*************************************************/
1357
1358/* Called when acting as server during the TLS session setup if a Server Name
1359Indication extension was sent by the client.
1360
1361API documentation is OpenSSL s_server.c implementation.
1362
1363Arguments:
1364 s SSL* of the current session
1365 ad unknown (part of OpenSSL API) (unused)
1366 arg Callback of "our" registered data
1367
1368Returns: SSL_TLSEXT_ERR_{OK,ALERT_WARNING,ALERT_FATAL,NOACK}
1369*/
1370
3bcbbbe2 1371#ifdef EXIM_HAVE_OPENSSL_TLSEXT
7be682ca
PP
1372static int
1373tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg)
1374{
1375const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
3f7eeb86 1376tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
7be682ca 1377int rc;
3f0945ff 1378int old_pool = store_pool;
cf0c6164 1379uschar * dummy_errstr;
7be682ca
PP
1380
1381if (!servername)
1382 return SSL_TLSEXT_ERR_OK;
1383
3f0945ff 1384DEBUG(D_tls) debug_printf("Received TLS SNI \"%s\"%s\n", servername,
7be682ca
PP
1385 reexpand_tls_files_for_sni ? "" : " (unused for certificate selection)");
1386
1387/* Make the extension value available for expansion */
3f0945ff 1388store_pool = POOL_PERM;
817d9f57 1389tls_in.sni = string_copy(US servername);
3f0945ff 1390store_pool = old_pool;
7be682ca
PP
1391
1392if (!reexpand_tls_files_for_sni)
1393 return SSL_TLSEXT_ERR_OK;
1394
1395/* Can't find an SSL_CTX_clone() or equivalent, so we do it manually;
1396not confident that memcpy wouldn't break some internal reference counting.
1397Especially since there's a references struct member, which would be off. */
1398
7a8b9519
JH
1399#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1400if (!(server_sni = SSL_CTX_new(TLS_server_method())))
1401#else
0df4ab80 1402if (!(server_sni = SSL_CTX_new(SSLv23_server_method())))
7a8b9519 1403#endif
7be682ca 1404 {
0abc5a13 1405 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
7be682ca 1406 DEBUG(D_tls) debug_printf("SSL_CTX_new() failed: %s\n", ssl_errstring);
5a2a0989 1407 goto bad;
7be682ca
PP
1408 }
1409
1410/* Not sure how many of these are actually needed, since SSL object
1411already exists. Might even need this selfsame callback, for reneg? */
1412
817d9f57
JH
1413SSL_CTX_set_info_callback(server_sni, SSL_CTX_get_info_callback(server_ctx));
1414SSL_CTX_set_mode(server_sni, SSL_CTX_get_mode(server_ctx));
1415SSL_CTX_set_options(server_sni, SSL_CTX_get_options(server_ctx));
1416SSL_CTX_set_timeout(server_sni, SSL_CTX_get_timeout(server_ctx));
1417SSL_CTX_set_tlsext_servername_callback(server_sni, tls_servername_cb);
1418SSL_CTX_set_tlsext_servername_arg(server_sni, cbinfo);
038597d2 1419
cf0c6164
JH
1420if ( !init_dh(server_sni, cbinfo->dhparam, NULL, &dummy_errstr)
1421 || !init_ecdh(server_sni, NULL, &dummy_errstr)
038597d2 1422 )
5a2a0989 1423 goto bad;
038597d2 1424
ca954d7f
JH
1425if ( cbinfo->server_cipher_list
1426 && !SSL_CTX_set_cipher_list(server_sni, CS cbinfo->server_cipher_list))
5a2a0989 1427 goto bad;
ca954d7f 1428
f2de3a33 1429#ifndef DISABLE_OCSP
f5d78688 1430if (cbinfo->u_ocsp.server.file)
3f7eeb86 1431 {
f5d78688 1432 SSL_CTX_set_tlsext_status_cb(server_sni, tls_server_stapling_cb);
14c7b357 1433 SSL_CTX_set_tlsext_status_arg(server_sni, cbinfo);
3f7eeb86
PP
1434 }
1435#endif
7be682ca 1436
c3033f13 1437if ((rc = setup_certs(server_sni, tls_verify_certificates, tls_crl, NULL, FALSE,
cf0c6164 1438 verify_callback_server, &dummy_errstr)) != OK)
5a2a0989 1439 goto bad;
7be682ca 1440
3f7eeb86
PP
1441/* do this after setup_certs, because this can require the certs for verifying
1442OCSP information. */
cf0c6164 1443if ((rc = tls_expand_session_files(server_sni, cbinfo, &dummy_errstr)) != OK)
5a2a0989 1444 goto bad;
a799883d 1445
7be682ca 1446DEBUG(D_tls) debug_printf("Switching SSL context.\n");
817d9f57 1447SSL_set_SSL_CTX(s, server_sni);
7be682ca 1448return SSL_TLSEXT_ERR_OK;
5a2a0989
JH
1449
1450bad: return SSL_TLSEXT_ERR_ALERT_FATAL;
7be682ca 1451}
3bcbbbe2 1452#endif /* EXIM_HAVE_OPENSSL_TLSEXT */
7be682ca
PP
1453
1454
1455
1456
f2de3a33 1457#ifndef DISABLE_OCSP
f5d78688 1458
3f7eeb86
PP
1459/*************************************************
1460* Callback to handle OCSP Stapling *
1461*************************************************/
1462
1463/* Called when acting as server during the TLS session setup if the client
1464requests OCSP information with a Certificate Status Request.
1465
1466Documentation via openssl s_server.c and the Apache patch from the OpenSSL
1467project.
1468
1469*/
1470
1471static int
f5d78688 1472tls_server_stapling_cb(SSL *s, void *arg)
3f7eeb86
PP
1473{
1474const tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
47195144 1475uschar *response_der; /*XXX blob */
3f7eeb86
PP
1476int response_der_len;
1477
47195144
JH
1478/*XXX stack: use SSL_get_certificate() to see which cert; from that work
1479out which ocsp blob to send. Unfortunately, SSL_get_certificate is known
1480buggy in current OpenSSL; it returns the last cert loaded always rather than
1481the one actually presented. So we can't support a stack of OCSP proofs at
1482this time. */
1483
af4a1bca 1484DEBUG(D_tls)
b3ef41c9 1485 debug_printf("Received TLS status request (OCSP stapling); %s response\n",
f5d78688
JH
1486 cbinfo->u_ocsp.server.response ? "have" : "lack");
1487
44662487 1488tls_in.ocsp = OCSP_NOT_RESP;
f5d78688 1489if (!cbinfo->u_ocsp.server.response)
3f7eeb86
PP
1490 return SSL_TLSEXT_ERR_NOACK;
1491
1492response_der = NULL;
47195144 1493response_der_len = i2d_OCSP_RESPONSE(cbinfo->u_ocsp.server.response, /*XXX stack*/
44662487 1494 &response_der);
3f7eeb86
PP
1495if (response_der_len <= 0)
1496 return SSL_TLSEXT_ERR_NOACK;
1497
5e55c7a9 1498SSL_set_tlsext_status_ocsp_resp(server_ssl, response_der, response_der_len);
44662487 1499tls_in.ocsp = OCSP_VFIED;
3f7eeb86
PP
1500return SSL_TLSEXT_ERR_OK;
1501}
1502
3f7eeb86 1503
f5d78688
JH
1504static void
1505time_print(BIO * bp, const char * str, ASN1_GENERALIZEDTIME * time)
1506{
1507BIO_printf(bp, "\t%s: ", str);
1508ASN1_GENERALIZEDTIME_print(bp, time);
1509BIO_puts(bp, "\n");
1510}
1511
1512static int
1513tls_client_stapling_cb(SSL *s, void *arg)
1514{
1515tls_ext_ctx_cb * cbinfo = arg;
1516const unsigned char * p;
1517int len;
1518OCSP_RESPONSE * rsp;
1519OCSP_BASICRESP * bs;
1520int i;
1521
1522DEBUG(D_tls) debug_printf("Received TLS status response (OCSP stapling):");
1523len = SSL_get_tlsext_status_ocsp_resp(s, &p);
1524if(!p)
1525 {
44662487 1526 /* Expect this when we requested ocsp but got none */
6c6d6e48 1527 if (cbinfo->u_ocsp.client.verify_required && LOGGING(tls_cipher))
44662487 1528 log_write(0, LOG_MAIN, "Received TLS status callback, null content");
f5d78688
JH
1529 else
1530 DEBUG(D_tls) debug_printf(" null\n");
44662487 1531 return cbinfo->u_ocsp.client.verify_required ? 0 : 1;
f5d78688 1532 }
018058b2 1533
f5d78688
JH
1534if(!(rsp = d2i_OCSP_RESPONSE(NULL, &p, len)))
1535 {
018058b2 1536 tls_out.ocsp = OCSP_FAILED;
6c6d6e48 1537 if (LOGGING(tls_cipher))
1eca31ca 1538 log_write(0, LOG_MAIN, "Received TLS cert status response, parse error");
f5d78688
JH
1539 else
1540 DEBUG(D_tls) debug_printf(" parse error\n");
1541 return 0;
1542 }
1543
1544if(!(bs = OCSP_response_get1_basic(rsp)))
1545 {
018058b2 1546 tls_out.ocsp = OCSP_FAILED;
6c6d6e48 1547 if (LOGGING(tls_cipher))
1eca31ca 1548 log_write(0, LOG_MAIN, "Received TLS cert status response, error parsing response");
f5d78688
JH
1549 else
1550 DEBUG(D_tls) debug_printf(" error parsing response\n");
1551 OCSP_RESPONSE_free(rsp);
1552 return 0;
1553 }
1554
1555/* We'd check the nonce here if we'd put one in the request. */
1556/* However that would defeat cacheability on the server so we don't. */
1557
f5d78688
JH
1558/* This section of code reworked from OpenSSL apps source;
1559 The OpenSSL Project retains copyright:
1560 Copyright (c) 1999 The OpenSSL Project. All rights reserved.
1561*/
1562 {
1563 BIO * bp = NULL;
f5d78688
JH
1564 int status, reason;
1565 ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
1566
57887ecc 1567 DEBUG(D_tls) bp = BIO_new_fp(debug_file, BIO_NOCLOSE);
f5d78688
JH
1568
1569 /*OCSP_RESPONSE_print(bp, rsp, 0); extreme debug: stapling content */
1570
1571 /* Use the chain that verified the server cert to verify the stapled info */
1572 /* DEBUG(D_tls) x509_store_dump_cert_s_names(cbinfo->u_ocsp.client.verify_store); */
1573
c3033f13 1574 if ((i = OCSP_basic_verify(bs, cbinfo->verify_stack,
44662487 1575 cbinfo->u_ocsp.client.verify_store, 0)) <= 0)
f5d78688 1576 {
018058b2 1577 tls_out.ocsp = OCSP_FAILED;
57887ecc
JH
1578 if (LOGGING(tls_cipher)) log_write(0, LOG_MAIN,
1579 "Received TLS cert status response, itself unverifiable: %s",
1580 ERR_reason_error_string(ERR_peek_error()));
f5d78688
JH
1581 BIO_printf(bp, "OCSP response verify failure\n");
1582 ERR_print_errors(bp);
57887ecc 1583 OCSP_RESPONSE_print(bp, rsp, 0);
c8dfb21d 1584 goto failed;
f5d78688
JH
1585 }
1586
1587 BIO_printf(bp, "OCSP response well-formed and signed OK\n");
1588
c8dfb21d
JH
1589 /*XXX So we have a good stapled OCSP status. How do we know
1590 it is for the cert of interest? OpenSSL 1.1.0 has a routine
1591 OCSP_resp_find_status() which matches on a cert id, which presumably
1592 we should use. Making an id needs OCSP_cert_id_new(), which takes
1593 issuerName, issuerKey, serialNumber. Are they all in the cert?
1594
1595 For now, carry on blindly accepting the resp. */
1596
f5d78688 1597 {
f5d78688
JH
1598 OCSP_SINGLERESP * single;
1599
c8dfb21d
JH
1600#ifdef EXIM_HAVE_OCSP_RESP_COUNT
1601 if (OCSP_resp_count(bs) != 1)
1602#else
1603 STACK_OF(OCSP_SINGLERESP) * sresp = bs->tbsResponseData->responses;
f5d78688 1604 if (sk_OCSP_SINGLERESP_num(sresp) != 1)
c8dfb21d 1605#endif
f5d78688 1606 {
018058b2 1607 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1608 log_write(0, LOG_MAIN, "OCSP stapling "
1609 "with multiple responses not handled");
c8dfb21d 1610 goto failed;
f5d78688
JH
1611 }
1612 single = OCSP_resp_get0(bs, 0);
44662487
JH
1613 status = OCSP_single_get0_status(single, &reason, &rev,
1614 &thisupd, &nextupd);
f5d78688
JH
1615 }
1616
f5d78688
JH
1617 DEBUG(D_tls) time_print(bp, "This OCSP Update", thisupd);
1618 DEBUG(D_tls) if(nextupd) time_print(bp, "Next OCSP Update", nextupd);
44662487
JH
1619 if (!OCSP_check_validity(thisupd, nextupd,
1620 EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
f5d78688 1621 {
018058b2 1622 tls_out.ocsp = OCSP_FAILED;
f5d78688
JH
1623 DEBUG(D_tls) ERR_print_errors(bp);
1624 log_write(0, LOG_MAIN, "Server OSCP dates invalid");
f5d78688 1625 }
44662487 1626 else
f5d78688 1627 {
44662487
JH
1628 DEBUG(D_tls) BIO_printf(bp, "Certificate status: %s\n",
1629 OCSP_cert_status_str(status));
1630 switch(status)
1631 {
1632 case V_OCSP_CERTSTATUS_GOOD:
44662487 1633 tls_out.ocsp = OCSP_VFIED;
018058b2 1634 i = 1;
c8dfb21d 1635 goto good;
44662487 1636 case V_OCSP_CERTSTATUS_REVOKED:
018058b2 1637 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1638 log_write(0, LOG_MAIN, "Server certificate revoked%s%s",
1639 reason != -1 ? "; reason: " : "",
1640 reason != -1 ? OCSP_crl_reason_str(reason) : "");
1641 DEBUG(D_tls) time_print(bp, "Revocation Time", rev);
44662487
JH
1642 break;
1643 default:
018058b2 1644 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1645 log_write(0, LOG_MAIN,
1646 "Server certificate status unknown, in OCSP stapling");
44662487
JH
1647 break;
1648 }
f5d78688 1649 }
c8dfb21d
JH
1650 failed:
1651 i = cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1652 good:
f5d78688
JH
1653 BIO_free(bp);
1654 }
1655
1656OCSP_RESPONSE_free(rsp);
1657return i;
1658}
f2de3a33 1659#endif /*!DISABLE_OCSP*/
3f7eeb86
PP
1660
1661
059ec3d9
PH
1662/*************************************************
1663* Initialize for TLS *
1664*************************************************/
1665
e51c7be2
JH
1666/* Called from both server and client code, to do preliminary initialization
1667of the library. We allocate and return a context structure.
059ec3d9
PH
1668
1669Arguments:
946ecbe0 1670 ctxp returned SSL context
059ec3d9
PH
1671 host connected host, if client; NULL if server
1672 dhparam DH parameter file
1673 certificate certificate file
1674 privatekey private key
f5d78688 1675 ocsp_file file of stapling info (server); flag for require ocsp (client)
059ec3d9 1676 addr address if client; NULL if server (for some randomness)
946ecbe0 1677 cbp place to put allocated callback context
cf0c6164 1678 errstr error string pointer
059ec3d9
PH
1679
1680Returns: OK/DEFER/FAIL
1681*/
1682
1683static int
817d9f57 1684tls_init(SSL_CTX **ctxp, host_item *host, uschar *dhparam, uschar *certificate,
3f7eeb86 1685 uschar *privatekey,
f2de3a33 1686#ifndef DISABLE_OCSP
47195144 1687 uschar *ocsp_file, /*XXX stack, in server*/
3f7eeb86 1688#endif
cf0c6164 1689 address_item *addr, tls_ext_ctx_cb ** cbp, uschar ** errstr)
059ec3d9 1690{
7006ee24 1691SSL_CTX * ctx;
77bb000f 1692long init_options;
7be682ca 1693int rc;
a7538db1 1694tls_ext_ctx_cb * cbinfo;
7be682ca
PP
1695
1696cbinfo = store_malloc(sizeof(tls_ext_ctx_cb));
1697cbinfo->certificate = certificate;
1698cbinfo->privatekey = privatekey;
a6510420 1699cbinfo->is_server = host==NULL;
f2de3a33 1700#ifndef DISABLE_OCSP
c3033f13 1701cbinfo->verify_stack = NULL;
a6510420 1702if (!host)
f5d78688
JH
1703 {
1704 cbinfo->u_ocsp.server.file = ocsp_file;
1705 cbinfo->u_ocsp.server.file_expanded = NULL;
1706 cbinfo->u_ocsp.server.response = NULL;
1707 }
1708else
1709 cbinfo->u_ocsp.client.verify_store = NULL;
3f7eeb86 1710#endif
7be682ca 1711cbinfo->dhparam = dhparam;
0df4ab80 1712cbinfo->server_cipher_list = NULL;
7be682ca 1713cbinfo->host = host;
0cbf2b82 1714#ifndef DISABLE_EVENT
a7538db1
JH
1715cbinfo->event_action = NULL;
1716#endif
77bb000f 1717
7434882d 1718#ifdef EXIM_NEED_OPENSSL_INIT
059ec3d9
PH
1719SSL_load_error_strings(); /* basic set up */
1720OpenSSL_add_ssl_algorithms();
7434882d 1721#endif
059ec3d9 1722
c8dfb21d 1723#ifdef EXIM_HAVE_SHA256
77bb000f 1724/* SHA256 is becoming ever more popular. This makes sure it gets added to the
a0475b69
TK
1725list of available digests. */
1726EVP_add_digest(EVP_sha256());
cf1ef1a9 1727#endif
a0475b69 1728
f0f5a555
PP
1729/* Create a context.
1730The OpenSSL docs in 1.0.1b have not been updated to clarify TLS variant
1731negotiation in the different methods; as far as I can tell, the only
1732*_{server,client}_method which allows negotiation is SSLv23, which exists even
1733when OpenSSL is built without SSLv2 support.
1734By disabling with openssl_options, we can let admins re-enable with the
1735existing knob. */
059ec3d9 1736
7a8b9519
JH
1737#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1738if (!(ctx = SSL_CTX_new(host ? TLS_client_method() : TLS_server_method())))
1739#else
7006ee24 1740if (!(ctx = SSL_CTX_new(host ? SSLv23_client_method() : SSLv23_server_method())))
7a8b9519 1741#endif
7006ee24 1742 return tls_error(US"SSL_CTX_new", host, NULL, errstr);
059ec3d9
PH
1743
1744/* It turns out that we need to seed the random number generator this early in
1745order to get the full complement of ciphers to work. It took me roughly a day
1746of work to discover this by experiment.
1747
1748On systems that have /dev/urandom, SSL may automatically seed itself from
1749there. Otherwise, we have to make something up as best we can. Double check
1750afterwards. */
1751
1752if (!RAND_status())
1753 {
1754 randstuff r;
9e3331ea 1755 gettimeofday(&r.tv, NULL);
059ec3d9
PH
1756 r.p = getpid();
1757
5903c6ff
JH
1758 RAND_seed(US (&r), sizeof(r));
1759 RAND_seed(US big_buffer, big_buffer_size);
1760 if (addr != NULL) RAND_seed(US addr, sizeof(addr));
059ec3d9
PH
1761
1762 if (!RAND_status())
7199e1ee 1763 return tls_error(US"RAND_status", host,
cf0c6164 1764 US"unable to seed random number generator", errstr);
059ec3d9
PH
1765 }
1766
1767/* Set up the information callback, which outputs if debugging is at a suitable
1768level. */
1769
7006ee24 1770DEBUG(D_tls) SSL_CTX_set_info_callback(ctx, (void (*)())info_callback);
059ec3d9 1771
c80c5570 1772/* Automatically re-try reads/writes after renegotiation. */
7006ee24 1773(void) SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
c80c5570 1774
77bb000f
PP
1775/* Apply administrator-supplied work-arounds.
1776Historically we applied just one requested option,
1777SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS, but when bug 994 requested a second, we
1778moved to an administrator-controlled list of options to specify and
1779grandfathered in the first one as the default value for "openssl_options".
059ec3d9 1780
77bb000f
PP
1781No OpenSSL version number checks: the options we accept depend upon the
1782availability of the option value macros from OpenSSL. */
059ec3d9 1783
7006ee24 1784if (!tls_openssl_options_parse(openssl_options, &init_options))
cf0c6164 1785 return tls_error(US"openssl_options parsing failed", host, NULL, errstr);
77bb000f
PP
1786
1787if (init_options)
1788 {
1789 DEBUG(D_tls) debug_printf("setting SSL CTX options: %#lx\n", init_options);
7006ee24 1790 if (!(SSL_CTX_set_options(ctx, init_options)))
77bb000f 1791 return tls_error(string_sprintf(
cf0c6164 1792 "SSL_CTX_set_option(%#lx)", init_options), host, NULL, errstr);
77bb000f
PP
1793 }
1794else
1795 DEBUG(D_tls) debug_printf("no SSL CTX options to set\n");
059ec3d9 1796
a28050f8
JH
1797/* We'd like to disable session cache unconditionally, but foolish Outlook
1798Express clients then give up the first TLS connection and make a second one
1799(which works). Only when there is an IMAP service on the same machine.
1800Presumably OE is trying to use the cache for A on B. Leave it enabled for
1801now, until we work out a decent way of presenting control to the config. It
1802will never be used because we use a new context every time. */
1803#ifdef notdef
7006ee24 1804(void) SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
a28050f8 1805#endif
7006ee24 1806
059ec3d9 1807/* Initialize with DH parameters if supplied */
10ca4f1c 1808/* Initialize ECDH temp key parameter selection */
059ec3d9 1809
7006ee24
JH
1810if ( !init_dh(ctx, dhparam, host, errstr)
1811 || !init_ecdh(ctx, host, errstr)
038597d2
PP
1812 )
1813 return DEFER;
059ec3d9 1814
3f7eeb86 1815/* Set up certificate and key (and perhaps OCSP info) */
059ec3d9 1816
7006ee24 1817if ((rc = tls_expand_session_files(ctx, cbinfo, errstr)) != OK)
23bb6982 1818 return rc;
c91535f3 1819
c3033f13
JH
1820/* If we need to handle SNI or OCSP, do so */
1821
3bcbbbe2 1822#ifdef EXIM_HAVE_OPENSSL_TLSEXT
c3033f13
JH
1823# ifndef DISABLE_OCSP
1824 if (!(cbinfo->verify_stack = sk_X509_new_null()))
1825 {
1826 DEBUG(D_tls) debug_printf("failed to create stack for stapling verify\n");
1827 return FAIL;
1828 }
1829# endif
1830
7a8b9519 1831if (!host) /* server */
3f0945ff 1832 {
f2de3a33 1833# ifndef DISABLE_OCSP
f5d78688 1834 /* We check u_ocsp.server.file, not server.response, because we care about if
3f7eeb86
PP
1835 the option exists, not what the current expansion might be, as SNI might
1836 change the certificate and OCSP file in use between now and the time the
1837 callback is invoked. */
f5d78688 1838 if (cbinfo->u_ocsp.server.file)
3f7eeb86 1839 {
7006ee24
JH
1840 SSL_CTX_set_tlsext_status_cb(ctx, tls_server_stapling_cb);
1841 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
3f7eeb86 1842 }
f5d78688 1843# endif
3f0945ff
PP
1844 /* We always do this, so that $tls_sni is available even if not used in
1845 tls_certificate */
7006ee24
JH
1846 SSL_CTX_set_tlsext_servername_callback(ctx, tls_servername_cb);
1847 SSL_CTX_set_tlsext_servername_arg(ctx, cbinfo);
3f0945ff 1848 }
f2de3a33 1849# ifndef DISABLE_OCSP
f5d78688
JH
1850else /* client */
1851 if(ocsp_file) /* wanting stapling */
1852 {
1853 if (!(cbinfo->u_ocsp.client.verify_store = X509_STORE_new()))
1854 {
1855 DEBUG(D_tls) debug_printf("failed to create store for stapling verify\n");
1856 return FAIL;
1857 }
7006ee24
JH
1858 SSL_CTX_set_tlsext_status_cb(ctx, tls_client_stapling_cb);
1859 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
f5d78688
JH
1860 }
1861# endif
7be682ca 1862#endif
059ec3d9 1863
e51c7be2 1864cbinfo->verify_cert_hostnames = NULL;
e51c7be2 1865
c8dfb21d 1866#ifdef EXIM_HAVE_EPHEM_RSA_KEX
059ec3d9 1867/* Set up the RSA callback */
7006ee24 1868SSL_CTX_set_tmp_rsa_callback(ctx, rsa_callback);
c8dfb21d 1869#endif
059ec3d9
PH
1870
1871/* Finally, set the timeout, and we are done */
1872
7006ee24 1873SSL_CTX_set_timeout(ctx, ssl_session_timeout);
059ec3d9 1874DEBUG(D_tls) debug_printf("Initialized TLS\n");
7be682ca 1875
817d9f57 1876*cbp = cbinfo;
7006ee24 1877*ctxp = ctx;
7be682ca 1878
059ec3d9
PH
1879return OK;
1880}
1881
1882
1883
1884
1885/*************************************************
1886* Get name of cipher in use *
1887*************************************************/
1888
817d9f57 1889/*
059ec3d9 1890Argument: pointer to an SSL structure for the connection
817d9f57
JH
1891 buffer to use for answer
1892 size of buffer
1893 pointer to number of bits for cipher
059ec3d9
PH
1894Returns: nothing
1895*/
1896
1897static void
817d9f57 1898construct_cipher_name(SSL *ssl, uschar *cipherbuf, int bsize, int *bits)
059ec3d9 1899{
7a8b9519 1900/* With OpenSSL 1.0.0a, 'c' needs to be const but the documentation doesn't
57b3a7f5
PP
1901yet reflect that. It should be a safe change anyway, even 0.9.8 versions have
1902the accessor functions use const in the prototype. */
059ec3d9 1903
7a8b9519
JH
1904const uschar * ver = CUS SSL_get_version(ssl);
1905const SSL_CIPHER * c = (const SSL_CIPHER *) SSL_get_current_cipher(ssl);
059ec3d9 1906
817d9f57 1907SSL_CIPHER_get_bits(c, bits);
059ec3d9 1908
817d9f57
JH
1909string_format(cipherbuf, bsize, "%s:%s:%u", ver,
1910 SSL_CIPHER_get_name(c), *bits);
059ec3d9
PH
1911
1912DEBUG(D_tls) debug_printf("Cipher: %s\n", cipherbuf);
1913}
1914
1915
f69979cf 1916static void
70e384dd 1917peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned siz)
f69979cf
JH
1918{
1919/*XXX we might consider a list-of-certs variable for the cert chain.
1920SSL_get_peer_cert_chain(SSL*). We'd need a new variable type and support
1921in list-handling functions, also consider the difference between the entire
1922chain and the elements sent by the peer. */
1923
70e384dd
JH
1924tlsp->peerdn = NULL;
1925
f69979cf
JH
1926/* Will have already noted peercert on a verify fail; possibly not the leaf */
1927if (!tlsp->peercert)
1928 tlsp->peercert = SSL_get_peer_certificate(ssl);
1929/* Beware anonymous ciphers which lead to server_cert being NULL */
1930if (tlsp->peercert)
70e384dd
JH
1931 if (!X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, siz))
1932 { DEBUG(D_tls) debug_printf("X509_NAME_oneline() error\n"); }
1933 else
1934 {
1935 peerdn[siz-1] = '\0';
1936 tlsp->peerdn = peerdn; /*XXX a static buffer... */
1937 }
f69979cf
JH
1938}
1939
1940
059ec3d9
PH
1941
1942
1943
1944/*************************************************
1945* Set up for verifying certificates *
1946*************************************************/
1947
0e8aed8a 1948#ifndef DISABLE_OCSP
c3033f13
JH
1949/* Load certs from file, return TRUE on success */
1950
1951static BOOL
1952chain_from_pem_file(const uschar * file, STACK_OF(X509) * verify_stack)
1953{
1954BIO * bp;
1955X509 * x;
1956
dec766a1
WB
1957while (sk_X509_num(verify_stack) > 0)
1958 X509_free(sk_X509_pop(verify_stack));
1959
c3033f13
JH
1960if (!(bp = BIO_new_file(CS file, "r"))) return FALSE;
1961while ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)))
1962 sk_X509_push(verify_stack, x);
1963BIO_free(bp);
1964return TRUE;
1965}
0e8aed8a 1966#endif
c3033f13
JH
1967
1968
1969
dec766a1
WB
1970/* Called by both client and server startup; on the server possibly
1971repeated after a Server Name Indication.
059ec3d9
PH
1972
1973Arguments:
7be682ca 1974 sctx SSL_CTX* to initialise
059ec3d9
PH
1975 certs certs file or NULL
1976 crl CRL file or NULL
1977 host NULL in a server; the remote host in a client
1978 optional TRUE if called from a server for a host in tls_try_verify_hosts;
1979 otherwise passed as FALSE
983207c1 1980 cert_vfy_cb Callback function for certificate verification
cf0c6164 1981 errstr error string pointer
059ec3d9
PH
1982
1983Returns: OK/DEFER/FAIL
1984*/
1985
1986static int
983207c1 1987setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
cf0c6164 1988 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr)
059ec3d9
PH
1989{
1990uschar *expcerts, *expcrl;
1991
cf0c6164 1992if (!expand_check(certs, US"tls_verify_certificates", &expcerts, errstr))
059ec3d9 1993 return DEFER;
57cc2785 1994DEBUG(D_tls) debug_printf("tls_verify_certificates: %s\n", expcerts);
059ec3d9 1995
10a831a3 1996if (expcerts && *expcerts)
059ec3d9 1997 {
10a831a3
JH
1998 /* Tell the library to use its compiled-in location for the system default
1999 CA bundle. Then add the ones specified in the config, if any. */
cb1d7830 2000
10a831a3 2001 if (!SSL_CTX_set_default_verify_paths(sctx))
cf0c6164 2002 return tls_error(US"SSL_CTX_set_default_verify_paths", host, NULL, errstr);
10a831a3
JH
2003
2004 if (Ustrcmp(expcerts, "system") != 0)
059ec3d9 2005 {
cb1d7830
JH
2006 struct stat statbuf;
2007
cb1d7830
JH
2008 if (Ustat(expcerts, &statbuf) < 0)
2009 {
2010 log_write(0, LOG_MAIN|LOG_PANIC,
2011 "failed to stat %s for certificates", expcerts);
2012 return DEFER;
2013 }
059ec3d9 2014 else
059ec3d9 2015 {
cb1d7830
JH
2016 uschar *file, *dir;
2017 if ((statbuf.st_mode & S_IFMT) == S_IFDIR)
2018 { file = NULL; dir = expcerts; }
2019 else
c3033f13
JH
2020 {
2021 file = expcerts; dir = NULL;
2022#ifndef DISABLE_OCSP
2023 /* In the server if we will be offering an OCSP proof, load chain from
2024 file for verifying the OCSP proof at load time. */
2025
2026 if ( !host
2027 && statbuf.st_size > 0
2028 && server_static_cbinfo->u_ocsp.server.file
2029 && !chain_from_pem_file(file, server_static_cbinfo->verify_stack)
2030 )
2031 {
2032 log_write(0, LOG_MAIN|LOG_PANIC,
57887ecc 2033 "failed to load cert chain from %s", file);
c3033f13
JH
2034 return DEFER;
2035 }
2036#endif
2037 }
cb1d7830
JH
2038
2039 /* If a certificate file is empty, the next function fails with an
2040 unhelpful error message. If we skip it, we get the correct behaviour (no
2041 certificates are recognized, but the error message is still misleading (it
c3033f13 2042 says no certificate was supplied). But this is better. */
cb1d7830 2043
f2f2c91b
JH
2044 if ( (!file || statbuf.st_size > 0)
2045 && !SSL_CTX_load_verify_locations(sctx, CS file, CS dir))
cf0c6164 2046 return tls_error(US"SSL_CTX_load_verify_locations", host, NULL, errstr);
cb1d7830
JH
2047
2048 /* Load the list of CAs for which we will accept certs, for sending
2049 to the client. This is only for the one-file tls_verify_certificates
2050 variant.
d7978c0f
JH
2051 If a list isn't loaded into the server, but some verify locations are set,
2052 the server end appears to make a wildcard request for client certs.
10a831a3 2053 Meanwhile, the client library as default behaviour *ignores* the list
cb1d7830
JH
2054 we send over the wire - see man SSL_CTX_set_client_cert_cb.
2055 Because of this, and that the dir variant is likely only used for
d7978c0f
JH
2056 the public-CA bundle (not for a private CA), not worth fixing. */
2057
f2f2c91b 2058 if (file)
cb1d7830 2059 {
2009ecca 2060 STACK_OF(X509_NAME) * names = SSL_load_client_CA_file(CS file);
dec766a1
WB
2061
2062 SSL_CTX_set_client_CA_list(sctx, names);
f2f2c91b 2063 DEBUG(D_tls) debug_printf("Added %d certificate authorities.\n",
cb1d7830 2064 sk_X509_NAME_num(names));
cb1d7830 2065 }
059ec3d9
PH
2066 }
2067 }
2068
2069 /* Handle a certificate revocation list. */
2070
10a831a3 2071#if OPENSSL_VERSION_NUMBER > 0x00907000L
059ec3d9 2072
8b417f2c 2073 /* This bit of code is now the version supplied by Lars Mainka. (I have
10a831a3 2074 merely reformatted it into the Exim code style.)
8b417f2c 2075
10a831a3
JH
2076 "From here I changed the code to add support for multiple crl's
2077 in pem format in one file or to support hashed directory entries in
2078 pem format instead of a file. This method now uses the library function
2079 X509_STORE_load_locations to add the CRL location to the SSL context.
2080 OpenSSL will then handle the verify against CA certs and CRLs by
2081 itself in the verify callback." */
8b417f2c 2082
cf0c6164 2083 if (!expand_check(crl, US"tls_crl", &expcrl, errstr)) return DEFER;
10a831a3 2084 if (expcrl && *expcrl)
059ec3d9 2085 {
8b417f2c
PH
2086 struct stat statbufcrl;
2087 if (Ustat(expcrl, &statbufcrl) < 0)
2088 {
2089 log_write(0, LOG_MAIN|LOG_PANIC,
2090 "failed to stat %s for certificates revocation lists", expcrl);
2091 return DEFER;
2092 }
2093 else
059ec3d9 2094 {
8b417f2c
PH
2095 /* is it a file or directory? */
2096 uschar *file, *dir;
7be682ca 2097 X509_STORE *cvstore = SSL_CTX_get_cert_store(sctx);
8b417f2c 2098 if ((statbufcrl.st_mode & S_IFMT) == S_IFDIR)
059ec3d9 2099 {
8b417f2c
PH
2100 file = NULL;
2101 dir = expcrl;
2102 DEBUG(D_tls) debug_printf("SSL CRL value is a directory %s\n", dir);
059ec3d9
PH
2103 }
2104 else
2105 {
8b417f2c
PH
2106 file = expcrl;
2107 dir = NULL;
2108 DEBUG(D_tls) debug_printf("SSL CRL value is a file %s\n", file);
059ec3d9 2109 }
8b417f2c 2110 if (X509_STORE_load_locations(cvstore, CS file, CS dir) == 0)
cf0c6164 2111 return tls_error(US"X509_STORE_load_locations", host, NULL, errstr);
8b417f2c
PH
2112
2113 /* setting the flags to check against the complete crl chain */
2114
2115 X509_STORE_set_flags(cvstore,
2116 X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
059ec3d9 2117 }
059ec3d9
PH
2118 }
2119
10a831a3 2120#endif /* OPENSSL_VERSION_NUMBER > 0x00907000L */
059ec3d9
PH
2121
2122 /* If verification is optional, don't fail if no certificate */
2123
7be682ca 2124 SSL_CTX_set_verify(sctx,
5a2a0989 2125 SSL_VERIFY_PEER | (optional ? 0 : SSL_VERIFY_FAIL_IF_NO_PEER_CERT),
983207c1 2126 cert_vfy_cb);
059ec3d9
PH
2127 }
2128
2129return OK;
2130}
2131
2132
2133
2134/*************************************************
2135* Start a TLS session in a server *
2136*************************************************/
2137
2138/* This is called when Exim is running as a server, after having received
2139the STARTTLS command. It must respond to that command, and then negotiate
2140a TLS session.
2141
2142Arguments:
2143 require_ciphers allowed ciphers
cf0c6164 2144 errstr pointer to error message
059ec3d9
PH
2145
2146Returns: OK on success
2147 DEFER for errors before the start of the negotiation
4c04137d 2148 FAIL for errors during the negotiation; the server can't
059ec3d9
PH
2149 continue running.
2150*/
2151
2152int
cf0c6164 2153tls_server_start(const uschar * require_ciphers, uschar ** errstr)
059ec3d9
PH
2154{
2155int rc;
cf0c6164
JH
2156uschar * expciphers;
2157tls_ext_ctx_cb * cbinfo;
f69979cf 2158static uschar peerdn[256];
817d9f57 2159static uschar cipherbuf[256];
059ec3d9
PH
2160
2161/* Check for previous activation */
2162
74f1a423 2163if (tls_in.active.sock >= 0)
059ec3d9 2164 {
cf0c6164 2165 tls_error(US"STARTTLS received after TLS started", NULL, US"", errstr);
925ac8e4 2166 smtp_printf("554 Already in TLS\r\n", FALSE);
059ec3d9
PH
2167 return FAIL;
2168 }
2169
2170/* Initialize the SSL library. If it fails, it will already have logged
2171the error. */
2172
817d9f57 2173rc = tls_init(&server_ctx, NULL, tls_dhparam, tls_certificate, tls_privatekey,
f2de3a33 2174#ifndef DISABLE_OCSP
47195144 2175 tls_ocsp_file, /*XXX stack*/
3f7eeb86 2176#endif
cf0c6164 2177 NULL, &server_static_cbinfo, errstr);
059ec3d9 2178if (rc != OK) return rc;
817d9f57 2179cbinfo = server_static_cbinfo;
059ec3d9 2180
cf0c6164 2181if (!expand_check(require_ciphers, US"tls_require_ciphers", &expciphers, errstr))
059ec3d9
PH
2182 return FAIL;
2183
2184/* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
17c76198
PP
2185were historically separated by underscores. So that I can use either form in my
2186tests, and also for general convenience, we turn underscores into hyphens here.
0c3807a8
JH
2187
2188XXX SSL_CTX_set_cipher_list() is replaced by SSL_CTX_set_ciphersuites()
2189for TLS 1.3 . Since we do not call it at present we get the default list:
2190TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
17c76198 2191*/
059ec3d9 2192
c3033f13 2193if (expciphers)
059ec3d9 2194 {
c3033f13 2195 uschar * s = expciphers;
059ec3d9
PH
2196 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
2197 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
817d9f57 2198 if (!SSL_CTX_set_cipher_list(server_ctx, CS expciphers))
cf0c6164 2199 return tls_error(US"SSL_CTX_set_cipher_list", NULL, NULL, errstr);
7be682ca 2200 cbinfo->server_cipher_list = expciphers;
059ec3d9
PH
2201 }
2202
2203/* If this is a host for which certificate verification is mandatory or
2204optional, set up appropriately. */
2205
817d9f57 2206tls_in.certificate_verified = FALSE;
c0635b6d 2207#ifdef SUPPORT_DANE
53a7196b
JH
2208tls_in.dane_verified = FALSE;
2209#endif
a2ff477a 2210server_verify_callback_called = FALSE;
059ec3d9
PH
2211
2212if (verify_check_host(&tls_verify_hosts) == OK)
2213 {
983207c1 2214 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
afdb5e9c 2215 FALSE, verify_callback_server, errstr);
059ec3d9 2216 if (rc != OK) return rc;
a2ff477a 2217 server_verify_optional = FALSE;
059ec3d9
PH
2218 }
2219else if (verify_check_host(&tls_try_verify_hosts) == OK)
2220 {
983207c1 2221 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
afdb5e9c 2222 TRUE, verify_callback_server, errstr);
059ec3d9 2223 if (rc != OK) return rc;
a2ff477a 2224 server_verify_optional = TRUE;
059ec3d9
PH
2225 }
2226
2227/* Prepare for new connection */
2228
cf0c6164
JH
2229if (!(server_ssl = SSL_new(server_ctx)))
2230 return tls_error(US"SSL_new", NULL, NULL, errstr);
da3ad30d
PP
2231
2232/* Warning: we used to SSL_clear(ssl) here, it was removed.
2233 *
2234 * With the SSL_clear(), we get strange interoperability bugs with
2235 * OpenSSL 1.0.1b and TLS1.1/1.2. It looks as though this may be a bug in
2236 * OpenSSL itself, as a clear should not lead to inability to follow protocols.
2237 *
2238 * The SSL_clear() call is to let an existing SSL* be reused, typically after
2239 * session shutdown. In this case, we have a brand new object and there's no
2240 * obvious reason to immediately clear it. I'm guessing that this was
2241 * originally added because of incomplete initialisation which the clear fixed,
2242 * in some historic release.
2243 */
059ec3d9
PH
2244
2245/* Set context and tell client to go ahead, except in the case of TLS startup
2246on connection, where outputting anything now upsets the clients and tends to
2247make them disconnect. We need to have an explicit fflush() here, to force out
2248the response. Other smtp_printf() calls do not need it, because in non-TLS
2249mode, the fflush() happens when smtp_getc() is called. */
2250
817d9f57
JH
2251SSL_set_session_id_context(server_ssl, sid_ctx, Ustrlen(sid_ctx));
2252if (!tls_in.on_connect)
059ec3d9 2253 {
925ac8e4 2254 smtp_printf("220 TLS go ahead\r\n", FALSE);
059ec3d9
PH
2255 fflush(smtp_out);
2256 }
2257
2258/* Now negotiate the TLS session. We put our own timer on it, since it seems
2259that the OpenSSL library doesn't. */
2260
817d9f57
JH
2261SSL_set_wfd(server_ssl, fileno(smtp_out));
2262SSL_set_rfd(server_ssl, fileno(smtp_in));
2263SSL_set_accept_state(server_ssl);
059ec3d9
PH
2264
2265DEBUG(D_tls) debug_printf("Calling SSL_accept\n");
2266
2267sigalrm_seen = FALSE;
c2a1bba0 2268if (smtp_receive_timeout > 0) ALARM(smtp_receive_timeout);
817d9f57 2269rc = SSL_accept(server_ssl);
c2a1bba0 2270ALARM_CLR(0);
059ec3d9
PH
2271
2272if (rc <= 0)
2273 {
cf0c6164 2274 (void) tls_error(US"SSL_accept", NULL, sigalrm_seen ? US"timed out" : NULL, errstr);
059ec3d9
PH
2275 return FAIL;
2276 }
2277
2278DEBUG(D_tls) debug_printf("SSL_accept was successful\n");
25fa0868
JH
2279ERR_clear_error(); /* Even success can leave errors in the stack. Seen with
2280 anon-authentication ciphersuite negociated. */
059ec3d9
PH
2281
2282/* TLS has been set up. Adjust the input functions to read via TLS,
2283and initialize things. */
2284
f69979cf
JH
2285peer_cert(server_ssl, &tls_in, peerdn, sizeof(peerdn));
2286
817d9f57
JH
2287construct_cipher_name(server_ssl, cipherbuf, sizeof(cipherbuf), &tls_in.bits);
2288tls_in.cipher = cipherbuf;
059ec3d9
PH
2289
2290DEBUG(D_tls)
2291 {
2292 uschar buf[2048];
817d9f57 2293 if (SSL_get_shared_ciphers(server_ssl, CS buf, sizeof(buf)) != NULL)
059ec3d9
PH
2294 debug_printf("Shared ciphers: %s\n", buf);
2295 }
2296
9d1c15ef
JH
2297/* Record the certificate we presented */
2298 {
2299 X509 * crt = SSL_get_certificate(server_ssl);
2300 tls_in.ourcert = crt ? X509_dup(crt) : NULL;
2301 }
059ec3d9 2302
817d9f57
JH
2303/* Only used by the server-side tls (tls_in), including tls_getc.
2304 Client-side (tls_out) reads (seem to?) go via
2305 smtp_read_response()/ip_recv().
2306 Hence no need to duplicate for _in and _out.
2307 */
b808677c 2308if (!ssl_xfer_buffer) ssl_xfer_buffer = store_malloc(ssl_xfer_buffer_size);
059ec3d9 2309ssl_xfer_buffer_lwm = ssl_xfer_buffer_hwm = 0;
8b77d27a 2310ssl_xfer_eof = ssl_xfer_error = FALSE;
059ec3d9
PH
2311
2312receive_getc = tls_getc;
0d81dabc 2313receive_getbuf = tls_getbuf;
584e96c6 2314receive_get_cache = tls_get_cache;
059ec3d9
PH
2315receive_ungetc = tls_ungetc;
2316receive_feof = tls_feof;
2317receive_ferror = tls_ferror;
58eb016e 2318receive_smtp_buffered = tls_smtp_buffered;
059ec3d9 2319
74f1a423
JH
2320tls_in.active.sock = fileno(smtp_out);
2321tls_in.active.tls_ctx = NULL; /* not using explicit ctx for server-side */
059ec3d9
PH
2322return OK;
2323}
2324
2325
2326
2327
043b1248
JH
2328static int
2329tls_client_basic_ctx_init(SSL_CTX * ctx,
cf0c6164
JH
2330 host_item * host, smtp_transport_options_block * ob, tls_ext_ctx_cb * cbinfo,
2331 uschar ** errstr)
043b1248
JH
2332{
2333int rc;
94431adb 2334/* stick to the old behaviour for compatibility if tls_verify_certificates is
043b1248
JH
2335 set but both tls_verify_hosts and tls_try_verify_hosts is not set. Check only
2336 the specified host patterns if one of them is defined */
2337
610ff438
JH
2338if ( ( !ob->tls_verify_hosts
2339 && (!ob->tls_try_verify_hosts || !*ob->tls_try_verify_hosts)
2340 )
3c07dd2d 2341 || verify_check_given_host(CUSS &ob->tls_verify_hosts, host) == OK
aa2a70ba 2342 )
043b1248 2343 client_verify_optional = FALSE;
3c07dd2d 2344else if (verify_check_given_host(CUSS &ob->tls_try_verify_hosts, host) == OK)
aa2a70ba
JH
2345 client_verify_optional = TRUE;
2346else
2347 return OK;
2348
2349if ((rc = setup_certs(ctx, ob->tls_verify_certificates,
cf0c6164
JH
2350 ob->tls_crl, host, client_verify_optional, verify_callback_client,
2351 errstr)) != OK)
aa2a70ba 2352 return rc;
043b1248 2353
3c07dd2d 2354if (verify_check_given_host(CUSS &ob->tls_verify_cert_hostnames, host) == OK)
043b1248 2355 {
4af0d74a 2356 cbinfo->verify_cert_hostnames =
8c5d388a 2357#ifdef SUPPORT_I18N
4af0d74a
JH
2358 string_domain_utf8_to_alabel(host->name, NULL);
2359#else
2360 host->name;
2361#endif
aa2a70ba
JH
2362 DEBUG(D_tls) debug_printf("Cert hostname to check: \"%s\"\n",
2363 cbinfo->verify_cert_hostnames);
043b1248 2364 }
043b1248
JH
2365return OK;
2366}
059ec3d9 2367
fde080a4 2368
c0635b6d 2369#ifdef SUPPORT_DANE
fde080a4 2370static int
cf0c6164 2371dane_tlsa_load(SSL * ssl, host_item * host, dns_answer * dnsa, uschar ** errstr)
fde080a4 2372{
fde080a4
JH
2373dns_scan dnss;
2374const char * hostnames[2] = { CS host->name, NULL };
2375int found = 0;
2376
2377if (DANESSL_init(ssl, NULL, hostnames) != 1)
cf0c6164 2378 return tls_error(US"hostnames load", host, NULL, errstr);
fde080a4 2379
d7978c0f 2380for (dns_record * rr = dns_next_rr(dnsa, &dnss, RESET_ANSWERS); rr;
fde080a4 2381 rr = dns_next_rr(dnsa, &dnss, RESET_NEXT)
1b76ad22 2382 ) if (rr->type == T_TLSA && rr->size > 3)
fde080a4 2383 {
c3033f13 2384 const uschar * p = rr->data;
fde080a4
JH
2385 uint8_t usage, selector, mtype;
2386 const char * mdname;
2387
fde080a4 2388 usage = *p++;
133d2546
JH
2389
2390 /* Only DANE-TA(2) and DANE-EE(3) are supported */
2391 if (usage != 2 && usage != 3) continue;
2392
fde080a4
JH
2393 selector = *p++;
2394 mtype = *p++;
2395
2396 switch (mtype)
2397 {
133d2546
JH
2398 default: continue; /* Only match-types 0, 1, 2 are supported */
2399 case 0: mdname = NULL; break;
2400 case 1: mdname = "sha256"; break;
2401 case 2: mdname = "sha512"; break;
fde080a4
JH
2402 }
2403
133d2546 2404 found++;
fde080a4
JH
2405 switch (DANESSL_add_tlsa(ssl, usage, selector, mdname, p, rr->size - 3))
2406 {
2407 default:
cf0c6164 2408 return tls_error(US"tlsa load", host, NULL, errstr);
c035b645 2409 case 0: /* action not taken */
fde080a4
JH
2410 case 1: break;
2411 }
594706ea
JH
2412
2413 tls_out.tlsa_usage |= 1<<usage;
fde080a4
JH
2414 }
2415
2416if (found)
2417 return OK;
2418
133d2546 2419log_write(0, LOG_MAIN, "DANE error: No usable TLSA records");
6ebd79ec 2420return DEFER;
fde080a4 2421}
c0635b6d 2422#endif /*SUPPORT_DANE*/
fde080a4
JH
2423
2424
2425
059ec3d9
PH
2426/*************************************************
2427* Start a TLS session in a client *
2428*************************************************/
2429
2430/* Called from the smtp transport after STARTTLS has been accepted.
2431
2432Argument:
2433 fd the fd of the connection
afdb5e9c
JH
2434 host connected host (for messages and option-tests)
2435 addr the first address (for some randomness; can be NULL)
a7538db1 2436 tb transport (always smtp)
0e66b3b6 2437 tlsa_dnsa tlsa lookup, if DANE, else null
afdb5e9c 2438 tlsp record details of channel configuration here; must be non-NULL
cf0c6164 2439 errstr error string pointer
059ec3d9 2440
74f1a423 2441Returns: Pointer to TLS session context, or NULL on error
059ec3d9
PH
2442*/
2443
74f1a423 2444void *
f5d78688 2445tls_client_start(int fd, host_item *host, address_item *addr,
cf0c6164 2446 transport_instance * tb,
c0635b6d 2447#ifdef SUPPORT_DANE
cf0c6164 2448 dns_answer * tlsa_dnsa,
0e66b3b6 2449#endif
74f1a423 2450 tls_support * tlsp, uschar ** errstr)
059ec3d9 2451{
afdb5e9c
JH
2452smtp_transport_options_block * ob = tb
2453 ? (smtp_transport_options_block *)tb->options_block
2454 : &smtp_transport_option_defaults;
74f1a423 2455exim_openssl_client_tls_ctx * exim_client_ctx;
f69979cf 2456static uschar peerdn[256];
868f5672 2457uschar * expciphers;
059ec3d9 2458int rc;
817d9f57 2459static uschar cipherbuf[256];
043b1248
JH
2460
2461#ifndef DISABLE_OCSP
043b1248 2462BOOL request_ocsp = FALSE;
6634ac8d 2463BOOL require_ocsp = FALSE;
043b1248 2464#endif
043b1248 2465
74f1a423
JH
2466rc = store_pool;
2467store_pool = POOL_PERM;
2468exim_client_ctx = store_get(sizeof(exim_openssl_client_tls_ctx));
2469store_pool = rc;
2470
c0635b6d 2471#ifdef SUPPORT_DANE
74f1a423 2472tlsp->tlsa_usage = 0;
043b1248
JH
2473#endif
2474
f2de3a33 2475#ifndef DISABLE_OCSP
043b1248 2476 {
c0635b6d 2477# ifdef SUPPORT_DANE
4f59c424
JH
2478 if ( tlsa_dnsa
2479 && ob->hosts_request_ocsp[0] == '*'
2480 && ob->hosts_request_ocsp[1] == '\0'
2481 )
2482 {
2483 /* Unchanged from default. Use a safer one under DANE */
2484 request_ocsp = TRUE;
2485 ob->hosts_request_ocsp = US"${if or { {= {0}{$tls_out_tlsa_usage}} "
2486 " {= {4}{$tls_out_tlsa_usage}} } "
2487 " {*}{}}";
2488 }
2489# endif
2490
5130845b 2491 if ((require_ocsp =
3c07dd2d 2492 verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK))
fca41d5a
JH
2493 request_ocsp = TRUE;
2494 else
c0635b6d 2495# ifdef SUPPORT_DANE
4f59c424 2496 if (!request_ocsp)
fca41d5a 2497# endif
5130845b 2498 request_ocsp =
3c07dd2d 2499 verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
043b1248 2500 }
f5d78688 2501#endif
059ec3d9 2502
74f1a423 2503rc = tls_init(&exim_client_ctx->ctx, host, NULL,
65867078 2504 ob->tls_certificate, ob->tls_privatekey,
f2de3a33 2505#ifndef DISABLE_OCSP
44662487 2506 (void *)(long)request_ocsp,
3f7eeb86 2507#endif
cf0c6164 2508 addr, &client_static_cbinfo, errstr);
74f1a423 2509if (rc != OK) return NULL;
059ec3d9 2510
74f1a423 2511tlsp->certificate_verified = FALSE;
a2ff477a 2512client_verify_callback_called = FALSE;
059ec3d9 2513
5ec37a55
PP
2514expciphers = NULL;
2515#ifdef SUPPORT_DANE
2516if (tlsa_dnsa)
2517 {
2518 /* We fall back to tls_require_ciphers if unset, empty or forced failure, but
2519 other failures should be treated as problems. */
2520 if (ob->dane_require_tls_ciphers &&
2521 !expand_check(ob->dane_require_tls_ciphers, US"dane_require_tls_ciphers",
2522 &expciphers, errstr))
74f1a423 2523 return NULL;
5ec37a55
PP
2524 if (expciphers && *expciphers == '\0')
2525 expciphers = NULL;
2526 }
2527#endif
2528if (!expciphers &&
2529 !expand_check(ob->tls_require_ciphers, US"tls_require_ciphers",
2530 &expciphers, errstr))
74f1a423 2531 return NULL;
059ec3d9
PH
2532
2533/* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2534are separated by underscores. So that I can use either form in my tests, and
2535also for general convenience, we turn underscores into hyphens here. */
2536
cf0c6164 2537if (expciphers)
059ec3d9
PH
2538 {
2539 uschar *s = expciphers;
cf0c6164 2540 while (*s) { if (*s == '_') *s = '-'; s++; }
059ec3d9 2541 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
74f1a423
JH
2542 if (!SSL_CTX_set_cipher_list(exim_client_ctx->ctx, CS expciphers))
2543 {
2544 tls_error(US"SSL_CTX_set_cipher_list", host, NULL, errstr);
2545 return NULL;
2546 }
059ec3d9
PH
2547 }
2548
c0635b6d 2549#ifdef SUPPORT_DANE
0e66b3b6 2550if (tlsa_dnsa)
a63be306 2551 {
74f1a423 2552 SSL_CTX_set_verify(exim_client_ctx->ctx,
02af313d
JH
2553 SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2554 verify_callback_client_dane);
e5cccda9 2555
043b1248 2556 if (!DANESSL_library_init())
74f1a423
JH
2557 {
2558 tls_error(US"library init", host, NULL, errstr);
2559 return NULL;
2560 }
2561 if (DANESSL_CTX_init(exim_client_ctx->ctx) <= 0)
2562 {
2563 tls_error(US"context init", host, NULL, errstr);
2564 return NULL;
2565 }
043b1248
JH
2566 }
2567else
e51c7be2 2568
043b1248
JH
2569#endif
2570
74f1a423
JH
2571 if (tls_client_basic_ctx_init(exim_client_ctx->ctx, host, ob,
2572 client_static_cbinfo, errstr) != OK)
2573 return NULL;
059ec3d9 2574
74f1a423
JH
2575if (!(exim_client_ctx->ssl = SSL_new(exim_client_ctx->ctx)))
2576 {
2577 tls_error(US"SSL_new", host, NULL, errstr);
2578 return NULL;
2579 }
2580SSL_set_session_id_context(exim_client_ctx->ssl, sid_ctx, Ustrlen(sid_ctx));
2581SSL_set_fd(exim_client_ctx->ssl, fd);
2582SSL_set_connect_state(exim_client_ctx->ssl);
059ec3d9 2583
65867078 2584if (ob->tls_sni)
3f0945ff 2585 {
74f1a423
JH
2586 if (!expand_check(ob->tls_sni, US"tls_sni", &tlsp->sni, errstr))
2587 return NULL;
2588 if (!tlsp->sni)
2c9a0e86
PP
2589 {
2590 DEBUG(D_tls) debug_printf("Setting TLS SNI forced to fail, not sending\n");
2591 }
74f1a423
JH
2592 else if (!Ustrlen(tlsp->sni))
2593 tlsp->sni = NULL;
3f0945ff
PP
2594 else
2595 {
35731706 2596#ifdef EXIM_HAVE_OPENSSL_TLSEXT
74f1a423
JH
2597 DEBUG(D_tls) debug_printf("Setting TLS SNI \"%s\"\n", tlsp->sni);
2598 SSL_set_tlsext_host_name(exim_client_ctx->ssl, tlsp->sni);
35731706 2599#else
66802652 2600 log_write(0, LOG_MAIN, "SNI unusable with this OpenSSL library version; ignoring \"%s\"\n",
74f1a423 2601 tlsp->sni);
35731706 2602#endif
3f0945ff
PP
2603 }
2604 }
2605
c0635b6d 2606#ifdef SUPPORT_DANE
0e66b3b6 2607if (tlsa_dnsa)
74f1a423
JH
2608 if (dane_tlsa_load(exim_client_ctx->ssl, host, tlsa_dnsa, errstr) != OK)
2609 return NULL;
594706ea
JH
2610#endif
2611
f2de3a33 2612#ifndef DISABLE_OCSP
f5d78688
JH
2613/* Request certificate status at connection-time. If the server
2614does OCSP stapling we will get the callback (set in tls_init()) */
c0635b6d 2615# ifdef SUPPORT_DANE
594706ea
JH
2616if (request_ocsp)
2617 {
2618 const uschar * s;
41afb5cb
JH
2619 if ( ((s = ob->hosts_require_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2620 || ((s = ob->hosts_request_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
594706ea
JH
2621 )
2622 { /* Re-eval now $tls_out_tlsa_usage is populated. If
2623 this means we avoid the OCSP request, we wasted the setup
2624 cost in tls_init(). */
3c07dd2d 2625 require_ocsp = verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK;
5130845b 2626 request_ocsp = require_ocsp
3c07dd2d 2627 || verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
594706ea
JH
2628 }
2629 }
b50c8b84
JH
2630# endif
2631
44662487
JH
2632if (request_ocsp)
2633 {
74f1a423 2634 SSL_set_tlsext_status_type(exim_client_ctx->ssl, TLSEXT_STATUSTYPE_ocsp);
44662487 2635 client_static_cbinfo->u_ocsp.client.verify_required = require_ocsp;
74f1a423 2636 tlsp->ocsp = OCSP_NOT_RESP;
44662487 2637 }
f5d78688
JH
2638#endif
2639
0cbf2b82 2640#ifndef DISABLE_EVENT
afdb5e9c 2641client_static_cbinfo->event_action = tb ? tb->event_action : NULL;
a7538db1 2642#endif
043b1248 2643
059ec3d9
PH
2644/* There doesn't seem to be a built-in timeout on connection. */
2645
2646DEBUG(D_tls) debug_printf("Calling SSL_connect\n");
2647sigalrm_seen = FALSE;
c2a1bba0 2648ALARM(ob->command_timeout);
74f1a423 2649rc = SSL_connect(exim_client_ctx->ssl);
c2a1bba0 2650ALARM_CLR(0);
059ec3d9 2651
c0635b6d 2652#ifdef SUPPORT_DANE
0e66b3b6 2653if (tlsa_dnsa)
74f1a423 2654 DANESSL_cleanup(exim_client_ctx->ssl);
043b1248
JH
2655#endif
2656
059ec3d9 2657if (rc <= 0)
74f1a423
JH
2658 {
2659 tls_error(US"SSL_connect", host, sigalrm_seen ? US"timed out" : NULL, errstr);
2660 return NULL;
2661 }
059ec3d9
PH
2662
2663DEBUG(D_tls) debug_printf("SSL_connect succeeded\n");
2664
74f1a423 2665peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn));
059ec3d9 2666
74f1a423
JH
2667construct_cipher_name(exim_client_ctx->ssl, cipherbuf, sizeof(cipherbuf), &tlsp->bits);
2668tlsp->cipher = cipherbuf;
059ec3d9 2669
9d1c15ef
JH
2670/* Record the certificate we presented */
2671 {
74f1a423
JH
2672 X509 * crt = SSL_get_certificate(exim_client_ctx->ssl);
2673 tlsp->ourcert = crt ? X509_dup(crt) : NULL;
9d1c15ef
JH
2674 }
2675
74f1a423
JH
2676tlsp->active.sock = fd;
2677tlsp->active.tls_ctx = exim_client_ctx;
2678return exim_client_ctx;
059ec3d9
PH
2679}
2680
2681
2682
2683
2684
0d81dabc
JH
2685static BOOL
2686tls_refill(unsigned lim)
2687{
2688int error;
2689int inbytes;
2690
2691DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", server_ssl,
2692 ssl_xfer_buffer, ssl_xfer_buffer_size);
2693
c2a1bba0 2694if (smtp_receive_timeout > 0) ALARM(smtp_receive_timeout);
0d81dabc
JH
2695inbytes = SSL_read(server_ssl, CS ssl_xfer_buffer,
2696 MIN(ssl_xfer_buffer_size, lim));
2697error = SSL_get_error(server_ssl, inbytes);
c2a1bba0 2698if (smtp_receive_timeout > 0) ALARM_CLR(0);
9723f966
JH
2699
2700if (had_command_timeout) /* set by signal handler */
2701 smtp_command_timeout_exit(); /* does not return */
2702if (had_command_sigterm)
2703 smtp_command_sigterm_exit();
2704if (had_data_timeout)
2705 smtp_data_timeout_exit();
2706if (had_data_sigint)
2707 smtp_data_sigint_exit();
0d81dabc
JH
2708
2709/* SSL_ERROR_ZERO_RETURN appears to mean that the SSL session has been
2710closed down, not that the socket itself has been closed down. Revert to
2711non-SSL handling. */
2712
74f1a423 2713switch(error)
0d81dabc 2714 {
74f1a423
JH
2715 case SSL_ERROR_NONE:
2716 break;
2717
2718 case SSL_ERROR_ZERO_RETURN:
2719 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
0d81dabc 2720
74f1a423
JH
2721 receive_getc = smtp_getc;
2722 receive_getbuf = smtp_getbuf;
2723 receive_get_cache = smtp_get_cache;
2724 receive_ungetc = smtp_ungetc;
2725 receive_feof = smtp_feof;
2726 receive_ferror = smtp_ferror;
2727 receive_smtp_buffered = smtp_buffered;
0d81dabc 2728
74f1a423
JH
2729 if (SSL_get_shutdown(server_ssl) == SSL_RECEIVED_SHUTDOWN)
2730 SSL_shutdown(server_ssl);
dec766a1 2731
37f0ce65 2732#ifndef DISABLE_OCSP
74f1a423
JH
2733 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2734 server_static_cbinfo->verify_stack = NULL;
37f0ce65 2735#endif
74f1a423
JH
2736 SSL_free(server_ssl);
2737 SSL_CTX_free(server_ctx);
2738 server_ctx = NULL;
2739 server_ssl = NULL;
2740 tls_in.active.sock = -1;
2741 tls_in.active.tls_ctx = NULL;
2742 tls_in.bits = 0;
2743 tls_in.cipher = NULL;
2744 tls_in.peerdn = NULL;
2745 tls_in.sni = NULL;
0d81dabc 2746
74f1a423 2747 return FALSE;
0d81dabc 2748
74f1a423
JH
2749 /* Handle genuine errors */
2750 case SSL_ERROR_SSL:
0abc5a13 2751 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
74f1a423
JH
2752 log_write(0, LOG_MAIN, "TLS error (SSL_read): %s", ssl_errstring);
2753 ssl_xfer_error = TRUE;
2754 return FALSE;
0d81dabc 2755
74f1a423
JH
2756 default:
2757 DEBUG(D_tls) debug_printf("Got SSL error %d\n", error);
2758 DEBUG(D_tls) if (error == SSL_ERROR_SYSCALL)
2759 debug_printf(" - syscall %s\n", strerror(errno));
2760 ssl_xfer_error = TRUE;
2761 return FALSE;
0d81dabc
JH
2762 }
2763
2764#ifndef DISABLE_DKIM
2765dkim_exim_verify_feed(ssl_xfer_buffer, inbytes);
2766#endif
2767ssl_xfer_buffer_hwm = inbytes;
2768ssl_xfer_buffer_lwm = 0;
2769return TRUE;
2770}
2771
2772
059ec3d9
PH
2773/*************************************************
2774* TLS version of getc *
2775*************************************************/
2776
2777/* This gets the next byte from the TLS input buffer. If the buffer is empty,
2778it refills the buffer via the SSL reading function.
2779
bd8fbe36 2780Arguments: lim Maximum amount to read/buffer
059ec3d9 2781Returns: the next character or EOF
817d9f57
JH
2782
2783Only used by the server-side TLS.
059ec3d9
PH
2784*/
2785
2786int
bd8fbe36 2787tls_getc(unsigned lim)
059ec3d9
PH
2788{
2789if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
0d81dabc
JH
2790 if (!tls_refill(lim))
2791 return ssl_xfer_error ? EOF : smtp_getc(lim);
059ec3d9 2792
0d81dabc 2793/* Something in the buffer; return next uschar */
059ec3d9 2794
0d81dabc
JH
2795return ssl_xfer_buffer[ssl_xfer_buffer_lwm++];
2796}
059ec3d9 2797
0d81dabc
JH
2798uschar *
2799tls_getbuf(unsigned * len)
2800{
2801unsigned size;
2802uschar * buf;
ba084640 2803
0d81dabc
JH
2804if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2805 if (!tls_refill(*len))
059ec3d9 2806 {
0d81dabc
JH
2807 if (!ssl_xfer_error) return smtp_getbuf(len);
2808 *len = 0;
2809 return NULL;
059ec3d9 2810 }
c80c5570 2811
0d81dabc
JH
2812if ((size = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm) > *len)
2813 size = *len;
2814buf = &ssl_xfer_buffer[ssl_xfer_buffer_lwm];
2815ssl_xfer_buffer_lwm += size;
2816*len = size;
2817return buf;
059ec3d9
PH
2818}
2819
0d81dabc 2820
584e96c6
JH
2821void
2822tls_get_cache()
2823{
9960d1e5 2824#ifndef DISABLE_DKIM
584e96c6
JH
2825int n = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm;
2826if (n > 0)
2827 dkim_exim_verify_feed(ssl_xfer_buffer+ssl_xfer_buffer_lwm, n);
584e96c6 2828#endif
9960d1e5 2829}
584e96c6 2830
059ec3d9 2831
925ac8e4
JH
2832BOOL
2833tls_could_read(void)
2834{
a5ffa9b4 2835return ssl_xfer_buffer_lwm < ssl_xfer_buffer_hwm || SSL_pending(server_ssl) > 0;
925ac8e4
JH
2836}
2837
059ec3d9
PH
2838
2839/*************************************************
2840* Read bytes from TLS channel *
2841*************************************************/
2842
2843/*
2844Arguments:
74f1a423 2845 ct_ctx client context pointer, or NULL for the one global server context
059ec3d9
PH
2846 buff buffer of data
2847 len size of buffer
2848
2849Returns: the number of bytes read
afdb5e9c 2850 -1 after a failed read, including EOF
817d9f57
JH
2851
2852Only used by the client-side TLS.
059ec3d9
PH
2853*/
2854
2855int
74f1a423 2856tls_read(void * ct_ctx, uschar *buff, size_t len)
059ec3d9 2857{
74f1a423 2858SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
059ec3d9
PH
2859int inbytes;
2860int error;
2861
389ca47a 2862DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", ssl,
c80c5570 2863 buff, (unsigned int)len);
059ec3d9 2864
389ca47a
JH
2865inbytes = SSL_read(ssl, CS buff, len);
2866error = SSL_get_error(ssl, inbytes);
059ec3d9
PH
2867
2868if (error == SSL_ERROR_ZERO_RETURN)
2869 {
2870 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2871 return -1;
2872 }
2873else if (error != SSL_ERROR_NONE)
059ec3d9 2874 return -1;
059ec3d9
PH
2875
2876return inbytes;
2877}
2878
2879
2880
2881
2882
2883/*************************************************
2884* Write bytes down TLS channel *
2885*************************************************/
2886
2887/*
2888Arguments:
74f1a423 2889 ct_ctx client context pointer, or NULL for the one global server context
059ec3d9
PH
2890 buff buffer of data
2891 len number of bytes
925ac8e4 2892 more further data expected soon
059ec3d9
PH
2893
2894Returns: the number of bytes after a successful write,
2895 -1 after a failed write
817d9f57
JH
2896
2897Used by both server-side and client-side TLS.
059ec3d9
PH
2898*/
2899
2900int
74f1a423 2901tls_write(void * ct_ctx, const uschar *buff, size_t len, BOOL more)
059ec3d9 2902{
d7978c0f 2903int outbytes, error;
74f1a423 2904SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
acec9514 2905static gstring * corked = NULL;
a5ffa9b4 2906
ef698bf6 2907DEBUG(D_tls) debug_printf("%s(%p, %lu%s)\n", __FUNCTION__,
b93be52e 2908 buff, (unsigned long)len, more ? ", more" : "");
a5ffa9b4
JH
2909
2910/* Lacking a CORK or MSG_MORE facility (such as GnuTLS has) we copy data when
2911"more" is notified. This hack is only ok if small amounts are involved AND only
2912one stream does it, in one context (i.e. no store reset). Currently it is used
2913for the responses to the received SMTP MAIL , RCPT, DATA sequence, only. */
ee8b8090
JH
2914/*XXX + if PIPE_COMMAND, banner & ehlo-resp for smmtp-on-connect. Suspect there's
2915a store reset there. */
a5ffa9b4 2916
74f1a423 2917if (!ct_ctx && (more || corked))
a5ffa9b4 2918 {
ee8b8090
JH
2919#ifdef EXPERIMENTAL_PIPE_CONNECT
2920 int save_pool = store_pool;
2921 store_pool = POOL_PERM;
2922#endif
2923
acec9514 2924 corked = string_catn(corked, buff, len);
ee8b8090
JH
2925
2926#ifdef EXPERIMENTAL_PIPE_CONNECT
2927 store_pool = save_pool;
2928#endif
2929
a5ffa9b4
JH
2930 if (more)
2931 return len;
acec9514
JH
2932 buff = CUS corked->s;
2933 len = corked->ptr;
2934 corked = NULL;
a5ffa9b4 2935 }
059ec3d9 2936
d7978c0f 2937for (int left = len; left > 0;)
059ec3d9 2938 {
74f1a423 2939 DEBUG(D_tls) debug_printf("SSL_write(%p, %p, %d)\n", ssl, buff, left);
059ec3d9
PH
2940 outbytes = SSL_write(ssl, CS buff, left);
2941 error = SSL_get_error(ssl, outbytes);
2942 DEBUG(D_tls) debug_printf("outbytes=%d error=%d\n", outbytes, error);
2943 switch (error)
2944 {
2945 case SSL_ERROR_SSL:
0abc5a13 2946 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
96f5fe4c
JH
2947 log_write(0, LOG_MAIN, "TLS error (SSL_write): %s", ssl_errstring);
2948 return -1;
059ec3d9
PH
2949
2950 case SSL_ERROR_NONE:
96f5fe4c
JH
2951 left -= outbytes;
2952 buff += outbytes;
2953 break;
059ec3d9
PH
2954
2955 case SSL_ERROR_ZERO_RETURN:
96f5fe4c
JH
2956 log_write(0, LOG_MAIN, "SSL channel closed on write");
2957 return -1;
059ec3d9 2958
817d9f57 2959 case SSL_ERROR_SYSCALL:
96f5fe4c
JH
2960 log_write(0, LOG_MAIN, "SSL_write: (from %s) syscall: %s",
2961 sender_fullhost ? sender_fullhost : US"<unknown>",
2962 strerror(errno));
2963 return -1;
817d9f57 2964
059ec3d9 2965 default:
96f5fe4c
JH
2966 log_write(0, LOG_MAIN, "SSL_write error %d", error);
2967 return -1;
059ec3d9
PH
2968 }
2969 }
2970return len;
2971}
2972
2973
2974
2975/*************************************************
2976* Close down a TLS session *
2977*************************************************/
2978
2979/* This is also called from within a delivery subprocess forked from the
2980daemon, to shut down the TLS library, without actually doing a shutdown (which
2981would tamper with the SSL session in the parent process).
2982
dec766a1 2983Arguments:
74f1a423 2984 ct_ctx client TLS context pointer, or NULL for the one global server context
dec766a1
WB
2985 shutdown 1 if TLS close-alert is to be sent,
2986 2 if also response to be waited for
2987
059ec3d9 2988Returns: nothing
817d9f57
JH
2989
2990Used by both server-side and client-side TLS.
059ec3d9
PH
2991*/
2992
2993void
74f1a423 2994tls_close(void * ct_ctx, int shutdown)
059ec3d9 2995{
74f1a423
JH
2996exim_openssl_client_tls_ctx * o_ctx = ct_ctx;
2997SSL_CTX **ctxp = o_ctx ? &o_ctx->ctx : &server_ctx;
2998SSL **sslp = o_ctx ? &o_ctx->ssl : &server_ssl;
2999int *fdp = o_ctx ? &tls_out.active.sock : &tls_in.active.sock;
817d9f57
JH
3000
3001if (*fdp < 0) return; /* TLS was not active */
059ec3d9
PH
3002
3003if (shutdown)
3004 {
dec766a1
WB
3005 int rc;
3006 DEBUG(D_tls) debug_printf("tls_close(): shutting down TLS%s\n",
3007 shutdown > 1 ? " (with response-wait)" : "");
3008
3009 if ( (rc = SSL_shutdown(*sslp)) == 0 /* send "close notify" alert */
3010 && shutdown > 1)
3011 {
c2a1bba0 3012 ALARM(2);
dec766a1 3013 rc = SSL_shutdown(*sslp); /* wait for response */
c2a1bba0 3014 ALARM_CLR(0);
dec766a1
WB
3015 }
3016
3017 if (rc < 0) DEBUG(D_tls)
3018 {
0abc5a13 3019 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
dec766a1
WB
3020 debug_printf("SSL_shutdown: %s\n", ssl_errstring);
3021 }
3022 }
3023
37f0ce65 3024#ifndef DISABLE_OCSP
74f1a423 3025if (!o_ctx) /* server side */
dec766a1
WB
3026 {
3027 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
dec766a1 3028 server_static_cbinfo->verify_stack = NULL;
059ec3d9 3029 }
37f0ce65 3030#endif
059ec3d9 3031
dec766a1 3032SSL_CTX_free(*ctxp);
817d9f57 3033SSL_free(*sslp);
dec766a1 3034*ctxp = NULL;
817d9f57 3035*sslp = NULL;
817d9f57 3036*fdp = -1;
059ec3d9
PH
3037}
3038
36f12725
NM
3039
3040
3041
3375e053
PP
3042/*************************************************
3043* Let tls_require_ciphers be checked at startup *
3044*************************************************/
3045
3046/* The tls_require_ciphers option, if set, must be something which the
3047library can parse.
3048
3049Returns: NULL on success, or error message
3050*/
3051
3052uschar *
3053tls_validate_require_cipher(void)
3054{
3055SSL_CTX *ctx;
3056uschar *s, *expciphers, *err;
3057
3058/* this duplicates from tls_init(), we need a better "init just global
3059state, for no specific purpose" singleton function of our own */
3060
7434882d 3061#ifdef EXIM_NEED_OPENSSL_INIT
3375e053
PP
3062SSL_load_error_strings();
3063OpenSSL_add_ssl_algorithms();
7434882d 3064#endif
3375e053
PP
3065#if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
3066/* SHA256 is becoming ever more popular. This makes sure it gets added to the
3067list of available digests. */
3068EVP_add_digest(EVP_sha256());
3069#endif
3070
3071if (!(tls_require_ciphers && *tls_require_ciphers))
3072 return NULL;
3073
cf0c6164
JH
3074if (!expand_check(tls_require_ciphers, US"tls_require_ciphers", &expciphers,
3075 &err))
3375e053
PP
3076 return US"failed to expand tls_require_ciphers";
3077
3078if (!(expciphers && *expciphers))
3079 return NULL;
3080
3081/* normalisation ripped from above */
3082s = expciphers;
3083while (*s != 0) { if (*s == '_') *s = '-'; s++; }
3084
3085err = NULL;
3086
7a8b9519
JH
3087#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
3088if (!(ctx = SSL_CTX_new(TLS_server_method())))
3089#else
3090if (!(ctx = SSL_CTX_new(SSLv23_server_method())))
3091#endif
3375e053 3092 {
0abc5a13 3093 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
3375e053
PP
3094 return string_sprintf("SSL_CTX_new() failed: %s", ssl_errstring);
3095 }
3096
3097DEBUG(D_tls)
3098 debug_printf("tls_require_ciphers expands to \"%s\"\n", expciphers);
3099
3100if (!SSL_CTX_set_cipher_list(ctx, CS expciphers))
3101 {
0abc5a13 3102 ERR_error_string_n(ERR_get_error(), ssl_errstring, sizeof(ssl_errstring));
cf0c6164
JH
3103 err = string_sprintf("SSL_CTX_set_cipher_list(%s) failed: %s",
3104 expciphers, ssl_errstring);
3375e053
PP
3105 }
3106
3107SSL_CTX_free(ctx);
3108
3109return err;
3110}
3111
3112
3113
3114
36f12725
NM
3115/*************************************************
3116* Report the library versions. *
3117*************************************************/
3118
3119/* There have historically been some issues with binary compatibility in
3120OpenSSL libraries; if Exim (like many other applications) is built against
3121one version of OpenSSL but the run-time linker picks up another version,
3122it can result in serious failures, including crashing with a SIGSEGV. So
3123report the version found by the compiler and the run-time version.
3124
f64a1e23
PP
3125Note: some OS vendors backport security fixes without changing the version
3126number/string, and the version date remains unchanged. The _build_ date
3127will change, so we can more usefully assist with version diagnosis by also
3128reporting the build date.
3129
36f12725
NM
3130Arguments: a FILE* to print the results to
3131Returns: nothing
3132*/
3133
3134void
3135tls_version_report(FILE *f)
3136{
754a0503 3137fprintf(f, "Library version: OpenSSL: Compile: %s\n"
f64a1e23
PP
3138 " Runtime: %s\n"
3139 " : %s\n",
754a0503 3140 OPENSSL_VERSION_TEXT,
f64a1e23
PP
3141 SSLeay_version(SSLEAY_VERSION),
3142 SSLeay_version(SSLEAY_BUILT_ON));
3143/* third line is 38 characters for the %s and the line is 73 chars long;
3144the OpenSSL output includes a "built on: " prefix already. */
36f12725
NM
3145}
3146
9e3331ea
TK
3147
3148
3149
3150/*************************************************
17c76198 3151* Random number generation *
9e3331ea
TK
3152*************************************************/
3153
3154/* Pseudo-random number generation. The result is not expected to be
3155cryptographically strong but not so weak that someone will shoot themselves
3156in the foot using it as a nonce in input in some email header scheme or
3157whatever weirdness they'll twist this into. The result should handle fork()
3158and avoid repeating sequences. OpenSSL handles that for us.
3159
3160Arguments:
3161 max range maximum
3162Returns a random number in range [0, max-1]
3163*/
3164
3165int
17c76198 3166vaguely_random_number(int max)
9e3331ea
TK
3167{
3168unsigned int r;
3169int i, needed_len;
de6135a0
PP
3170static pid_t pidlast = 0;
3171pid_t pidnow;
9e3331ea
TK
3172uschar smallbuf[sizeof(r)];
3173
3174if (max <= 1)
3175 return 0;
3176
de6135a0
PP
3177pidnow = getpid();
3178if (pidnow != pidlast)
3179 {
3180 /* Although OpenSSL documents that "OpenSSL makes sure that the PRNG state
3181 is unique for each thread", this doesn't apparently apply across processes,
3182 so our own warning from vaguely_random_number_fallback() applies here too.
3183 Fix per PostgreSQL. */
3184 if (pidlast != 0)
3185 RAND_cleanup();
3186 pidlast = pidnow;
3187 }
3188
9e3331ea
TK
3189/* OpenSSL auto-seeds from /dev/random, etc, but this a double-check. */
3190if (!RAND_status())
3191 {
3192 randstuff r;
3193 gettimeofday(&r.tv, NULL);
3194 r.p = getpid();
3195
5903c6ff 3196 RAND_seed(US (&r), sizeof(r));
9e3331ea
TK
3197 }
3198/* We're after pseudo-random, not random; if we still don't have enough data
3199in the internal PRNG then our options are limited. We could sleep and hope
3200for entropy to come along (prayer technique) but if the system is so depleted
3201in the first place then something is likely to just keep taking it. Instead,
3202we'll just take whatever little bit of pseudo-random we can still manage to
3203get. */
3204
3205needed_len = sizeof(r);
3206/* Don't take 8 times more entropy than needed if int is 8 octets and we were
3207asked for a number less than 10. */
3208for (r = max, i = 0; r; ++i)
3209 r >>= 1;
3210i = (i + 7) / 8;
3211if (i < needed_len)
3212 needed_len = i;
3213
c8dfb21d 3214#ifdef EXIM_HAVE_RAND_PSEUDO
9e3331ea 3215/* We do not care if crypto-strong */
17c76198 3216i = RAND_pseudo_bytes(smallbuf, needed_len);
c8dfb21d
JH
3217#else
3218i = RAND_bytes(smallbuf, needed_len);
3219#endif
3220
17c76198
PP
3221if (i < 0)
3222 {
3223 DEBUG(D_all)
3224 debug_printf("OpenSSL RAND_pseudo_bytes() not supported by RAND method, using fallback.\n");
3225 return vaguely_random_number_fallback(max);
3226 }
3227
9e3331ea 3228r = 0;
d7978c0f
JH
3229for (uschar * p = smallbuf; needed_len; --needed_len, ++p)
3230 r = 256 * r + *p;
9e3331ea
TK
3231
3232/* We don't particularly care about weighted results; if someone wants
3233smooth distribution and cares enough then they should submit a patch then. */
3234return r % max;
3235}
3236
77bb000f
PP
3237
3238
3239
3240/*************************************************
3241* OpenSSL option parse *
3242*************************************************/
3243
3244/* Parse one option for tls_openssl_options_parse below
3245
3246Arguments:
3247 name one option name
3248 value place to store a value for it
3249Returns success or failure in parsing
3250*/
3251
77bb000f 3252
c80c5570 3253
77bb000f
PP
3254static BOOL
3255tls_openssl_one_option_parse(uschar *name, long *value)
3256{
3257int first = 0;
3258int last = exim_openssl_options_size;
3259while (last > first)
3260 {
3261 int middle = (first + last)/2;
3262 int c = Ustrcmp(name, exim_openssl_options[middle].name);
3263 if (c == 0)
3264 {
3265 *value = exim_openssl_options[middle].value;
3266 return TRUE;
3267 }
3268 else if (c > 0)
3269 first = middle + 1;
3270 else
3271 last = middle;
3272 }
3273return FALSE;
3274}
3275
3276
3277
3278
3279/*************************************************
3280* OpenSSL option parsing logic *
3281*************************************************/
3282
3283/* OpenSSL has a number of compatibility options which an administrator might
3284reasonably wish to set. Interpret a list similarly to decode_bits(), so that
3285we look like log_selector.
3286
3287Arguments:
3288 option_spec the administrator-supplied string of options
3289 results ptr to long storage for the options bitmap
3290Returns success or failure
3291*/
3292
3293BOOL
3294tls_openssl_options_parse(uschar *option_spec, long *results)
3295{
3296long result, item;
d7978c0f 3297uschar *end;
77bb000f
PP
3298uschar keep_c;
3299BOOL adding, item_parsed;
3300
7006ee24 3301result = SSL_OP_NO_TICKET;
b1770b6e 3302/* Prior to 4.80 we or'd in SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; removed
da3ad30d 3303 * from default because it increases BEAST susceptibility. */
f0f5a555
PP
3304#ifdef SSL_OP_NO_SSLv2
3305result |= SSL_OP_NO_SSLv2;
3306#endif
a57b6200
JH
3307#ifdef SSL_OP_SINGLE_DH_USE
3308result |= SSL_OP_SINGLE_DH_USE;
3309#endif
77bb000f 3310
7006ee24 3311if (!option_spec)
77bb000f
PP
3312 {
3313 *results = result;
3314 return TRUE;
3315 }
3316
d7978c0f 3317for (uschar * s = option_spec; *s != '\0'; /**/)
77bb000f
PP
3318 {
3319 while (isspace(*s)) ++s;
3320 if (*s == '\0')
3321 break;
3322 if (*s != '+' && *s != '-')
3323 {
3324 DEBUG(D_tls) debug_printf("malformed openssl option setting: "
0e944a0d 3325 "+ or - expected but found \"%s\"\n", s);
77bb000f
PP
3326 return FALSE;
3327 }
3328 adding = *s++ == '+';
3329 for (end = s; (*end != '\0') && !isspace(*end); ++end) /**/ ;
3330 keep_c = *end;
3331 *end = '\0';
3332 item_parsed = tls_openssl_one_option_parse(s, &item);
96f5fe4c 3333 *end = keep_c;
77bb000f
PP
3334 if (!item_parsed)
3335 {
0e944a0d 3336 DEBUG(D_tls) debug_printf("openssl option setting unrecognised: \"%s\"\n", s);
77bb000f
PP
3337 return FALSE;
3338 }
3339 DEBUG(D_tls) debug_printf("openssl option, %s from %lx: %lx (%s)\n",
3340 adding ? "adding" : "removing", result, item, s);
3341 if (adding)
3342 result |= item;
3343 else
3344 result &= ~item;
77bb000f
PP
3345 s = end;
3346 }
3347
3348*results = result;
3349return TRUE;
3350}
3351
8442641e 3352#endif /*!MACRO_PREDEF*/
9d1c15ef
JH
3353/* vi: aw ai sw=2
3354*/
059ec3d9 3355/* End of tls-openssl.c */