81372cfaac91746561511cee43f823af8330478a
[exim.git] / src / src / tls-openssl.c
1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
4
5 /* Copyright (c) University of Cambridge 1995 - 2018 */
6 /* See the file NOTICE for conditions of use and distribution. */
7
8 /* Portions Copyright (c) The OpenSSL Project 1999 */
9
10 /* This module provides the TLS (aka SSL) support for Exim using the OpenSSL
11 library. It is #included into the tls.c file when that library is used. The
12 code herein is based on a patch that was originally contributed by Steve
13 Haslam. It was adapted from stunnel, a GPL program by Michal Trojnara.
14
15 No cryptographic code is included in Exim. All this module does is to call
16 functions from the OpenSSL library. */
17
18
19 /* Heading stuff */
20
21 #include <openssl/lhash.h>
22 #include <openssl/ssl.h>
23 #include <openssl/err.h>
24 #include <openssl/rand.h>
25 #ifndef OPENSSL_NO_ECDH
26 # include <openssl/ec.h>
27 #endif
28 #ifndef DISABLE_OCSP
29 # include <openssl/ocsp.h>
30 #endif
31 #ifdef SUPPORT_DANE
32 # include "danessl.h"
33 #endif
34
35
36 #ifndef DISABLE_OCSP
37 # define EXIM_OCSP_SKEW_SECONDS (300L)
38 # define EXIM_OCSP_MAX_AGE (-1L)
39 #endif
40
41 #if OPENSSL_VERSION_NUMBER >= 0x0090806fL && !defined(OPENSSL_NO_TLSEXT)
42 # define EXIM_HAVE_OPENSSL_TLSEXT
43 #endif
44 #if OPENSSL_VERSION_NUMBER >= 0x00908000L
45 # define EXIM_HAVE_RSA_GENKEY_EX
46 #endif
47 #if OPENSSL_VERSION_NUMBER >= 0x10100000L
48 # define EXIM_HAVE_OCSP_RESP_COUNT
49 #else
50 # define EXIM_HAVE_EPHEM_RSA_KEX
51 # define EXIM_HAVE_RAND_PSEUDO
52 #endif
53 #if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
54 # define EXIM_HAVE_SHA256
55 #endif
56
57 /*
58 * X509_check_host provides sane certificate hostname checking, but was added
59 * to OpenSSL late, after other projects forked off the code-base. So in
60 * addition to guarding against the base version number, beware that LibreSSL
61 * does not (at this time) support this function.
62 *
63 * If LibreSSL gains a different API, perhaps via libtls, then we'll probably
64 * opt to disentangle and ask a LibreSSL user to provide glue for a third
65 * crypto provider for libtls instead of continuing to tie the OpenSSL glue
66 * into even twistier knots. If LibreSSL gains the same API, we can just
67 * change this guard and punt the issue for a while longer.
68 */
69 #ifndef LIBRESSL_VERSION_NUMBER
70 # if OPENSSL_VERSION_NUMBER >= 0x010100000L
71 # define EXIM_HAVE_OPENSSL_CHECKHOST
72 # define EXIM_HAVE_OPENSSL_DH_BITS
73 # define EXIM_HAVE_OPENSSL_TLS_METHOD
74 # endif
75 # if OPENSSL_VERSION_NUMBER >= 0x010000000L \
76 && (OPENSSL_VERSION_NUMBER & 0x0000ff000L) >= 0x000002000L
77 # define EXIM_HAVE_OPENSSL_CHECKHOST
78 # endif
79 #endif
80
81 #if !defined(LIBRESSL_VERSION_NUMBER) \
82 || LIBRESSL_VERSION_NUMBER >= 0x20010000L
83 # if !defined(OPENSSL_NO_ECDH)
84 # if OPENSSL_VERSION_NUMBER >= 0x0090800fL
85 # define EXIM_HAVE_ECDH
86 # endif
87 # if OPENSSL_VERSION_NUMBER >= 0x10002000L
88 # define EXIM_HAVE_OPENSSL_EC_NIST2NID
89 # endif
90 # endif
91 #endif
92
93 #if !defined(EXIM_HAVE_OPENSSL_TLSEXT) && !defined(DISABLE_OCSP)
94 # warning "OpenSSL library version too old; define DISABLE_OCSP in Makefile"
95 # define DISABLE_OCSP
96 #endif
97
98 #ifdef EXIM_HAVE_OPENSSL_CHECKHOST
99 # include <openssl/x509v3.h>
100 #endif
101
102 /*************************************************
103 * OpenSSL option parse *
104 *************************************************/
105
106 typedef struct exim_openssl_option {
107 uschar *name;
108 long value;
109 } exim_openssl_option;
110 /* We could use a macro to expand, but we need the ifdef and not all the
111 options document which version they were introduced in. Policylet: include
112 all options unless explicitly for DTLS, let the administrator choose which
113 to apply.
114
115 This list is current as of:
116 ==> 1.0.1b <==
117 Plus SSL_OP_SAFARI_ECDHE_ECDSA_BUG from 2013-June patch/discussion on openssl-dev
118 Plus SSL_OP_NO_TLSv1_3 for 1.1.2-dev
119 */
120 static exim_openssl_option exim_openssl_options[] = {
121 /* KEEP SORTED ALPHABETICALLY! */
122 #ifdef SSL_OP_ALL
123 { US"all", SSL_OP_ALL },
124 #endif
125 #ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
126 { US"allow_unsafe_legacy_renegotiation", SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION },
127 #endif
128 #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
129 { US"cipher_server_preference", SSL_OP_CIPHER_SERVER_PREFERENCE },
130 #endif
131 #ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
132 { US"dont_insert_empty_fragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS },
133 #endif
134 #ifdef SSL_OP_EPHEMERAL_RSA
135 { US"ephemeral_rsa", SSL_OP_EPHEMERAL_RSA },
136 #endif
137 #ifdef SSL_OP_LEGACY_SERVER_CONNECT
138 { US"legacy_server_connect", SSL_OP_LEGACY_SERVER_CONNECT },
139 #endif
140 #ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
141 { US"microsoft_big_sslv3_buffer", SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER },
142 #endif
143 #ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
144 { US"microsoft_sess_id_bug", SSL_OP_MICROSOFT_SESS_ID_BUG },
145 #endif
146 #ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING
147 { US"msie_sslv2_rsa_padding", SSL_OP_MSIE_SSLV2_RSA_PADDING },
148 #endif
149 #ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
150 { US"netscape_challenge_bug", SSL_OP_NETSCAPE_CHALLENGE_BUG },
151 #endif
152 #ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
153 { US"netscape_reuse_cipher_change_bug", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
154 #endif
155 #ifdef SSL_OP_NO_COMPRESSION
156 { US"no_compression", SSL_OP_NO_COMPRESSION },
157 #endif
158 #ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
159 { US"no_session_resumption_on_renegotiation", SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION },
160 #endif
161 #ifdef SSL_OP_NO_SSLv2
162 { US"no_sslv2", SSL_OP_NO_SSLv2 },
163 #endif
164 #ifdef SSL_OP_NO_SSLv3
165 { US"no_sslv3", SSL_OP_NO_SSLv3 },
166 #endif
167 #ifdef SSL_OP_NO_TICKET
168 { US"no_ticket", SSL_OP_NO_TICKET },
169 #endif
170 #ifdef SSL_OP_NO_TLSv1
171 { US"no_tlsv1", SSL_OP_NO_TLSv1 },
172 #endif
173 #ifdef SSL_OP_NO_TLSv1_1
174 #if SSL_OP_NO_TLSv1_1 == 0x00000400L
175 /* Error in chosen value in 1.0.1a; see first item in CHANGES for 1.0.1b */
176 #warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring
177 #else
178 { US"no_tlsv1_1", SSL_OP_NO_TLSv1_1 },
179 #endif
180 #endif
181 #ifdef SSL_OP_NO_TLSv1_2
182 { US"no_tlsv1_2", SSL_OP_NO_TLSv1_2 },
183 #endif
184 #ifdef SSL_OP_NO_TLSv1_3
185 { US"no_tlsv1_3", SSL_OP_NO_TLSv1_3 },
186 #endif
187 #ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG
188 { US"safari_ecdhe_ecdsa_bug", SSL_OP_SAFARI_ECDHE_ECDSA_BUG },
189 #endif
190 #ifdef SSL_OP_SINGLE_DH_USE
191 { US"single_dh_use", SSL_OP_SINGLE_DH_USE },
192 #endif
193 #ifdef SSL_OP_SINGLE_ECDH_USE
194 { US"single_ecdh_use", SSL_OP_SINGLE_ECDH_USE },
195 #endif
196 #ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG
197 { US"ssleay_080_client_dh_bug", SSL_OP_SSLEAY_080_CLIENT_DH_BUG },
198 #endif
199 #ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
200 { US"sslref2_reuse_cert_type_bug", SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG },
201 #endif
202 #ifdef SSL_OP_TLS_BLOCK_PADDING_BUG
203 { US"tls_block_padding_bug", SSL_OP_TLS_BLOCK_PADDING_BUG },
204 #endif
205 #ifdef SSL_OP_TLS_D5_BUG
206 { US"tls_d5_bug", SSL_OP_TLS_D5_BUG },
207 #endif
208 #ifdef SSL_OP_TLS_ROLLBACK_BUG
209 { US"tls_rollback_bug", SSL_OP_TLS_ROLLBACK_BUG },
210 #endif
211 };
212
213 #ifndef MACRO_PREDEF
214 static int exim_openssl_options_size = nelem(exim_openssl_options);
215 #endif
216
217 #ifdef MACRO_PREDEF
218 void
219 options_tls(void)
220 {
221 struct exim_openssl_option * o;
222 uschar buf[64];
223
224 for (o = exim_openssl_options;
225 o < exim_openssl_options + nelem(exim_openssl_options); o++)
226 {
227 /* Trailing X is workaround for problem with _OPT_OPENSSL_NO_TLSV1
228 being a ".ifdef _OPT_OPENSSL_NO_TLSV1_3" match */
229
230 spf(buf, sizeof(buf), US"_OPT_OPENSSL_%T_X", o->name);
231 builtin_macro_create(buf);
232 }
233 }
234 #else
235
236 /******************************************************************************/
237
238 /* Structure for collecting random data for seeding. */
239
240 typedef struct randstuff {
241 struct timeval tv;
242 pid_t p;
243 } randstuff;
244
245 /* Local static variables */
246
247 static BOOL client_verify_callback_called = FALSE;
248 static BOOL server_verify_callback_called = FALSE;
249 static const uschar *sid_ctx = US"exim";
250
251 /* We have three different contexts to care about.
252
253 Simple case: client, `client_ctx`
254 As a client, we can be doing a callout or cut-through delivery while receiving
255 a message. So we have a client context, which should have options initialised
256 from the SMTP Transport. We may also concurrently want to make TLS connections
257 to utility daemons, so client-contexts are allocated and passed around in call
258 args rather than using a gobal.
259
260 Server:
261 There are two cases: with and without ServerNameIndication from the client.
262 Given TLS SNI, we can be using different keys, certs and various other
263 configuration settings, because they're re-expanded with $tls_sni set. This
264 allows vhosting with TLS. This SNI is sent in the handshake.
265 A client might not send SNI, so we need a fallback, and an initial setup too.
266 So as a server, we start out using `server_ctx`.
267 If SNI is sent by the client, then we as server, mid-negotiation, try to clone
268 `server_sni` from `server_ctx` and then initialise settings by re-expanding
269 configuration.
270 */
271
272 typedef struct {
273 SSL_CTX * ctx;
274 SSL * ssl;
275 } exim_openssl_client_tls_ctx;
276
277 static SSL_CTX *server_ctx = NULL;
278 static SSL *server_ssl = NULL;
279
280 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
281 static SSL_CTX *server_sni = NULL;
282 #endif
283
284 static char ssl_errstring[256];
285
286 static int ssl_session_timeout = 200;
287 static BOOL client_verify_optional = FALSE;
288 static BOOL server_verify_optional = FALSE;
289
290 static BOOL reexpand_tls_files_for_sni = FALSE;
291
292
293 typedef struct tls_ext_ctx_cb {
294 uschar *certificate;
295 uschar *privatekey;
296 BOOL is_server;
297 #ifndef DISABLE_OCSP
298 STACK_OF(X509) *verify_stack; /* chain for verifying the proof */
299 union {
300 struct {
301 uschar *file;
302 uschar *file_expanded;
303 OCSP_RESPONSE *response;
304 } server;
305 struct {
306 X509_STORE *verify_store; /* non-null if status requested */
307 BOOL verify_required;
308 } client;
309 } u_ocsp;
310 #endif
311 uschar *dhparam;
312 /* these are cached from first expand */
313 uschar *server_cipher_list;
314 /* only passed down to tls_error: */
315 host_item *host;
316 const uschar * verify_cert_hostnames;
317 #ifndef DISABLE_EVENT
318 uschar * event_action;
319 #endif
320 } tls_ext_ctx_cb;
321
322 /* should figure out a cleanup of API to handle state preserved per
323 implementation, for various reasons, which can be void * in the APIs.
324 For now, we hack around it. */
325 tls_ext_ctx_cb *client_static_cbinfo = NULL;
326 tls_ext_ctx_cb *server_static_cbinfo = NULL;
327
328 static int
329 setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
330 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr );
331
332 /* Callbacks */
333 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
334 static int tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg);
335 #endif
336 #ifndef DISABLE_OCSP
337 static int tls_server_stapling_cb(SSL *s, void *arg);
338 #endif
339
340
341 /*************************************************
342 * Handle TLS error *
343 *************************************************/
344
345 /* Called from lots of places when errors occur before actually starting to do
346 the TLS handshake, that is, while the session is still in clear. Always returns
347 DEFER for a server and FAIL for a client so that most calls can use "return
348 tls_error(...)" to do this processing and then give an appropriate return. A
349 single function is used for both server and client, because it is called from
350 some shared functions.
351
352 Argument:
353 prefix text to include in the logged error
354 host NULL if setting up a server;
355 the connected host if setting up a client
356 msg error message or NULL if we should ask OpenSSL
357 errstr pointer to output error message
358
359 Returns: OK/DEFER/FAIL
360 */
361
362 static int
363 tls_error(uschar * prefix, const host_item * host, uschar * msg, uschar ** errstr)
364 {
365 if (!msg)
366 {
367 ERR_error_string(ERR_get_error(), ssl_errstring);
368 msg = US ssl_errstring;
369 }
370
371 if (errstr) *errstr = string_sprintf("(%s): %s", prefix, msg);
372 return host ? FAIL : DEFER;
373 }
374
375
376
377 /*************************************************
378 * Callback to generate RSA key *
379 *************************************************/
380
381 /*
382 Arguments:
383 s SSL connection (not used)
384 export not used
385 keylength keylength
386
387 Returns: pointer to generated key
388 */
389
390 static RSA *
391 rsa_callback(SSL *s, int export, int keylength)
392 {
393 RSA *rsa_key;
394 #ifdef EXIM_HAVE_RSA_GENKEY_EX
395 BIGNUM *bn = BN_new();
396 #endif
397
398 export = export; /* Shut picky compilers up */
399 DEBUG(D_tls) debug_printf("Generating %d bit RSA key...\n", keylength);
400
401 #ifdef EXIM_HAVE_RSA_GENKEY_EX
402 if ( !BN_set_word(bn, (unsigned long)RSA_F4)
403 || !(rsa_key = RSA_new())
404 || !RSA_generate_key_ex(rsa_key, keylength, bn, NULL)
405 )
406 #else
407 if (!(rsa_key = RSA_generate_key(keylength, RSA_F4, NULL, NULL)))
408 #endif
409
410 {
411 ERR_error_string(ERR_get_error(), ssl_errstring);
412 log_write(0, LOG_MAIN|LOG_PANIC, "TLS error (RSA_generate_key): %s",
413 ssl_errstring);
414 return NULL;
415 }
416 return rsa_key;
417 }
418
419
420
421 /* Extreme debug
422 #ifndef DISABLE_OCSP
423 void
424 x509_store_dump_cert_s_names(X509_STORE * store)
425 {
426 STACK_OF(X509_OBJECT) * roots= store->objs;
427 int i;
428 static uschar name[256];
429
430 for(i= 0; i<sk_X509_OBJECT_num(roots); i++)
431 {
432 X509_OBJECT * tmp_obj= sk_X509_OBJECT_value(roots, i);
433 if(tmp_obj->type == X509_LU_X509)
434 {
435 X509 * current_cert= tmp_obj->data.x509;
436 X509_NAME_oneline(X509_get_subject_name(current_cert), CS name, sizeof(name));
437 name[sizeof(name)-1] = '\0';
438 debug_printf(" %s\n", name);
439 }
440 }
441 }
442 #endif
443 */
444
445
446 #ifndef DISABLE_EVENT
447 static int
448 verify_event(tls_support * tlsp, X509 * cert, int depth, const uschar * dn,
449 BOOL *calledp, const BOOL *optionalp, const uschar * what)
450 {
451 uschar * ev;
452 uschar * yield;
453 X509 * old_cert;
454
455 ev = tlsp == &tls_out ? client_static_cbinfo->event_action : event_action;
456 if (ev)
457 {
458 DEBUG(D_tls) debug_printf("verify_event: %s %d\n", what, depth);
459 old_cert = tlsp->peercert;
460 tlsp->peercert = X509_dup(cert);
461 /* NB we do not bother setting peerdn */
462 if ((yield = event_raise(ev, US"tls:cert", string_sprintf("%d", depth))))
463 {
464 log_write(0, LOG_MAIN, "[%s] %s verify denied by event-action: "
465 "depth=%d cert=%s: %s",
466 tlsp == &tls_out ? deliver_host_address : sender_host_address,
467 what, depth, dn, yield);
468 *calledp = TRUE;
469 if (!*optionalp)
470 {
471 if (old_cert) tlsp->peercert = old_cert; /* restore 1st failing cert */
472 return 1; /* reject (leaving peercert set) */
473 }
474 DEBUG(D_tls) debug_printf("Event-action verify failure overridden "
475 "(host in tls_try_verify_hosts)\n");
476 }
477 X509_free(tlsp->peercert);
478 tlsp->peercert = old_cert;
479 }
480 return 0;
481 }
482 #endif
483
484 /*************************************************
485 * Callback for verification *
486 *************************************************/
487
488 /* The SSL library does certificate verification if set up to do so. This
489 callback has the current yes/no state is in "state". If verification succeeded,
490 we set the certificate-verified flag. If verification failed, what happens
491 depends on whether the client is required to present a verifiable certificate
492 or not.
493
494 If verification is optional, we change the state to yes, but still log the
495 verification error. For some reason (it really would help to have proper
496 documentation of OpenSSL), this callback function then gets called again, this
497 time with state = 1. We must take care not to set the private verified flag on
498 the second time through.
499
500 Note: this function is not called if the client fails to present a certificate
501 when asked. We get here only if a certificate has been received. Handling of
502 optional verification for this case is done when requesting SSL to verify, by
503 setting SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the non-optional case.
504
505 May be called multiple times for different issues with a certificate, even
506 for a given "depth" in the certificate chain.
507
508 Arguments:
509 preverify_ok current yes/no state as 1/0
510 x509ctx certificate information.
511 tlsp per-direction (client vs. server) support data
512 calledp has-been-called flag
513 optionalp verification-is-optional flag
514
515 Returns: 0 if verification should fail, otherwise 1
516 */
517
518 static int
519 verify_callback(int preverify_ok, X509_STORE_CTX *x509ctx,
520 tls_support *tlsp, BOOL *calledp, BOOL *optionalp)
521 {
522 X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
523 int depth = X509_STORE_CTX_get_error_depth(x509ctx);
524 uschar dn[256];
525
526 X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
527 dn[sizeof(dn)-1] = '\0';
528
529 if (preverify_ok == 0)
530 {
531 uschar * extra = verify_mode ? string_sprintf(" (during %c-verify for [%s])",
532 *verify_mode, sender_host_address)
533 : US"";
534 log_write(0, LOG_MAIN, "[%s] SSL verify error%s: depth=%d error=%s cert=%s",
535 tlsp == &tls_out ? deliver_host_address : sender_host_address,
536 extra, depth,
537 X509_verify_cert_error_string(X509_STORE_CTX_get_error(x509ctx)), dn);
538 *calledp = TRUE;
539 if (!*optionalp)
540 {
541 if (!tlsp->peercert)
542 tlsp->peercert = X509_dup(cert); /* record failing cert */
543 return 0; /* reject */
544 }
545 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
546 "tls_try_verify_hosts)\n");
547 }
548
549 else if (depth != 0)
550 {
551 DEBUG(D_tls) debug_printf("SSL verify ok: depth=%d SN=%s\n", depth, dn);
552 #ifndef DISABLE_OCSP
553 if (tlsp == &tls_out && client_static_cbinfo->u_ocsp.client.verify_store)
554 { /* client, wanting stapling */
555 /* Add the server cert's signing chain as the one
556 for the verification of the OCSP stapled information. */
557
558 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
559 cert))
560 ERR_clear_error();
561 sk_X509_push(client_static_cbinfo->verify_stack, cert);
562 }
563 #endif
564 #ifndef DISABLE_EVENT
565 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
566 return 0; /* reject, with peercert set */
567 #endif
568 }
569 else
570 {
571 const uschar * verify_cert_hostnames;
572
573 if ( tlsp == &tls_out
574 && ((verify_cert_hostnames = client_static_cbinfo->verify_cert_hostnames)))
575 /* client, wanting hostname check */
576 {
577
578 #ifdef EXIM_HAVE_OPENSSL_CHECKHOST
579 # ifndef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
580 # define X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 0
581 # endif
582 # ifndef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
583 # define X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS 0
584 # endif
585 int sep = 0;
586 const uschar * list = verify_cert_hostnames;
587 uschar * name;
588 int rc;
589 while ((name = string_nextinlist(&list, &sep, NULL, 0)))
590 if ((rc = X509_check_host(cert, CCS name, 0,
591 X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
592 | X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS,
593 NULL)))
594 {
595 if (rc < 0)
596 {
597 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
598 tlsp == &tls_out ? deliver_host_address : sender_host_address);
599 name = NULL;
600 }
601 break;
602 }
603 if (!name)
604 #else
605 if (!tls_is_name_for_cert(verify_cert_hostnames, cert))
606 #endif
607 {
608 uschar * extra = verify_mode
609 ? string_sprintf(" (during %c-verify for [%s])",
610 *verify_mode, sender_host_address)
611 : US"";
612 log_write(0, LOG_MAIN,
613 "[%s] SSL verify error%s: certificate name mismatch: DN=\"%s\" H=\"%s\"",
614 tlsp == &tls_out ? deliver_host_address : sender_host_address,
615 extra, dn, verify_cert_hostnames);
616 *calledp = TRUE;
617 if (!*optionalp)
618 {
619 if (!tlsp->peercert)
620 tlsp->peercert = X509_dup(cert); /* record failing cert */
621 return 0; /* reject */
622 }
623 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
624 "tls_try_verify_hosts)\n");
625 }
626 }
627
628 #ifndef DISABLE_EVENT
629 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
630 return 0; /* reject, with peercert set */
631 #endif
632
633 DEBUG(D_tls) debug_printf("SSL%s verify ok: depth=0 SN=%s\n",
634 *calledp ? "" : " authenticated", dn);
635 if (!*calledp) tlsp->certificate_verified = TRUE;
636 *calledp = TRUE;
637 }
638
639 return 1; /* accept, at least for this level */
640 }
641
642 static int
643 verify_callback_client(int preverify_ok, X509_STORE_CTX *x509ctx)
644 {
645 return verify_callback(preverify_ok, x509ctx, &tls_out,
646 &client_verify_callback_called, &client_verify_optional);
647 }
648
649 static int
650 verify_callback_server(int preverify_ok, X509_STORE_CTX *x509ctx)
651 {
652 return verify_callback(preverify_ok, x509ctx, &tls_in,
653 &server_verify_callback_called, &server_verify_optional);
654 }
655
656
657 #ifdef SUPPORT_DANE
658
659 /* This gets called *by* the dane library verify callback, which interposes
660 itself.
661 */
662 static int
663 verify_callback_client_dane(int preverify_ok, X509_STORE_CTX * x509ctx)
664 {
665 X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
666 uschar dn[256];
667 int depth = X509_STORE_CTX_get_error_depth(x509ctx);
668 #ifndef DISABLE_EVENT
669 BOOL dummy_called, optional = FALSE;
670 #endif
671
672 X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
673 dn[sizeof(dn)-1] = '\0';
674
675 DEBUG(D_tls) debug_printf("verify_callback_client_dane: %s depth %d %s\n",
676 preverify_ok ? "ok":"BAD", depth, dn);
677
678 #ifndef DISABLE_EVENT
679 if (verify_event(&tls_out, cert, depth, dn,
680 &dummy_called, &optional, US"DANE"))
681 return 0; /* reject, with peercert set */
682 #endif
683
684 if (preverify_ok == 1)
685 {
686 tls_out.dane_verified = tls_out.certificate_verified = TRUE;
687 #ifndef DISABLE_OCSP
688 if (client_static_cbinfo->u_ocsp.client.verify_store)
689 { /* client, wanting stapling */
690 /* Add the server cert's signing chain as the one
691 for the verification of the OCSP stapled information. */
692
693 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
694 cert))
695 ERR_clear_error();
696 sk_X509_push(client_static_cbinfo->verify_stack, cert);
697 }
698 #endif
699 }
700 else
701 {
702 int err = X509_STORE_CTX_get_error(x509ctx);
703 DEBUG(D_tls)
704 debug_printf(" - err %d '%s'\n", err, X509_verify_cert_error_string(err));
705 if (err == X509_V_ERR_APPLICATION_VERIFICATION)
706 preverify_ok = 1;
707 }
708 return preverify_ok;
709 }
710
711 #endif /*SUPPORT_DANE*/
712
713
714 /*************************************************
715 * Information callback *
716 *************************************************/
717
718 /* The SSL library functions call this from time to time to indicate what they
719 are doing. We copy the string to the debugging output when TLS debugging has
720 been requested.
721
722 Arguments:
723 s the SSL connection
724 where
725 ret
726
727 Returns: nothing
728 */
729
730 static void
731 info_callback(SSL *s, int where, int ret)
732 {
733 where = where;
734 ret = ret;
735 DEBUG(D_tls) debug_printf("SSL info: %s\n", SSL_state_string_long(s));
736 }
737
738
739
740 /*************************************************
741 * Initialize for DH *
742 *************************************************/
743
744 /* If dhparam is set, expand it, and load up the parameters for DH encryption.
745
746 Arguments:
747 sctx The current SSL CTX (inbound or outbound)
748 dhparam DH parameter file or fixed parameter identity string
749 host connected host, if client; NULL if server
750 errstr error string pointer
751
752 Returns: TRUE if OK (nothing to set up, or setup worked)
753 */
754
755 static BOOL
756 init_dh(SSL_CTX *sctx, uschar *dhparam, const host_item *host, uschar ** errstr)
757 {
758 BIO *bio;
759 DH *dh;
760 uschar *dhexpanded;
761 const char *pem;
762 int dh_bitsize;
763
764 if (!expand_check(dhparam, US"tls_dhparam", &dhexpanded, errstr))
765 return FALSE;
766
767 if (!dhexpanded || !*dhexpanded)
768 bio = BIO_new_mem_buf(CS std_dh_prime_default(), -1);
769 else if (dhexpanded[0] == '/')
770 {
771 if (!(bio = BIO_new_file(CS dhexpanded, "r")))
772 {
773 tls_error(string_sprintf("could not read dhparams file %s", dhexpanded),
774 host, US strerror(errno), errstr);
775 return FALSE;
776 }
777 }
778 else
779 {
780 if (Ustrcmp(dhexpanded, "none") == 0)
781 {
782 DEBUG(D_tls) debug_printf("Requested no DH parameters.\n");
783 return TRUE;
784 }
785
786 if (!(pem = std_dh_prime_named(dhexpanded)))
787 {
788 tls_error(string_sprintf("Unknown standard DH prime \"%s\"", dhexpanded),
789 host, US strerror(errno), errstr);
790 return FALSE;
791 }
792 bio = BIO_new_mem_buf(CS pem, -1);
793 }
794
795 if (!(dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL)))
796 {
797 BIO_free(bio);
798 tls_error(string_sprintf("Could not read tls_dhparams \"%s\"", dhexpanded),
799 host, NULL, errstr);
800 return FALSE;
801 }
802
803 /* note: our default limit of 2236 is not a multiple of 8; the limit comes from
804 * an NSS limit, and the GnuTLS APIs handle bit-sizes fine, so we went with
805 * 2236. But older OpenSSL can only report in bytes (octets), not bits.
806 * If someone wants to dance at the edge, then they can raise the limit or use
807 * current libraries. */
808 #ifdef EXIM_HAVE_OPENSSL_DH_BITS
809 /* Added in commit 26c79d5641d; `git describe --contains` says OpenSSL_1_1_0-pre1~1022
810 * This predates OpenSSL_1_1_0 (before a, b, ...) so is in all 1.1.0 */
811 dh_bitsize = DH_bits(dh);
812 #else
813 dh_bitsize = 8 * DH_size(dh);
814 #endif
815
816 /* Even if it is larger, we silently return success rather than cause things
817 * to fail out, so that a too-large DH will not knock out all TLS; it's a
818 * debatable choice. */
819 if (dh_bitsize > tls_dh_max_bits)
820 {
821 DEBUG(D_tls)
822 debug_printf("dhparams file %d bits, is > tls_dh_max_bits limit of %d\n",
823 dh_bitsize, tls_dh_max_bits);
824 }
825 else
826 {
827 SSL_CTX_set_tmp_dh(sctx, dh);
828 DEBUG(D_tls)
829 debug_printf("Diffie-Hellman initialized from %s with %d-bit prime\n",
830 dhexpanded ? dhexpanded : US"default", dh_bitsize);
831 }
832
833 DH_free(dh);
834 BIO_free(bio);
835
836 return TRUE;
837 }
838
839
840
841
842 /*************************************************
843 * Initialize for ECDH *
844 *************************************************/
845
846 /* Load parameters for ECDH encryption.
847
848 For now, we stick to NIST P-256 because: it's simple and easy to configure;
849 it avoids any patent issues that might bite redistributors; despite events in
850 the news and concerns over curve choices, we're not cryptographers, we're not
851 pretending to be, and this is "good enough" to be better than no support,
852 protecting against most adversaries. Given another year or two, there might
853 be sufficient clarity about a "right" way forward to let us make an informed
854 decision, instead of a knee-jerk reaction.
855
856 Longer-term, we should look at supporting both various named curves and
857 external files generated with "openssl ecparam", much as we do for init_dh().
858 We should also support "none" as a value, to explicitly avoid initialisation.
859
860 Patches welcome.
861
862 Arguments:
863 sctx The current SSL CTX (inbound or outbound)
864 host connected host, if client; NULL if server
865 errstr error string pointer
866
867 Returns: TRUE if OK (nothing to set up, or setup worked)
868 */
869
870 static BOOL
871 init_ecdh(SSL_CTX * sctx, host_item * host, uschar ** errstr)
872 {
873 #ifdef OPENSSL_NO_ECDH
874 return TRUE;
875 #else
876
877 EC_KEY * ecdh;
878 uschar * exp_curve;
879 int nid;
880 BOOL rv;
881
882 if (host) /* No ECDH setup for clients, only for servers */
883 return TRUE;
884
885 # ifndef EXIM_HAVE_ECDH
886 DEBUG(D_tls)
887 debug_printf("No OpenSSL API to define ECDH parameters, skipping\n");
888 return TRUE;
889 # else
890
891 if (!expand_check(tls_eccurve, US"tls_eccurve", &exp_curve, errstr))
892 return FALSE;
893 if (!exp_curve || !*exp_curve)
894 return TRUE;
895
896 /* "auto" needs to be handled carefully.
897 * OpenSSL < 1.0.2: we do not select anything, but fallback to prime256v1
898 * OpenSSL < 1.1.0: we have to call SSL_CTX_set_ecdh_auto
899 * (openssl/ssl.h defines SSL_CTRL_SET_ECDH_AUTO)
900 * OpenSSL >= 1.1.0: we do not set anything, the libray does autoselection
901 * https://github.com/openssl/openssl/commit/fe6ef2472db933f01b59cad82aa925736935984b
902 */
903 if (Ustrcmp(exp_curve, "auto") == 0)
904 {
905 #if OPENSSL_VERSION_NUMBER < 0x10002000L
906 DEBUG(D_tls) debug_printf(
907 "ECDH OpenSSL < 1.0.2: temp key parameter settings: overriding \"auto\" with \"prime256v1\"\n");
908 exp_curve = US"prime256v1";
909 #else
910 # if defined SSL_CTRL_SET_ECDH_AUTO
911 DEBUG(D_tls) debug_printf(
912 "ECDH OpenSSL 1.0.2+ temp key parameter settings: autoselection\n");
913 SSL_CTX_set_ecdh_auto(sctx, 1);
914 return TRUE;
915 # else
916 DEBUG(D_tls) debug_printf(
917 "ECDH OpenSSL 1.1.0+ temp key parameter settings: default selection\n");
918 return TRUE;
919 # endif
920 #endif
921 }
922
923 DEBUG(D_tls) debug_printf("ECDH: curve '%s'\n", exp_curve);
924 if ( (nid = OBJ_sn2nid (CCS exp_curve)) == NID_undef
925 # ifdef EXIM_HAVE_OPENSSL_EC_NIST2NID
926 && (nid = EC_curve_nist2nid(CCS exp_curve)) == NID_undef
927 # endif
928 )
929 {
930 tls_error(string_sprintf("Unknown curve name tls_eccurve '%s'", exp_curve),
931 host, NULL, errstr);
932 return FALSE;
933 }
934
935 if (!(ecdh = EC_KEY_new_by_curve_name(nid)))
936 {
937 tls_error(US"Unable to create ec curve", host, NULL, errstr);
938 return FALSE;
939 }
940
941 /* The "tmp" in the name here refers to setting a temporary key
942 not to the stability of the interface. */
943
944 if ((rv = SSL_CTX_set_tmp_ecdh(sctx, ecdh) == 0))
945 tls_error(string_sprintf("Error enabling '%s' curve", exp_curve), host, NULL, errstr);
946 else
947 DEBUG(D_tls) debug_printf("ECDH: enabled '%s' curve\n", exp_curve);
948
949 EC_KEY_free(ecdh);
950 return !rv;
951
952 # endif /*EXIM_HAVE_ECDH*/
953 #endif /*OPENSSL_NO_ECDH*/
954 }
955
956
957
958
959 #ifndef DISABLE_OCSP
960 /*************************************************
961 * Load OCSP information into state *
962 *************************************************/
963 /* Called to load the server OCSP response from the given file into memory, once
964 caller has determined this is needed. Checks validity. Debugs a message
965 if invalid.
966
967 ASSUMES: single response, for single cert.
968
969 Arguments:
970 sctx the SSL_CTX* to update
971 cbinfo various parts of session state
972 expanded the filename putatively holding an OCSP response
973
974 */
975
976 static void
977 ocsp_load_response(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo, const uschar *expanded)
978 {
979 BIO * bio;
980 OCSP_RESPONSE * resp;
981 OCSP_BASICRESP * basic_response;
982 OCSP_SINGLERESP * single_response;
983 ASN1_GENERALIZEDTIME * rev, * thisupd, * nextupd;
984 STACK_OF(X509) * sk;
985 unsigned long verify_flags;
986 int status, reason, i;
987
988 cbinfo->u_ocsp.server.file_expanded = string_copy(expanded);
989 if (cbinfo->u_ocsp.server.response)
990 {
991 OCSP_RESPONSE_free(cbinfo->u_ocsp.server.response);
992 cbinfo->u_ocsp.server.response = NULL;
993 }
994
995 if (!(bio = BIO_new_file(CS cbinfo->u_ocsp.server.file_expanded, "rb")))
996 {
997 DEBUG(D_tls) debug_printf("Failed to open OCSP response file \"%s\"\n",
998 cbinfo->u_ocsp.server.file_expanded);
999 return;
1000 }
1001
1002 resp = d2i_OCSP_RESPONSE_bio(bio, NULL);
1003 BIO_free(bio);
1004 if (!resp)
1005 {
1006 DEBUG(D_tls) debug_printf("Error reading OCSP response.\n");
1007 return;
1008 }
1009
1010 if ((status = OCSP_response_status(resp)) != OCSP_RESPONSE_STATUS_SUCCESSFUL)
1011 {
1012 DEBUG(D_tls) debug_printf("OCSP response not valid: %s (%d)\n",
1013 OCSP_response_status_str(status), status);
1014 goto bad;
1015 }
1016
1017 if (!(basic_response = OCSP_response_get1_basic(resp)))
1018 {
1019 DEBUG(D_tls)
1020 debug_printf("OCSP response parse error: unable to extract basic response.\n");
1021 goto bad;
1022 }
1023
1024 sk = cbinfo->verify_stack;
1025 verify_flags = OCSP_NOVERIFY; /* check sigs, but not purpose */
1026
1027 /* May need to expose ability to adjust those flags?
1028 OCSP_NOSIGS OCSP_NOVERIFY OCSP_NOCHAIN OCSP_NOCHECKS OCSP_NOEXPLICIT
1029 OCSP_TRUSTOTHER OCSP_NOINTERN */
1030
1031 /* This does a full verify on the OCSP proof before we load it for serving
1032 up; possibly overkill - just date-checks might be nice enough.
1033
1034 OCSP_basic_verify takes a "store" arg, but does not
1035 use it for the chain verification, which is all we do
1036 when OCSP_NOVERIFY is set. The content from the wire
1037 "basic_response" and a cert-stack "sk" are all that is used.
1038
1039 We have a stack, loaded in setup_certs() if tls_verify_certificates
1040 was a file (not a directory, or "system"). It is unfortunate we
1041 cannot used the connection context store, as that would neatly
1042 handle the "system" case too, but there seems to be no library
1043 function for getting a stack from a store.
1044 [ In OpenSSL 1.1 - ? X509_STORE_CTX_get0_chain(ctx) ? ]
1045 We do not free the stack since it could be needed a second time for
1046 SNI handling.
1047
1048 Separately we might try to replace using OCSP_basic_verify() - which seems to not
1049 be a public interface into the OpenSSL library (there's no manual entry) -
1050 But what with? We also use OCSP_basic_verify in the client stapling callback.
1051 And there we NEED it; we must verify that status... unless the
1052 library does it for us anyway? */
1053
1054 if ((i = OCSP_basic_verify(basic_response, sk, NULL, verify_flags)) < 0)
1055 {
1056 DEBUG(D_tls)
1057 {
1058 ERR_error_string(ERR_get_error(), ssl_errstring);
1059 debug_printf("OCSP response verify failure: %s\n", US ssl_errstring);
1060 }
1061 goto bad;
1062 }
1063
1064 /* Here's the simplifying assumption: there's only one response, for the
1065 one certificate we use, and nothing for anything else in a chain. If this
1066 proves false, we need to extract a cert id from our issued cert
1067 (tls_certificate) and use that for OCSP_resp_find_status() (which finds the
1068 right cert in the stack and then calls OCSP_single_get0_status()).
1069
1070 I'm hoping to avoid reworking a bunch more of how we handle state here. */
1071
1072 if (!(single_response = OCSP_resp_get0(basic_response, 0)))
1073 {
1074 DEBUG(D_tls)
1075 debug_printf("Unable to get first response from OCSP basic response.\n");
1076 goto bad;
1077 }
1078
1079 status = OCSP_single_get0_status(single_response, &reason, &rev, &thisupd, &nextupd);
1080 if (status != V_OCSP_CERTSTATUS_GOOD)
1081 {
1082 DEBUG(D_tls) debug_printf("OCSP response bad cert status: %s (%d) %s (%d)\n",
1083 OCSP_cert_status_str(status), status,
1084 OCSP_crl_reason_str(reason), reason);
1085 goto bad;
1086 }
1087
1088 if (!OCSP_check_validity(thisupd, nextupd, EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1089 {
1090 DEBUG(D_tls) debug_printf("OCSP status invalid times.\n");
1091 goto bad;
1092 }
1093
1094 supply_response:
1095 cbinfo->u_ocsp.server.response = resp; /*XXX stack?*/
1096 return;
1097
1098 bad:
1099 if (f.running_in_test_harness)
1100 {
1101 extern char ** environ;
1102 uschar ** p;
1103 if (environ) for (p = USS environ; *p; p++)
1104 if (Ustrncmp(*p, "EXIM_TESTHARNESS_DISABLE_OCSPVALIDITYCHECK", 42) == 0)
1105 {
1106 DEBUG(D_tls) debug_printf("Supplying known bad OCSP response\n");
1107 goto supply_response;
1108 }
1109 }
1110 return;
1111 }
1112 #endif /*!DISABLE_OCSP*/
1113
1114
1115
1116
1117 /* Create and install a selfsigned certificate, for use in server mode */
1118
1119 static int
1120 tls_install_selfsign(SSL_CTX * sctx, uschar ** errstr)
1121 {
1122 X509 * x509 = NULL;
1123 EVP_PKEY * pkey;
1124 RSA * rsa;
1125 X509_NAME * name;
1126 uschar * where;
1127
1128 where = US"allocating pkey";
1129 if (!(pkey = EVP_PKEY_new()))
1130 goto err;
1131
1132 where = US"allocating cert";
1133 if (!(x509 = X509_new()))
1134 goto err;
1135
1136 where = US"generating pkey";
1137 if (!(rsa = rsa_callback(NULL, 0, 1024)))
1138 goto err;
1139
1140 where = US"assigning pkey";
1141 if (!EVP_PKEY_assign_RSA(pkey, rsa))
1142 goto err;
1143
1144 X509_set_version(x509, 2); /* N+1 - version 3 */
1145 ASN1_INTEGER_set(X509_get_serialNumber(x509), 1);
1146 X509_gmtime_adj(X509_get_notBefore(x509), 0);
1147 X509_gmtime_adj(X509_get_notAfter(x509), (long)60 * 60); /* 1 hour */
1148 X509_set_pubkey(x509, pkey);
1149
1150 name = X509_get_subject_name(x509);
1151 X509_NAME_add_entry_by_txt(name, "C",
1152 MBSTRING_ASC, CUS "UK", -1, -1, 0);
1153 X509_NAME_add_entry_by_txt(name, "O",
1154 MBSTRING_ASC, CUS "Exim Developers", -1, -1, 0);
1155 X509_NAME_add_entry_by_txt(name, "CN",
1156 MBSTRING_ASC, CUS smtp_active_hostname, -1, -1, 0);
1157 X509_set_issuer_name(x509, name);
1158
1159 where = US"signing cert";
1160 if (!X509_sign(x509, pkey, EVP_md5()))
1161 goto err;
1162
1163 where = US"installing selfsign cert";
1164 if (!SSL_CTX_use_certificate(sctx, x509))
1165 goto err;
1166
1167 where = US"installing selfsign key";
1168 if (!SSL_CTX_use_PrivateKey(sctx, pkey))
1169 goto err;
1170
1171 return OK;
1172
1173 err:
1174 (void) tls_error(where, NULL, NULL, errstr);
1175 if (x509) X509_free(x509);
1176 if (pkey) EVP_PKEY_free(pkey);
1177 return DEFER;
1178 }
1179
1180
1181
1182
1183 static int
1184 tls_add_certfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1185 uschar ** errstr)
1186 {
1187 DEBUG(D_tls) debug_printf("tls_certificate file %s\n", file);
1188 if (!SSL_CTX_use_certificate_chain_file(sctx, CS file))
1189 return tls_error(string_sprintf(
1190 "SSL_CTX_use_certificate_chain_file file=%s", file),
1191 cbinfo->host, NULL, errstr);
1192 return 0;
1193 }
1194
1195 static int
1196 tls_add_pkeyfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1197 uschar ** errstr)
1198 {
1199 DEBUG(D_tls) debug_printf("tls_privatekey file %s\n", file);
1200 if (!SSL_CTX_use_PrivateKey_file(sctx, CS file, SSL_FILETYPE_PEM))
1201 return tls_error(string_sprintf(
1202 "SSL_CTX_use_PrivateKey_file file=%s", file), cbinfo->host, NULL, errstr);
1203 return 0;
1204 }
1205
1206
1207 /*************************************************
1208 * Expand key and cert file specs *
1209 *************************************************/
1210
1211 /* Called once during tls_init and possibly again during TLS setup, for a
1212 new context, if Server Name Indication was used and tls_sni was seen in
1213 the certificate string.
1214
1215 Arguments:
1216 sctx the SSL_CTX* to update
1217 cbinfo various parts of session state
1218 errstr error string pointer
1219
1220 Returns: OK/DEFER/FAIL
1221 */
1222
1223 static int
1224 tls_expand_session_files(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo,
1225 uschar ** errstr)
1226 {
1227 uschar *expanded;
1228
1229 if (!cbinfo->certificate)
1230 {
1231 if (!cbinfo->is_server) /* client */
1232 return OK;
1233 /* server */
1234 if (tls_install_selfsign(sctx, errstr) != OK)
1235 return DEFER;
1236 }
1237 else
1238 {
1239 int err;
1240
1241 if (Ustrstr(cbinfo->certificate, US"tls_sni") ||
1242 Ustrstr(cbinfo->certificate, US"tls_in_sni") ||
1243 Ustrstr(cbinfo->certificate, US"tls_out_sni")
1244 )
1245 reexpand_tls_files_for_sni = TRUE;
1246
1247 if (!expand_check(cbinfo->certificate, US"tls_certificate", &expanded, errstr))
1248 return DEFER;
1249
1250 if (expanded)
1251 if (cbinfo->is_server)
1252 {
1253 const uschar * file_list = expanded;
1254 int sep = 0;
1255 uschar * file;
1256
1257 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1258 if ((err = tls_add_certfile(sctx, cbinfo, file, errstr)))
1259 return err;
1260 }
1261 else /* would there ever be a need for multiple client certs? */
1262 if ((err = tls_add_certfile(sctx, cbinfo, expanded, errstr)))
1263 return err;
1264
1265 if (cbinfo->privatekey != NULL &&
1266 !expand_check(cbinfo->privatekey, US"tls_privatekey", &expanded, errstr))
1267 return DEFER;
1268
1269 /* If expansion was forced to fail, key_expanded will be NULL. If the result
1270 of the expansion is an empty string, ignore it also, and assume the private
1271 key is in the same file as the certificate. */
1272
1273 if (expanded && *expanded)
1274 if (cbinfo->is_server)
1275 {
1276 const uschar * file_list = expanded;
1277 int sep = 0;
1278 uschar * file;
1279
1280 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1281 if ((err = tls_add_pkeyfile(sctx, cbinfo, file, errstr)))
1282 return err;
1283 }
1284 else /* would there ever be a need for multiple client certs? */
1285 if ((err = tls_add_pkeyfile(sctx, cbinfo, expanded, errstr)))
1286 return err;
1287 }
1288
1289 #ifndef DISABLE_OCSP
1290 if (cbinfo->is_server && cbinfo->u_ocsp.server.file)
1291 {
1292 /*XXX stack*/
1293 if (!expand_check(cbinfo->u_ocsp.server.file, US"tls_ocsp_file", &expanded, errstr))
1294 return DEFER;
1295
1296 if (expanded && *expanded)
1297 {
1298 DEBUG(D_tls) debug_printf("tls_ocsp_file %s\n", expanded);
1299 if ( cbinfo->u_ocsp.server.file_expanded
1300 && (Ustrcmp(expanded, cbinfo->u_ocsp.server.file_expanded) == 0))
1301 {
1302 DEBUG(D_tls) debug_printf(" - value unchanged, using existing values\n");
1303 }
1304 else
1305 ocsp_load_response(sctx, cbinfo, expanded);
1306 }
1307 }
1308 #endif
1309
1310 return OK;
1311 }
1312
1313
1314
1315
1316 /*************************************************
1317 * Callback to handle SNI *
1318 *************************************************/
1319
1320 /* Called when acting as server during the TLS session setup if a Server Name
1321 Indication extension was sent by the client.
1322
1323 API documentation is OpenSSL s_server.c implementation.
1324
1325 Arguments:
1326 s SSL* of the current session
1327 ad unknown (part of OpenSSL API) (unused)
1328 arg Callback of "our" registered data
1329
1330 Returns: SSL_TLSEXT_ERR_{OK,ALERT_WARNING,ALERT_FATAL,NOACK}
1331 */
1332
1333 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
1334 static int
1335 tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg)
1336 {
1337 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
1338 tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
1339 int rc;
1340 int old_pool = store_pool;
1341 uschar * dummy_errstr;
1342
1343 if (!servername)
1344 return SSL_TLSEXT_ERR_OK;
1345
1346 DEBUG(D_tls) debug_printf("Received TLS SNI \"%s\"%s\n", servername,
1347 reexpand_tls_files_for_sni ? "" : " (unused for certificate selection)");
1348
1349 /* Make the extension value available for expansion */
1350 store_pool = POOL_PERM;
1351 tls_in.sni = string_copy(US servername);
1352 store_pool = old_pool;
1353
1354 if (!reexpand_tls_files_for_sni)
1355 return SSL_TLSEXT_ERR_OK;
1356
1357 /* Can't find an SSL_CTX_clone() or equivalent, so we do it manually;
1358 not confident that memcpy wouldn't break some internal reference counting.
1359 Especially since there's a references struct member, which would be off. */
1360
1361 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1362 if (!(server_sni = SSL_CTX_new(TLS_server_method())))
1363 #else
1364 if (!(server_sni = SSL_CTX_new(SSLv23_server_method())))
1365 #endif
1366 {
1367 ERR_error_string(ERR_get_error(), ssl_errstring);
1368 DEBUG(D_tls) debug_printf("SSL_CTX_new() failed: %s\n", ssl_errstring);
1369 return SSL_TLSEXT_ERR_NOACK;
1370 }
1371
1372 /* Not sure how many of these are actually needed, since SSL object
1373 already exists. Might even need this selfsame callback, for reneg? */
1374
1375 SSL_CTX_set_info_callback(server_sni, SSL_CTX_get_info_callback(server_ctx));
1376 SSL_CTX_set_mode(server_sni, SSL_CTX_get_mode(server_ctx));
1377 SSL_CTX_set_options(server_sni, SSL_CTX_get_options(server_ctx));
1378 SSL_CTX_set_timeout(server_sni, SSL_CTX_get_timeout(server_ctx));
1379 SSL_CTX_set_tlsext_servername_callback(server_sni, tls_servername_cb);
1380 SSL_CTX_set_tlsext_servername_arg(server_sni, cbinfo);
1381
1382 if ( !init_dh(server_sni, cbinfo->dhparam, NULL, &dummy_errstr)
1383 || !init_ecdh(server_sni, NULL, &dummy_errstr)
1384 )
1385 return SSL_TLSEXT_ERR_NOACK;
1386
1387 if ( cbinfo->server_cipher_list
1388 && !SSL_CTX_set_cipher_list(server_sni, CS cbinfo->server_cipher_list))
1389 return SSL_TLSEXT_ERR_NOACK;
1390
1391 #ifndef DISABLE_OCSP
1392 if (cbinfo->u_ocsp.server.file)
1393 {
1394 SSL_CTX_set_tlsext_status_cb(server_sni, tls_server_stapling_cb);
1395 SSL_CTX_set_tlsext_status_arg(server_sni, cbinfo);
1396 }
1397 #endif
1398
1399 if ((rc = setup_certs(server_sni, tls_verify_certificates, tls_crl, NULL, FALSE,
1400 verify_callback_server, &dummy_errstr)) != OK)
1401 return SSL_TLSEXT_ERR_NOACK;
1402
1403 /* do this after setup_certs, because this can require the certs for verifying
1404 OCSP information. */
1405 if ((rc = tls_expand_session_files(server_sni, cbinfo, &dummy_errstr)) != OK)
1406 return SSL_TLSEXT_ERR_NOACK;
1407
1408 DEBUG(D_tls) debug_printf("Switching SSL context.\n");
1409 SSL_set_SSL_CTX(s, server_sni);
1410
1411 return SSL_TLSEXT_ERR_OK;
1412 }
1413 #endif /* EXIM_HAVE_OPENSSL_TLSEXT */
1414
1415
1416
1417
1418 #ifndef DISABLE_OCSP
1419
1420 /*************************************************
1421 * Callback to handle OCSP Stapling *
1422 *************************************************/
1423
1424 /* Called when acting as server during the TLS session setup if the client
1425 requests OCSP information with a Certificate Status Request.
1426
1427 Documentation via openssl s_server.c and the Apache patch from the OpenSSL
1428 project.
1429
1430 */
1431
1432 static int
1433 tls_server_stapling_cb(SSL *s, void *arg)
1434 {
1435 const tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
1436 uschar *response_der; /*XXX blob */
1437 int response_der_len;
1438
1439 /*XXX stack: use SSL_get_certificate() to see which cert; from that work
1440 out which ocsp blob to send. Unfortunately, SSL_get_certificate is known
1441 buggy in current OpenSSL; it returns the last cert loaded always rather than
1442 the one actually presented. So we can't support a stack of OCSP proofs at
1443 this time. */
1444
1445 DEBUG(D_tls)
1446 debug_printf("Received TLS status request (OCSP stapling); %s response\n",
1447 cbinfo->u_ocsp.server.response ? "have" : "lack");
1448
1449 tls_in.ocsp = OCSP_NOT_RESP;
1450 if (!cbinfo->u_ocsp.server.response)
1451 return SSL_TLSEXT_ERR_NOACK;
1452
1453 response_der = NULL;
1454 response_der_len = i2d_OCSP_RESPONSE(cbinfo->u_ocsp.server.response, /*XXX stack*/
1455 &response_der);
1456 if (response_der_len <= 0)
1457 return SSL_TLSEXT_ERR_NOACK;
1458
1459 SSL_set_tlsext_status_ocsp_resp(server_ssl, response_der, response_der_len);
1460 tls_in.ocsp = OCSP_VFIED;
1461 return SSL_TLSEXT_ERR_OK;
1462 }
1463
1464
1465 static void
1466 time_print(BIO * bp, const char * str, ASN1_GENERALIZEDTIME * time)
1467 {
1468 BIO_printf(bp, "\t%s: ", str);
1469 ASN1_GENERALIZEDTIME_print(bp, time);
1470 BIO_puts(bp, "\n");
1471 }
1472
1473 static int
1474 tls_client_stapling_cb(SSL *s, void *arg)
1475 {
1476 tls_ext_ctx_cb * cbinfo = arg;
1477 const unsigned char * p;
1478 int len;
1479 OCSP_RESPONSE * rsp;
1480 OCSP_BASICRESP * bs;
1481 int i;
1482
1483 DEBUG(D_tls) debug_printf("Received TLS status response (OCSP stapling):");
1484 len = SSL_get_tlsext_status_ocsp_resp(s, &p);
1485 if(!p)
1486 {
1487 /* Expect this when we requested ocsp but got none */
1488 if (cbinfo->u_ocsp.client.verify_required && LOGGING(tls_cipher))
1489 log_write(0, LOG_MAIN, "Received TLS status callback, null content");
1490 else
1491 DEBUG(D_tls) debug_printf(" null\n");
1492 return cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1493 }
1494
1495 if(!(rsp = d2i_OCSP_RESPONSE(NULL, &p, len)))
1496 {
1497 tls_out.ocsp = OCSP_FAILED;
1498 if (LOGGING(tls_cipher))
1499 log_write(0, LOG_MAIN, "Received TLS cert status response, parse error");
1500 else
1501 DEBUG(D_tls) debug_printf(" parse error\n");
1502 return 0;
1503 }
1504
1505 if(!(bs = OCSP_response_get1_basic(rsp)))
1506 {
1507 tls_out.ocsp = OCSP_FAILED;
1508 if (LOGGING(tls_cipher))
1509 log_write(0, LOG_MAIN, "Received TLS cert status response, error parsing response");
1510 else
1511 DEBUG(D_tls) debug_printf(" error parsing response\n");
1512 OCSP_RESPONSE_free(rsp);
1513 return 0;
1514 }
1515
1516 /* We'd check the nonce here if we'd put one in the request. */
1517 /* However that would defeat cacheability on the server so we don't. */
1518
1519 /* This section of code reworked from OpenSSL apps source;
1520 The OpenSSL Project retains copyright:
1521 Copyright (c) 1999 The OpenSSL Project. All rights reserved.
1522 */
1523 {
1524 BIO * bp = NULL;
1525 int status, reason;
1526 ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
1527
1528 DEBUG(D_tls) bp = BIO_new_fp(debug_file, BIO_NOCLOSE);
1529
1530 /*OCSP_RESPONSE_print(bp, rsp, 0); extreme debug: stapling content */
1531
1532 /* Use the chain that verified the server cert to verify the stapled info */
1533 /* DEBUG(D_tls) x509_store_dump_cert_s_names(cbinfo->u_ocsp.client.verify_store); */
1534
1535 if ((i = OCSP_basic_verify(bs, cbinfo->verify_stack,
1536 cbinfo->u_ocsp.client.verify_store, 0)) <= 0)
1537 {
1538 tls_out.ocsp = OCSP_FAILED;
1539 if (LOGGING(tls_cipher)) log_write(0, LOG_MAIN,
1540 "Received TLS cert status response, itself unverifiable: %s",
1541 ERR_reason_error_string(ERR_peek_error()));
1542 BIO_printf(bp, "OCSP response verify failure\n");
1543 ERR_print_errors(bp);
1544 OCSP_RESPONSE_print(bp, rsp, 0);
1545 goto failed;
1546 }
1547
1548 BIO_printf(bp, "OCSP response well-formed and signed OK\n");
1549
1550 /*XXX So we have a good stapled OCSP status. How do we know
1551 it is for the cert of interest? OpenSSL 1.1.0 has a routine
1552 OCSP_resp_find_status() which matches on a cert id, which presumably
1553 we should use. Making an id needs OCSP_cert_id_new(), which takes
1554 issuerName, issuerKey, serialNumber. Are they all in the cert?
1555
1556 For now, carry on blindly accepting the resp. */
1557
1558 {
1559 OCSP_SINGLERESP * single;
1560
1561 #ifdef EXIM_HAVE_OCSP_RESP_COUNT
1562 if (OCSP_resp_count(bs) != 1)
1563 #else
1564 STACK_OF(OCSP_SINGLERESP) * sresp = bs->tbsResponseData->responses;
1565 if (sk_OCSP_SINGLERESP_num(sresp) != 1)
1566 #endif
1567 {
1568 tls_out.ocsp = OCSP_FAILED;
1569 log_write(0, LOG_MAIN, "OCSP stapling "
1570 "with multiple responses not handled");
1571 goto failed;
1572 }
1573 single = OCSP_resp_get0(bs, 0);
1574 status = OCSP_single_get0_status(single, &reason, &rev,
1575 &thisupd, &nextupd);
1576 }
1577
1578 DEBUG(D_tls) time_print(bp, "This OCSP Update", thisupd);
1579 DEBUG(D_tls) if(nextupd) time_print(bp, "Next OCSP Update", nextupd);
1580 if (!OCSP_check_validity(thisupd, nextupd,
1581 EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1582 {
1583 tls_out.ocsp = OCSP_FAILED;
1584 DEBUG(D_tls) ERR_print_errors(bp);
1585 log_write(0, LOG_MAIN, "Server OSCP dates invalid");
1586 }
1587 else
1588 {
1589 DEBUG(D_tls) BIO_printf(bp, "Certificate status: %s\n",
1590 OCSP_cert_status_str(status));
1591 switch(status)
1592 {
1593 case V_OCSP_CERTSTATUS_GOOD:
1594 tls_out.ocsp = OCSP_VFIED;
1595 i = 1;
1596 goto good;
1597 case V_OCSP_CERTSTATUS_REVOKED:
1598 tls_out.ocsp = OCSP_FAILED;
1599 log_write(0, LOG_MAIN, "Server certificate revoked%s%s",
1600 reason != -1 ? "; reason: " : "",
1601 reason != -1 ? OCSP_crl_reason_str(reason) : "");
1602 DEBUG(D_tls) time_print(bp, "Revocation Time", rev);
1603 break;
1604 default:
1605 tls_out.ocsp = OCSP_FAILED;
1606 log_write(0, LOG_MAIN,
1607 "Server certificate status unknown, in OCSP stapling");
1608 break;
1609 }
1610 }
1611 failed:
1612 i = cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1613 good:
1614 BIO_free(bp);
1615 }
1616
1617 OCSP_RESPONSE_free(rsp);
1618 return i;
1619 }
1620 #endif /*!DISABLE_OCSP*/
1621
1622
1623 /*************************************************
1624 * Initialize for TLS *
1625 *************************************************/
1626
1627 /* Called from both server and client code, to do preliminary initialization
1628 of the library. We allocate and return a context structure.
1629
1630 Arguments:
1631 ctxp returned SSL context
1632 host connected host, if client; NULL if server
1633 dhparam DH parameter file
1634 certificate certificate file
1635 privatekey private key
1636 ocsp_file file of stapling info (server); flag for require ocsp (client)
1637 addr address if client; NULL if server (for some randomness)
1638 cbp place to put allocated callback context
1639 errstr error string pointer
1640
1641 Returns: OK/DEFER/FAIL
1642 */
1643
1644 static int
1645 tls_init(SSL_CTX **ctxp, host_item *host, uschar *dhparam, uschar *certificate,
1646 uschar *privatekey,
1647 #ifndef DISABLE_OCSP
1648 uschar *ocsp_file, /*XXX stack, in server*/
1649 #endif
1650 address_item *addr, tls_ext_ctx_cb ** cbp, uschar ** errstr)
1651 {
1652 SSL_CTX * ctx;
1653 long init_options;
1654 int rc;
1655 tls_ext_ctx_cb * cbinfo;
1656
1657 cbinfo = store_malloc(sizeof(tls_ext_ctx_cb));
1658 cbinfo->certificate = certificate;
1659 cbinfo->privatekey = privatekey;
1660 cbinfo->is_server = host==NULL;
1661 #ifndef DISABLE_OCSP
1662 cbinfo->verify_stack = NULL;
1663 if (!host)
1664 {
1665 cbinfo->u_ocsp.server.file = ocsp_file;
1666 cbinfo->u_ocsp.server.file_expanded = NULL;
1667 cbinfo->u_ocsp.server.response = NULL;
1668 }
1669 else
1670 cbinfo->u_ocsp.client.verify_store = NULL;
1671 #endif
1672 cbinfo->dhparam = dhparam;
1673 cbinfo->server_cipher_list = NULL;
1674 cbinfo->host = host;
1675 #ifndef DISABLE_EVENT
1676 cbinfo->event_action = NULL;
1677 #endif
1678
1679 SSL_load_error_strings(); /* basic set up */
1680 OpenSSL_add_ssl_algorithms();
1681
1682 #ifdef EXIM_HAVE_SHA256
1683 /* SHA256 is becoming ever more popular. This makes sure it gets added to the
1684 list of available digests. */
1685 EVP_add_digest(EVP_sha256());
1686 #endif
1687
1688 /* Create a context.
1689 The OpenSSL docs in 1.0.1b have not been updated to clarify TLS variant
1690 negotiation in the different methods; as far as I can tell, the only
1691 *_{server,client}_method which allows negotiation is SSLv23, which exists even
1692 when OpenSSL is built without SSLv2 support.
1693 By disabling with openssl_options, we can let admins re-enable with the
1694 existing knob. */
1695
1696 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1697 if (!(ctx = SSL_CTX_new(host ? TLS_client_method() : TLS_server_method())))
1698 #else
1699 if (!(ctx = SSL_CTX_new(host ? SSLv23_client_method() : SSLv23_server_method())))
1700 #endif
1701 return tls_error(US"SSL_CTX_new", host, NULL, errstr);
1702
1703 /* It turns out that we need to seed the random number generator this early in
1704 order to get the full complement of ciphers to work. It took me roughly a day
1705 of work to discover this by experiment.
1706
1707 On systems that have /dev/urandom, SSL may automatically seed itself from
1708 there. Otherwise, we have to make something up as best we can. Double check
1709 afterwards. */
1710
1711 if (!RAND_status())
1712 {
1713 randstuff r;
1714 gettimeofday(&r.tv, NULL);
1715 r.p = getpid();
1716
1717 RAND_seed(US (&r), sizeof(r));
1718 RAND_seed(US big_buffer, big_buffer_size);
1719 if (addr != NULL) RAND_seed(US addr, sizeof(addr));
1720
1721 if (!RAND_status())
1722 return tls_error(US"RAND_status", host,
1723 US"unable to seed random number generator", errstr);
1724 }
1725
1726 /* Set up the information callback, which outputs if debugging is at a suitable
1727 level. */
1728
1729 DEBUG(D_tls) SSL_CTX_set_info_callback(ctx, (void (*)())info_callback);
1730
1731 /* Automatically re-try reads/writes after renegotiation. */
1732 (void) SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
1733
1734 /* Apply administrator-supplied work-arounds.
1735 Historically we applied just one requested option,
1736 SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS, but when bug 994 requested a second, we
1737 moved to an administrator-controlled list of options to specify and
1738 grandfathered in the first one as the default value for "openssl_options".
1739
1740 No OpenSSL version number checks: the options we accept depend upon the
1741 availability of the option value macros from OpenSSL. */
1742
1743 if (!tls_openssl_options_parse(openssl_options, &init_options))
1744 return tls_error(US"openssl_options parsing failed", host, NULL, errstr);
1745
1746 if (init_options)
1747 {
1748 DEBUG(D_tls) debug_printf("setting SSL CTX options: %#lx\n", init_options);
1749 if (!(SSL_CTX_set_options(ctx, init_options)))
1750 return tls_error(string_sprintf(
1751 "SSL_CTX_set_option(%#lx)", init_options), host, NULL, errstr);
1752 }
1753 else
1754 DEBUG(D_tls) debug_printf("no SSL CTX options to set\n");
1755
1756 /* We'd like to disable session cache unconditionally, but foolish Outlook
1757 Express clients then give up the first TLS connection and make a second one
1758 (which works). Only when there is an IMAP service on the same machine.
1759 Presumably OE is trying to use the cache for A on B. Leave it enabled for
1760 now, until we work out a decent way of presenting control to the config. It
1761 will never be used because we use a new context every time. */
1762 #ifdef notdef
1763 (void) SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
1764 #endif
1765
1766 /* Initialize with DH parameters if supplied */
1767 /* Initialize ECDH temp key parameter selection */
1768
1769 if ( !init_dh(ctx, dhparam, host, errstr)
1770 || !init_ecdh(ctx, host, errstr)
1771 )
1772 return DEFER;
1773
1774 /* Set up certificate and key (and perhaps OCSP info) */
1775
1776 if ((rc = tls_expand_session_files(ctx, cbinfo, errstr)) != OK)
1777 return rc;
1778
1779 /* If we need to handle SNI or OCSP, do so */
1780
1781 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
1782 # ifndef DISABLE_OCSP
1783 if (!(cbinfo->verify_stack = sk_X509_new_null()))
1784 {
1785 DEBUG(D_tls) debug_printf("failed to create stack for stapling verify\n");
1786 return FAIL;
1787 }
1788 # endif
1789
1790 if (!host) /* server */
1791 {
1792 # ifndef DISABLE_OCSP
1793 /* We check u_ocsp.server.file, not server.response, because we care about if
1794 the option exists, not what the current expansion might be, as SNI might
1795 change the certificate and OCSP file in use between now and the time the
1796 callback is invoked. */
1797 if (cbinfo->u_ocsp.server.file)
1798 {
1799 SSL_CTX_set_tlsext_status_cb(ctx, tls_server_stapling_cb);
1800 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
1801 }
1802 # endif
1803 /* We always do this, so that $tls_sni is available even if not used in
1804 tls_certificate */
1805 SSL_CTX_set_tlsext_servername_callback(ctx, tls_servername_cb);
1806 SSL_CTX_set_tlsext_servername_arg(ctx, cbinfo);
1807 }
1808 # ifndef DISABLE_OCSP
1809 else /* client */
1810 if(ocsp_file) /* wanting stapling */
1811 {
1812 if (!(cbinfo->u_ocsp.client.verify_store = X509_STORE_new()))
1813 {
1814 DEBUG(D_tls) debug_printf("failed to create store for stapling verify\n");
1815 return FAIL;
1816 }
1817 SSL_CTX_set_tlsext_status_cb(ctx, tls_client_stapling_cb);
1818 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
1819 }
1820 # endif
1821 #endif
1822
1823 cbinfo->verify_cert_hostnames = NULL;
1824
1825 #ifdef EXIM_HAVE_EPHEM_RSA_KEX
1826 /* Set up the RSA callback */
1827 SSL_CTX_set_tmp_rsa_callback(ctx, rsa_callback);
1828 #endif
1829
1830 /* Finally, set the timeout, and we are done */
1831
1832 SSL_CTX_set_timeout(ctx, ssl_session_timeout);
1833 DEBUG(D_tls) debug_printf("Initialized TLS\n");
1834
1835 *cbp = cbinfo;
1836 *ctxp = ctx;
1837
1838 return OK;
1839 }
1840
1841
1842
1843
1844 /*************************************************
1845 * Get name of cipher in use *
1846 *************************************************/
1847
1848 /*
1849 Argument: pointer to an SSL structure for the connection
1850 buffer to use for answer
1851 size of buffer
1852 pointer to number of bits for cipher
1853 Returns: nothing
1854 */
1855
1856 static void
1857 construct_cipher_name(SSL *ssl, uschar *cipherbuf, int bsize, int *bits)
1858 {
1859 /* With OpenSSL 1.0.0a, 'c' needs to be const but the documentation doesn't
1860 yet reflect that. It should be a safe change anyway, even 0.9.8 versions have
1861 the accessor functions use const in the prototype. */
1862
1863 const uschar * ver = CUS SSL_get_version(ssl);
1864 const SSL_CIPHER * c = (const SSL_CIPHER *) SSL_get_current_cipher(ssl);
1865
1866 SSL_CIPHER_get_bits(c, bits);
1867
1868 string_format(cipherbuf, bsize, "%s:%s:%u", ver,
1869 SSL_CIPHER_get_name(c), *bits);
1870
1871 DEBUG(D_tls) debug_printf("Cipher: %s\n", cipherbuf);
1872 }
1873
1874
1875 static void
1876 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned bsize)
1877 {
1878 /*XXX we might consider a list-of-certs variable for the cert chain.
1879 SSL_get_peer_cert_chain(SSL*). We'd need a new variable type and support
1880 in list-handling functions, also consider the difference between the entire
1881 chain and the elements sent by the peer. */
1882
1883 /* Will have already noted peercert on a verify fail; possibly not the leaf */
1884 if (!tlsp->peercert)
1885 tlsp->peercert = SSL_get_peer_certificate(ssl);
1886 /* Beware anonymous ciphers which lead to server_cert being NULL */
1887 if (tlsp->peercert)
1888 {
1889 X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, bsize);
1890 peerdn[bsize-1] = '\0';
1891 tlsp->peerdn = peerdn; /*XXX a static buffer... */
1892 }
1893 else
1894 tlsp->peerdn = NULL;
1895 }
1896
1897
1898
1899
1900
1901 /*************************************************
1902 * Set up for verifying certificates *
1903 *************************************************/
1904
1905 #ifndef DISABLE_OCSP
1906 /* Load certs from file, return TRUE on success */
1907
1908 static BOOL
1909 chain_from_pem_file(const uschar * file, STACK_OF(X509) * verify_stack)
1910 {
1911 BIO * bp;
1912 X509 * x;
1913
1914 while (sk_X509_num(verify_stack) > 0)
1915 X509_free(sk_X509_pop(verify_stack));
1916
1917 if (!(bp = BIO_new_file(CS file, "r"))) return FALSE;
1918 while ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)))
1919 sk_X509_push(verify_stack, x);
1920 BIO_free(bp);
1921 return TRUE;
1922 }
1923 #endif
1924
1925
1926
1927 /* Called by both client and server startup; on the server possibly
1928 repeated after a Server Name Indication.
1929
1930 Arguments:
1931 sctx SSL_CTX* to initialise
1932 certs certs file or NULL
1933 crl CRL file or NULL
1934 host NULL in a server; the remote host in a client
1935 optional TRUE if called from a server for a host in tls_try_verify_hosts;
1936 otherwise passed as FALSE
1937 cert_vfy_cb Callback function for certificate verification
1938 errstr error string pointer
1939
1940 Returns: OK/DEFER/FAIL
1941 */
1942
1943 static int
1944 setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
1945 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr)
1946 {
1947 uschar *expcerts, *expcrl;
1948
1949 if (!expand_check(certs, US"tls_verify_certificates", &expcerts, errstr))
1950 return DEFER;
1951 DEBUG(D_tls) debug_printf("tls_verify_certificates: %s\n", expcerts);
1952
1953 if (expcerts && *expcerts)
1954 {
1955 /* Tell the library to use its compiled-in location for the system default
1956 CA bundle. Then add the ones specified in the config, if any. */
1957
1958 if (!SSL_CTX_set_default_verify_paths(sctx))
1959 return tls_error(US"SSL_CTX_set_default_verify_paths", host, NULL, errstr);
1960
1961 if (Ustrcmp(expcerts, "system") != 0)
1962 {
1963 struct stat statbuf;
1964
1965 if (Ustat(expcerts, &statbuf) < 0)
1966 {
1967 log_write(0, LOG_MAIN|LOG_PANIC,
1968 "failed to stat %s for certificates", expcerts);
1969 return DEFER;
1970 }
1971 else
1972 {
1973 uschar *file, *dir;
1974 if ((statbuf.st_mode & S_IFMT) == S_IFDIR)
1975 { file = NULL; dir = expcerts; }
1976 else
1977 {
1978 file = expcerts; dir = NULL;
1979 #ifndef DISABLE_OCSP
1980 /* In the server if we will be offering an OCSP proof, load chain from
1981 file for verifying the OCSP proof at load time. */
1982
1983 if ( !host
1984 && statbuf.st_size > 0
1985 && server_static_cbinfo->u_ocsp.server.file
1986 && !chain_from_pem_file(file, server_static_cbinfo->verify_stack)
1987 )
1988 {
1989 log_write(0, LOG_MAIN|LOG_PANIC,
1990 "failed to load cert chain from %s", file);
1991 return DEFER;
1992 }
1993 #endif
1994 }
1995
1996 /* If a certificate file is empty, the next function fails with an
1997 unhelpful error message. If we skip it, we get the correct behaviour (no
1998 certificates are recognized, but the error message is still misleading (it
1999 says no certificate was supplied). But this is better. */
2000
2001 if ( (!file || statbuf.st_size > 0)
2002 && !SSL_CTX_load_verify_locations(sctx, CS file, CS dir))
2003 return tls_error(US"SSL_CTX_load_verify_locations", host, NULL, errstr);
2004
2005 /* Load the list of CAs for which we will accept certs, for sending
2006 to the client. This is only for the one-file tls_verify_certificates
2007 variant.
2008 If a list isn't loaded into the server, but
2009 some verify locations are set, the server end appears to make
2010 a wildcard request for client certs.
2011 Meanwhile, the client library as default behaviour *ignores* the list
2012 we send over the wire - see man SSL_CTX_set_client_cert_cb.
2013 Because of this, and that the dir variant is likely only used for
2014 the public-CA bundle (not for a private CA), not worth fixing.
2015 */
2016 if (file)
2017 {
2018 STACK_OF(X509_NAME) * names = SSL_load_client_CA_file(CS file);
2019
2020 SSL_CTX_set_client_CA_list(sctx, names);
2021 DEBUG(D_tls) debug_printf("Added %d certificate authorities.\n",
2022 sk_X509_NAME_num(names));
2023 }
2024 }
2025 }
2026
2027 /* Handle a certificate revocation list. */
2028
2029 #if OPENSSL_VERSION_NUMBER > 0x00907000L
2030
2031 /* This bit of code is now the version supplied by Lars Mainka. (I have
2032 merely reformatted it into the Exim code style.)
2033
2034 "From here I changed the code to add support for multiple crl's
2035 in pem format in one file or to support hashed directory entries in
2036 pem format instead of a file. This method now uses the library function
2037 X509_STORE_load_locations to add the CRL location to the SSL context.
2038 OpenSSL will then handle the verify against CA certs and CRLs by
2039 itself in the verify callback." */
2040
2041 if (!expand_check(crl, US"tls_crl", &expcrl, errstr)) return DEFER;
2042 if (expcrl && *expcrl)
2043 {
2044 struct stat statbufcrl;
2045 if (Ustat(expcrl, &statbufcrl) < 0)
2046 {
2047 log_write(0, LOG_MAIN|LOG_PANIC,
2048 "failed to stat %s for certificates revocation lists", expcrl);
2049 return DEFER;
2050 }
2051 else
2052 {
2053 /* is it a file or directory? */
2054 uschar *file, *dir;
2055 X509_STORE *cvstore = SSL_CTX_get_cert_store(sctx);
2056 if ((statbufcrl.st_mode & S_IFMT) == S_IFDIR)
2057 {
2058 file = NULL;
2059 dir = expcrl;
2060 DEBUG(D_tls) debug_printf("SSL CRL value is a directory %s\n", dir);
2061 }
2062 else
2063 {
2064 file = expcrl;
2065 dir = NULL;
2066 DEBUG(D_tls) debug_printf("SSL CRL value is a file %s\n", file);
2067 }
2068 if (X509_STORE_load_locations(cvstore, CS file, CS dir) == 0)
2069 return tls_error(US"X509_STORE_load_locations", host, NULL, errstr);
2070
2071 /* setting the flags to check against the complete crl chain */
2072
2073 X509_STORE_set_flags(cvstore,
2074 X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
2075 }
2076 }
2077
2078 #endif /* OPENSSL_VERSION_NUMBER > 0x00907000L */
2079
2080 /* If verification is optional, don't fail if no certificate */
2081
2082 SSL_CTX_set_verify(sctx,
2083 SSL_VERIFY_PEER | (optional? 0 : SSL_VERIFY_FAIL_IF_NO_PEER_CERT),
2084 cert_vfy_cb);
2085 }
2086
2087 return OK;
2088 }
2089
2090
2091
2092 /*************************************************
2093 * Start a TLS session in a server *
2094 *************************************************/
2095
2096 /* This is called when Exim is running as a server, after having received
2097 the STARTTLS command. It must respond to that command, and then negotiate
2098 a TLS session.
2099
2100 Arguments:
2101 require_ciphers allowed ciphers
2102 errstr pointer to error message
2103
2104 Returns: OK on success
2105 DEFER for errors before the start of the negotiation
2106 FAIL for errors during the negotiation; the server can't
2107 continue running.
2108 */
2109
2110 int
2111 tls_server_start(const uschar * require_ciphers, uschar ** errstr)
2112 {
2113 int rc;
2114 uschar * expciphers;
2115 tls_ext_ctx_cb * cbinfo;
2116 static uschar peerdn[256];
2117 static uschar cipherbuf[256];
2118
2119 /* Check for previous activation */
2120
2121 if (tls_in.active.sock >= 0)
2122 {
2123 tls_error(US"STARTTLS received after TLS started", NULL, US"", errstr);
2124 smtp_printf("554 Already in TLS\r\n", FALSE);
2125 return FAIL;
2126 }
2127
2128 /* Initialize the SSL library. If it fails, it will already have logged
2129 the error. */
2130
2131 rc = tls_init(&server_ctx, NULL, tls_dhparam, tls_certificate, tls_privatekey,
2132 #ifndef DISABLE_OCSP
2133 tls_ocsp_file, /*XXX stack*/
2134 #endif
2135 NULL, &server_static_cbinfo, errstr);
2136 if (rc != OK) return rc;
2137 cbinfo = server_static_cbinfo;
2138
2139 if (!expand_check(require_ciphers, US"tls_require_ciphers", &expciphers, errstr))
2140 return FAIL;
2141
2142 /* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2143 were historically separated by underscores. So that I can use either form in my
2144 tests, and also for general convenience, we turn underscores into hyphens here.
2145
2146 XXX SSL_CTX_set_cipher_list() is replaced by SSL_CTX_set_ciphersuites()
2147 for TLS 1.3 . Since we do not call it at present we get the default list:
2148 TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
2149 */
2150
2151 if (expciphers)
2152 {
2153 uschar * s = expciphers;
2154 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
2155 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
2156 if (!SSL_CTX_set_cipher_list(server_ctx, CS expciphers))
2157 return tls_error(US"SSL_CTX_set_cipher_list", NULL, NULL, errstr);
2158 cbinfo->server_cipher_list = expciphers;
2159 }
2160
2161 /* If this is a host for which certificate verification is mandatory or
2162 optional, set up appropriately. */
2163
2164 tls_in.certificate_verified = FALSE;
2165 #ifdef SUPPORT_DANE
2166 tls_in.dane_verified = FALSE;
2167 #endif
2168 server_verify_callback_called = FALSE;
2169
2170 if (verify_check_host(&tls_verify_hosts) == OK)
2171 {
2172 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
2173 FALSE, verify_callback_server, errstr);
2174 if (rc != OK) return rc;
2175 server_verify_optional = FALSE;
2176 }
2177 else if (verify_check_host(&tls_try_verify_hosts) == OK)
2178 {
2179 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
2180 TRUE, verify_callback_server, errstr);
2181 if (rc != OK) return rc;
2182 server_verify_optional = TRUE;
2183 }
2184
2185 /* Prepare for new connection */
2186
2187 if (!(server_ssl = SSL_new(server_ctx)))
2188 return tls_error(US"SSL_new", NULL, NULL, errstr);
2189
2190 /* Warning: we used to SSL_clear(ssl) here, it was removed.
2191 *
2192 * With the SSL_clear(), we get strange interoperability bugs with
2193 * OpenSSL 1.0.1b and TLS1.1/1.2. It looks as though this may be a bug in
2194 * OpenSSL itself, as a clear should not lead to inability to follow protocols.
2195 *
2196 * The SSL_clear() call is to let an existing SSL* be reused, typically after
2197 * session shutdown. In this case, we have a brand new object and there's no
2198 * obvious reason to immediately clear it. I'm guessing that this was
2199 * originally added because of incomplete initialisation which the clear fixed,
2200 * in some historic release.
2201 */
2202
2203 /* Set context and tell client to go ahead, except in the case of TLS startup
2204 on connection, where outputting anything now upsets the clients and tends to
2205 make them disconnect. We need to have an explicit fflush() here, to force out
2206 the response. Other smtp_printf() calls do not need it, because in non-TLS
2207 mode, the fflush() happens when smtp_getc() is called. */
2208
2209 SSL_set_session_id_context(server_ssl, sid_ctx, Ustrlen(sid_ctx));
2210 if (!tls_in.on_connect)
2211 {
2212 smtp_printf("220 TLS go ahead\r\n", FALSE);
2213 fflush(smtp_out);
2214 }
2215
2216 /* Now negotiate the TLS session. We put our own timer on it, since it seems
2217 that the OpenSSL library doesn't. */
2218
2219 SSL_set_wfd(server_ssl, fileno(smtp_out));
2220 SSL_set_rfd(server_ssl, fileno(smtp_in));
2221 SSL_set_accept_state(server_ssl);
2222
2223 DEBUG(D_tls) debug_printf("Calling SSL_accept\n");
2224
2225 sigalrm_seen = FALSE;
2226 if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
2227 rc = SSL_accept(server_ssl);
2228 alarm(0);
2229
2230 if (rc <= 0)
2231 {
2232 (void) tls_error(US"SSL_accept", NULL, sigalrm_seen ? US"timed out" : NULL, errstr);
2233 return FAIL;
2234 }
2235
2236 DEBUG(D_tls) debug_printf("SSL_accept was successful\n");
2237
2238 /* TLS has been set up. Adjust the input functions to read via TLS,
2239 and initialize things. */
2240
2241 peer_cert(server_ssl, &tls_in, peerdn, sizeof(peerdn));
2242
2243 construct_cipher_name(server_ssl, cipherbuf, sizeof(cipherbuf), &tls_in.bits);
2244 tls_in.cipher = cipherbuf;
2245
2246 DEBUG(D_tls)
2247 {
2248 uschar buf[2048];
2249 if (SSL_get_shared_ciphers(server_ssl, CS buf, sizeof(buf)) != NULL)
2250 debug_printf("Shared ciphers: %s\n", buf);
2251 }
2252
2253 /* Record the certificate we presented */
2254 {
2255 X509 * crt = SSL_get_certificate(server_ssl);
2256 tls_in.ourcert = crt ? X509_dup(crt) : NULL;
2257 }
2258
2259 /* Only used by the server-side tls (tls_in), including tls_getc.
2260 Client-side (tls_out) reads (seem to?) go via
2261 smtp_read_response()/ip_recv().
2262 Hence no need to duplicate for _in and _out.
2263 */
2264 if (!ssl_xfer_buffer) ssl_xfer_buffer = store_malloc(ssl_xfer_buffer_size);
2265 ssl_xfer_buffer_lwm = ssl_xfer_buffer_hwm = 0;
2266 ssl_xfer_eof = ssl_xfer_error = FALSE;
2267
2268 receive_getc = tls_getc;
2269 receive_getbuf = tls_getbuf;
2270 receive_get_cache = tls_get_cache;
2271 receive_ungetc = tls_ungetc;
2272 receive_feof = tls_feof;
2273 receive_ferror = tls_ferror;
2274 receive_smtp_buffered = tls_smtp_buffered;
2275
2276 tls_in.active.sock = fileno(smtp_out);
2277 tls_in.active.tls_ctx = NULL; /* not using explicit ctx for server-side */
2278 return OK;
2279 }
2280
2281
2282
2283
2284 static int
2285 tls_client_basic_ctx_init(SSL_CTX * ctx,
2286 host_item * host, smtp_transport_options_block * ob, tls_ext_ctx_cb * cbinfo,
2287 uschar ** errstr)
2288 {
2289 int rc;
2290 /* stick to the old behaviour for compatibility if tls_verify_certificates is
2291 set but both tls_verify_hosts and tls_try_verify_hosts is not set. Check only
2292 the specified host patterns if one of them is defined */
2293
2294 if ( ( !ob->tls_verify_hosts
2295 && (!ob->tls_try_verify_hosts || !*ob->tls_try_verify_hosts)
2296 )
2297 || verify_check_given_host(CUSS &ob->tls_verify_hosts, host) == OK
2298 )
2299 client_verify_optional = FALSE;
2300 else if (verify_check_given_host(CUSS &ob->tls_try_verify_hosts, host) == OK)
2301 client_verify_optional = TRUE;
2302 else
2303 return OK;
2304
2305 if ((rc = setup_certs(ctx, ob->tls_verify_certificates,
2306 ob->tls_crl, host, client_verify_optional, verify_callback_client,
2307 errstr)) != OK)
2308 return rc;
2309
2310 if (verify_check_given_host(CUSS &ob->tls_verify_cert_hostnames, host) == OK)
2311 {
2312 cbinfo->verify_cert_hostnames =
2313 #ifdef SUPPORT_I18N
2314 string_domain_utf8_to_alabel(host->name, NULL);
2315 #else
2316 host->name;
2317 #endif
2318 DEBUG(D_tls) debug_printf("Cert hostname to check: \"%s\"\n",
2319 cbinfo->verify_cert_hostnames);
2320 }
2321 return OK;
2322 }
2323
2324
2325 #ifdef SUPPORT_DANE
2326 static int
2327 dane_tlsa_load(SSL * ssl, host_item * host, dns_answer * dnsa, uschar ** errstr)
2328 {
2329 dns_record * rr;
2330 dns_scan dnss;
2331 const char * hostnames[2] = { CS host->name, NULL };
2332 int found = 0;
2333
2334 if (DANESSL_init(ssl, NULL, hostnames) != 1)
2335 return tls_error(US"hostnames load", host, NULL, errstr);
2336
2337 for (rr = dns_next_rr(dnsa, &dnss, RESET_ANSWERS);
2338 rr;
2339 rr = dns_next_rr(dnsa, &dnss, RESET_NEXT)
2340 ) if (rr->type == T_TLSA)
2341 {
2342 const uschar * p = rr->data;
2343 uint8_t usage, selector, mtype;
2344 const char * mdname;
2345
2346 usage = *p++;
2347
2348 /* Only DANE-TA(2) and DANE-EE(3) are supported */
2349 if (usage != 2 && usage != 3) continue;
2350
2351 selector = *p++;
2352 mtype = *p++;
2353
2354 switch (mtype)
2355 {
2356 default: continue; /* Only match-types 0, 1, 2 are supported */
2357 case 0: mdname = NULL; break;
2358 case 1: mdname = "sha256"; break;
2359 case 2: mdname = "sha512"; break;
2360 }
2361
2362 found++;
2363 switch (DANESSL_add_tlsa(ssl, usage, selector, mdname, p, rr->size - 3))
2364 {
2365 default:
2366 return tls_error(US"tlsa load", host, NULL, errstr);
2367 case 0: /* action not taken */
2368 case 1: break;
2369 }
2370
2371 tls_out.tlsa_usage |= 1<<usage;
2372 }
2373
2374 if (found)
2375 return OK;
2376
2377 log_write(0, LOG_MAIN, "DANE error: No usable TLSA records");
2378 return DEFER;
2379 }
2380 #endif /*SUPPORT_DANE*/
2381
2382
2383
2384 /*************************************************
2385 * Start a TLS session in a client *
2386 *************************************************/
2387
2388 /* Called from the smtp transport after STARTTLS has been accepted.
2389
2390 Argument:
2391 fd the fd of the connection
2392 host connected host (for messages and option-tests)
2393 addr the first address (for some randomness; can be NULL)
2394 tb transport (always smtp)
2395 tlsa_dnsa tlsa lookup, if DANE, else null
2396 tlsp record details of channel configuration here; must be non-NULL
2397 errstr error string pointer
2398
2399 Returns: Pointer to TLS session context, or NULL on error
2400 */
2401
2402 void *
2403 tls_client_start(int fd, host_item *host, address_item *addr,
2404 transport_instance * tb,
2405 #ifdef SUPPORT_DANE
2406 dns_answer * tlsa_dnsa,
2407 #endif
2408 tls_support * tlsp, uschar ** errstr)
2409 {
2410 smtp_transport_options_block * ob = tb
2411 ? (smtp_transport_options_block *)tb->options_block
2412 : &smtp_transport_option_defaults;
2413 exim_openssl_client_tls_ctx * exim_client_ctx;
2414 static uschar peerdn[256];
2415 uschar * expciphers;
2416 int rc;
2417 static uschar cipherbuf[256];
2418
2419 #ifndef DISABLE_OCSP
2420 BOOL request_ocsp = FALSE;
2421 BOOL require_ocsp = FALSE;
2422 #endif
2423
2424 rc = store_pool;
2425 store_pool = POOL_PERM;
2426 exim_client_ctx = store_get(sizeof(exim_openssl_client_tls_ctx));
2427 store_pool = rc;
2428
2429 #ifdef SUPPORT_DANE
2430 tlsp->tlsa_usage = 0;
2431 #endif
2432
2433 #ifndef DISABLE_OCSP
2434 {
2435 # ifdef SUPPORT_DANE
2436 if ( tlsa_dnsa
2437 && ob->hosts_request_ocsp[0] == '*'
2438 && ob->hosts_request_ocsp[1] == '\0'
2439 )
2440 {
2441 /* Unchanged from default. Use a safer one under DANE */
2442 request_ocsp = TRUE;
2443 ob->hosts_request_ocsp = US"${if or { {= {0}{$tls_out_tlsa_usage}} "
2444 " {= {4}{$tls_out_tlsa_usage}} } "
2445 " {*}{}}";
2446 }
2447 # endif
2448
2449 if ((require_ocsp =
2450 verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK))
2451 request_ocsp = TRUE;
2452 else
2453 # ifdef SUPPORT_DANE
2454 if (!request_ocsp)
2455 # endif
2456 request_ocsp =
2457 verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
2458 }
2459 #endif
2460
2461 rc = tls_init(&exim_client_ctx->ctx, host, NULL,
2462 ob->tls_certificate, ob->tls_privatekey,
2463 #ifndef DISABLE_OCSP
2464 (void *)(long)request_ocsp,
2465 #endif
2466 addr, &client_static_cbinfo, errstr);
2467 if (rc != OK) return NULL;
2468
2469 tlsp->certificate_verified = FALSE;
2470 client_verify_callback_called = FALSE;
2471
2472 expciphers = NULL;
2473 #ifdef SUPPORT_DANE
2474 if (tlsa_dnsa)
2475 {
2476 /* We fall back to tls_require_ciphers if unset, empty or forced failure, but
2477 other failures should be treated as problems. */
2478 if (ob->dane_require_tls_ciphers &&
2479 !expand_check(ob->dane_require_tls_ciphers, US"dane_require_tls_ciphers",
2480 &expciphers, errstr))
2481 return NULL;
2482 if (expciphers && *expciphers == '\0')
2483 expciphers = NULL;
2484 }
2485 #endif
2486 if (!expciphers &&
2487 !expand_check(ob->tls_require_ciphers, US"tls_require_ciphers",
2488 &expciphers, errstr))
2489 return NULL;
2490
2491 /* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2492 are separated by underscores. So that I can use either form in my tests, and
2493 also for general convenience, we turn underscores into hyphens here. */
2494
2495 if (expciphers)
2496 {
2497 uschar *s = expciphers;
2498 while (*s) { if (*s == '_') *s = '-'; s++; }
2499 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
2500 if (!SSL_CTX_set_cipher_list(exim_client_ctx->ctx, CS expciphers))
2501 {
2502 tls_error(US"SSL_CTX_set_cipher_list", host, NULL, errstr);
2503 return NULL;
2504 }
2505 }
2506
2507 #ifdef SUPPORT_DANE
2508 if (tlsa_dnsa)
2509 {
2510 SSL_CTX_set_verify(exim_client_ctx->ctx,
2511 SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2512 verify_callback_client_dane);
2513
2514 if (!DANESSL_library_init())
2515 {
2516 tls_error(US"library init", host, NULL, errstr);
2517 return NULL;
2518 }
2519 if (DANESSL_CTX_init(exim_client_ctx->ctx) <= 0)
2520 {
2521 tls_error(US"context init", host, NULL, errstr);
2522 return NULL;
2523 }
2524 }
2525 else
2526
2527 #endif
2528
2529 if (tls_client_basic_ctx_init(exim_client_ctx->ctx, host, ob,
2530 client_static_cbinfo, errstr) != OK)
2531 return NULL;
2532
2533 if (!(exim_client_ctx->ssl = SSL_new(exim_client_ctx->ctx)))
2534 {
2535 tls_error(US"SSL_new", host, NULL, errstr);
2536 return NULL;
2537 }
2538 SSL_set_session_id_context(exim_client_ctx->ssl, sid_ctx, Ustrlen(sid_ctx));
2539 SSL_set_fd(exim_client_ctx->ssl, fd);
2540 SSL_set_connect_state(exim_client_ctx->ssl);
2541
2542 if (ob->tls_sni)
2543 {
2544 if (!expand_check(ob->tls_sni, US"tls_sni", &tlsp->sni, errstr))
2545 return NULL;
2546 if (!tlsp->sni)
2547 {
2548 DEBUG(D_tls) debug_printf("Setting TLS SNI forced to fail, not sending\n");
2549 }
2550 else if (!Ustrlen(tlsp->sni))
2551 tlsp->sni = NULL;
2552 else
2553 {
2554 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
2555 DEBUG(D_tls) debug_printf("Setting TLS SNI \"%s\"\n", tlsp->sni);
2556 SSL_set_tlsext_host_name(exim_client_ctx->ssl, tlsp->sni);
2557 #else
2558 log_write(0, LOG_MAIN, "SNI unusable with this OpenSSL library version; ignoring \"%s\"\n",
2559 tlsp->sni);
2560 #endif
2561 }
2562 }
2563
2564 #ifdef SUPPORT_DANE
2565 if (tlsa_dnsa)
2566 if (dane_tlsa_load(exim_client_ctx->ssl, host, tlsa_dnsa, errstr) != OK)
2567 return NULL;
2568 #endif
2569
2570 #ifndef DISABLE_OCSP
2571 /* Request certificate status at connection-time. If the server
2572 does OCSP stapling we will get the callback (set in tls_init()) */
2573 # ifdef SUPPORT_DANE
2574 if (request_ocsp)
2575 {
2576 const uschar * s;
2577 if ( ((s = ob->hosts_require_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2578 || ((s = ob->hosts_request_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2579 )
2580 { /* Re-eval now $tls_out_tlsa_usage is populated. If
2581 this means we avoid the OCSP request, we wasted the setup
2582 cost in tls_init(). */
2583 require_ocsp = verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK;
2584 request_ocsp = require_ocsp
2585 || verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
2586 }
2587 }
2588 # endif
2589
2590 if (request_ocsp)
2591 {
2592 SSL_set_tlsext_status_type(exim_client_ctx->ssl, TLSEXT_STATUSTYPE_ocsp);
2593 client_static_cbinfo->u_ocsp.client.verify_required = require_ocsp;
2594 tlsp->ocsp = OCSP_NOT_RESP;
2595 }
2596 #endif
2597
2598 #ifndef DISABLE_EVENT
2599 client_static_cbinfo->event_action = tb ? tb->event_action : NULL;
2600 #endif
2601
2602 /* There doesn't seem to be a built-in timeout on connection. */
2603
2604 DEBUG(D_tls) debug_printf("Calling SSL_connect\n");
2605 sigalrm_seen = FALSE;
2606 alarm(ob->command_timeout);
2607 rc = SSL_connect(exim_client_ctx->ssl);
2608 alarm(0);
2609
2610 #ifdef SUPPORT_DANE
2611 if (tlsa_dnsa)
2612 DANESSL_cleanup(exim_client_ctx->ssl);
2613 #endif
2614
2615 if (rc <= 0)
2616 {
2617 tls_error(US"SSL_connect", host, sigalrm_seen ? US"timed out" : NULL, errstr);
2618 return NULL;
2619 }
2620
2621 DEBUG(D_tls) debug_printf("SSL_connect succeeded\n");
2622
2623 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn));
2624
2625 construct_cipher_name(exim_client_ctx->ssl, cipherbuf, sizeof(cipherbuf), &tlsp->bits);
2626 tlsp->cipher = cipherbuf;
2627
2628 /* Record the certificate we presented */
2629 {
2630 X509 * crt = SSL_get_certificate(exim_client_ctx->ssl);
2631 tlsp->ourcert = crt ? X509_dup(crt) : NULL;
2632 }
2633
2634 tlsp->active.sock = fd;
2635 tlsp->active.tls_ctx = exim_client_ctx;
2636 return exim_client_ctx;
2637 }
2638
2639
2640
2641
2642
2643 static BOOL
2644 tls_refill(unsigned lim)
2645 {
2646 int error;
2647 int inbytes;
2648
2649 DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", server_ssl,
2650 ssl_xfer_buffer, ssl_xfer_buffer_size);
2651
2652 if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
2653 inbytes = SSL_read(server_ssl, CS ssl_xfer_buffer,
2654 MIN(ssl_xfer_buffer_size, lim));
2655 error = SSL_get_error(server_ssl, inbytes);
2656 if (smtp_receive_timeout > 0) alarm(0);
2657
2658 if (had_command_timeout) /* set by signal handler */
2659 smtp_command_timeout_exit(); /* does not return */
2660 if (had_command_sigterm)
2661 smtp_command_sigterm_exit();
2662 if (had_data_timeout)
2663 smtp_data_timeout_exit();
2664 if (had_data_sigint)
2665 smtp_data_sigint_exit();
2666
2667 /* SSL_ERROR_ZERO_RETURN appears to mean that the SSL session has been
2668 closed down, not that the socket itself has been closed down. Revert to
2669 non-SSL handling. */
2670
2671 switch(error)
2672 {
2673 case SSL_ERROR_NONE:
2674 break;
2675
2676 case SSL_ERROR_ZERO_RETURN:
2677 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2678
2679 receive_getc = smtp_getc;
2680 receive_getbuf = smtp_getbuf;
2681 receive_get_cache = smtp_get_cache;
2682 receive_ungetc = smtp_ungetc;
2683 receive_feof = smtp_feof;
2684 receive_ferror = smtp_ferror;
2685 receive_smtp_buffered = smtp_buffered;
2686
2687 if (SSL_get_shutdown(server_ssl) == SSL_RECEIVED_SHUTDOWN)
2688 SSL_shutdown(server_ssl);
2689
2690 #ifndef DISABLE_OCSP
2691 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2692 server_static_cbinfo->verify_stack = NULL;
2693 #endif
2694 SSL_free(server_ssl);
2695 SSL_CTX_free(server_ctx);
2696 server_ctx = NULL;
2697 server_ssl = NULL;
2698 tls_in.active.sock = -1;
2699 tls_in.active.tls_ctx = NULL;
2700 tls_in.bits = 0;
2701 tls_in.cipher = NULL;
2702 tls_in.peerdn = NULL;
2703 tls_in.sni = NULL;
2704
2705 return FALSE;
2706
2707 /* Handle genuine errors */
2708 case SSL_ERROR_SSL:
2709 ERR_error_string(ERR_get_error(), ssl_errstring);
2710 log_write(0, LOG_MAIN, "TLS error (SSL_read): %s", ssl_errstring);
2711 ssl_xfer_error = TRUE;
2712 return FALSE;
2713
2714 default:
2715 DEBUG(D_tls) debug_printf("Got SSL error %d\n", error);
2716 DEBUG(D_tls) if (error == SSL_ERROR_SYSCALL)
2717 debug_printf(" - syscall %s\n", strerror(errno));
2718 ssl_xfer_error = TRUE;
2719 return FALSE;
2720 }
2721
2722 #ifndef DISABLE_DKIM
2723 dkim_exim_verify_feed(ssl_xfer_buffer, inbytes);
2724 #endif
2725 ssl_xfer_buffer_hwm = inbytes;
2726 ssl_xfer_buffer_lwm = 0;
2727 return TRUE;
2728 }
2729
2730
2731 /*************************************************
2732 * TLS version of getc *
2733 *************************************************/
2734
2735 /* This gets the next byte from the TLS input buffer. If the buffer is empty,
2736 it refills the buffer via the SSL reading function.
2737
2738 Arguments: lim Maximum amount to read/buffer
2739 Returns: the next character or EOF
2740
2741 Only used by the server-side TLS.
2742 */
2743
2744 int
2745 tls_getc(unsigned lim)
2746 {
2747 if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2748 if (!tls_refill(lim))
2749 return ssl_xfer_error ? EOF : smtp_getc(lim);
2750
2751 /* Something in the buffer; return next uschar */
2752
2753 return ssl_xfer_buffer[ssl_xfer_buffer_lwm++];
2754 }
2755
2756 uschar *
2757 tls_getbuf(unsigned * len)
2758 {
2759 unsigned size;
2760 uschar * buf;
2761
2762 if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2763 if (!tls_refill(*len))
2764 {
2765 if (!ssl_xfer_error) return smtp_getbuf(len);
2766 *len = 0;
2767 return NULL;
2768 }
2769
2770 if ((size = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm) > *len)
2771 size = *len;
2772 buf = &ssl_xfer_buffer[ssl_xfer_buffer_lwm];
2773 ssl_xfer_buffer_lwm += size;
2774 *len = size;
2775 return buf;
2776 }
2777
2778
2779 void
2780 tls_get_cache()
2781 {
2782 #ifndef DISABLE_DKIM
2783 int n = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm;
2784 if (n > 0)
2785 dkim_exim_verify_feed(ssl_xfer_buffer+ssl_xfer_buffer_lwm, n);
2786 #endif
2787 }
2788
2789
2790 BOOL
2791 tls_could_read(void)
2792 {
2793 return ssl_xfer_buffer_lwm < ssl_xfer_buffer_hwm || SSL_pending(server_ssl) > 0;
2794 }
2795
2796
2797 /*************************************************
2798 * Read bytes from TLS channel *
2799 *************************************************/
2800
2801 /*
2802 Arguments:
2803 ct_ctx client context pointer, or NULL for the one global server context
2804 buff buffer of data
2805 len size of buffer
2806
2807 Returns: the number of bytes read
2808 -1 after a failed read, including EOF
2809
2810 Only used by the client-side TLS.
2811 */
2812
2813 int
2814 tls_read(void * ct_ctx, uschar *buff, size_t len)
2815 {
2816 SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
2817 int inbytes;
2818 int error;
2819
2820 DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", ssl,
2821 buff, (unsigned int)len);
2822
2823 inbytes = SSL_read(ssl, CS buff, len);
2824 error = SSL_get_error(ssl, inbytes);
2825
2826 if (error == SSL_ERROR_ZERO_RETURN)
2827 {
2828 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2829 return -1;
2830 }
2831 else if (error != SSL_ERROR_NONE)
2832 return -1;
2833
2834 return inbytes;
2835 }
2836
2837
2838
2839
2840
2841 /*************************************************
2842 * Write bytes down TLS channel *
2843 *************************************************/
2844
2845 /*
2846 Arguments:
2847 ct_ctx client context pointer, or NULL for the one global server context
2848 buff buffer of data
2849 len number of bytes
2850 more further data expected soon
2851
2852 Returns: the number of bytes after a successful write,
2853 -1 after a failed write
2854
2855 Used by both server-side and client-side TLS.
2856 */
2857
2858 int
2859 tls_write(void * ct_ctx, const uschar *buff, size_t len, BOOL more)
2860 {
2861 int outbytes, error, left;
2862 SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
2863 static gstring * corked = NULL;
2864
2865 DEBUG(D_tls) debug_printf("%s(%p, %lu%s)\n", __FUNCTION__,
2866 buff, (unsigned long)len, more ? ", more" : "");
2867
2868 /* Lacking a CORK or MSG_MORE facility (such as GnuTLS has) we copy data when
2869 "more" is notified. This hack is only ok if small amounts are involved AND only
2870 one stream does it, in one context (i.e. no store reset). Currently it is used
2871 for the responses to the received SMTP MAIL , RCPT, DATA sequence, only. */
2872
2873 if (!ct_ctx && (more || corked))
2874 {
2875 corked = string_catn(corked, buff, len);
2876 if (more)
2877 return len;
2878 buff = CUS corked->s;
2879 len = corked->ptr;
2880 corked = NULL;
2881 }
2882
2883 for (left = len; left > 0;)
2884 {
2885 DEBUG(D_tls) debug_printf("SSL_write(%p, %p, %d)\n", ssl, buff, left);
2886 outbytes = SSL_write(ssl, CS buff, left);
2887 error = SSL_get_error(ssl, outbytes);
2888 DEBUG(D_tls) debug_printf("outbytes=%d error=%d\n", outbytes, error);
2889 switch (error)
2890 {
2891 case SSL_ERROR_SSL:
2892 ERR_error_string(ERR_get_error(), ssl_errstring);
2893 log_write(0, LOG_MAIN, "TLS error (SSL_write): %s", ssl_errstring);
2894 return -1;
2895
2896 case SSL_ERROR_NONE:
2897 left -= outbytes;
2898 buff += outbytes;
2899 break;
2900
2901 case SSL_ERROR_ZERO_RETURN:
2902 log_write(0, LOG_MAIN, "SSL channel closed on write");
2903 return -1;
2904
2905 case SSL_ERROR_SYSCALL:
2906 log_write(0, LOG_MAIN, "SSL_write: (from %s) syscall: %s",
2907 sender_fullhost ? sender_fullhost : US"<unknown>",
2908 strerror(errno));
2909 return -1;
2910
2911 default:
2912 log_write(0, LOG_MAIN, "SSL_write error %d", error);
2913 return -1;
2914 }
2915 }
2916 return len;
2917 }
2918
2919
2920
2921 /*************************************************
2922 * Close down a TLS session *
2923 *************************************************/
2924
2925 /* This is also called from within a delivery subprocess forked from the
2926 daemon, to shut down the TLS library, without actually doing a shutdown (which
2927 would tamper with the SSL session in the parent process).
2928
2929 Arguments:
2930 ct_ctx client TLS context pointer, or NULL for the one global server context
2931 shutdown 1 if TLS close-alert is to be sent,
2932 2 if also response to be waited for
2933
2934 Returns: nothing
2935
2936 Used by both server-side and client-side TLS.
2937 */
2938
2939 void
2940 tls_close(void * ct_ctx, int shutdown)
2941 {
2942 exim_openssl_client_tls_ctx * o_ctx = ct_ctx;
2943 SSL_CTX **ctxp = o_ctx ? &o_ctx->ctx : &server_ctx;
2944 SSL **sslp = o_ctx ? &o_ctx->ssl : &server_ssl;
2945 int *fdp = o_ctx ? &tls_out.active.sock : &tls_in.active.sock;
2946
2947 if (*fdp < 0) return; /* TLS was not active */
2948
2949 if (shutdown)
2950 {
2951 int rc;
2952 DEBUG(D_tls) debug_printf("tls_close(): shutting down TLS%s\n",
2953 shutdown > 1 ? " (with response-wait)" : "");
2954
2955 if ( (rc = SSL_shutdown(*sslp)) == 0 /* send "close notify" alert */
2956 && shutdown > 1)
2957 {
2958 alarm(2);
2959 rc = SSL_shutdown(*sslp); /* wait for response */
2960 alarm(0);
2961 }
2962
2963 if (rc < 0) DEBUG(D_tls)
2964 {
2965 ERR_error_string(ERR_get_error(), ssl_errstring);
2966 debug_printf("SSL_shutdown: %s\n", ssl_errstring);
2967 }
2968 }
2969
2970 #ifndef DISABLE_OCSP
2971 if (!o_ctx) /* server side */
2972 {
2973 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2974 server_static_cbinfo->verify_stack = NULL;
2975 }
2976 #endif
2977
2978 SSL_CTX_free(*ctxp);
2979 SSL_free(*sslp);
2980 *ctxp = NULL;
2981 *sslp = NULL;
2982 *fdp = -1;
2983 }
2984
2985
2986
2987
2988 /*************************************************
2989 * Let tls_require_ciphers be checked at startup *
2990 *************************************************/
2991
2992 /* The tls_require_ciphers option, if set, must be something which the
2993 library can parse.
2994
2995 Returns: NULL on success, or error message
2996 */
2997
2998 uschar *
2999 tls_validate_require_cipher(void)
3000 {
3001 SSL_CTX *ctx;
3002 uschar *s, *expciphers, *err;
3003
3004 /* this duplicates from tls_init(), we need a better "init just global
3005 state, for no specific purpose" singleton function of our own */
3006
3007 SSL_load_error_strings();
3008 OpenSSL_add_ssl_algorithms();
3009 #if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
3010 /* SHA256 is becoming ever more popular. This makes sure it gets added to the
3011 list of available digests. */
3012 EVP_add_digest(EVP_sha256());
3013 #endif
3014
3015 if (!(tls_require_ciphers && *tls_require_ciphers))
3016 return NULL;
3017
3018 if (!expand_check(tls_require_ciphers, US"tls_require_ciphers", &expciphers,
3019 &err))
3020 return US"failed to expand tls_require_ciphers";
3021
3022 if (!(expciphers && *expciphers))
3023 return NULL;
3024
3025 /* normalisation ripped from above */
3026 s = expciphers;
3027 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
3028
3029 err = NULL;
3030
3031 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
3032 if (!(ctx = SSL_CTX_new(TLS_server_method())))
3033 #else
3034 if (!(ctx = SSL_CTX_new(SSLv23_server_method())))
3035 #endif
3036 {
3037 ERR_error_string(ERR_get_error(), ssl_errstring);
3038 return string_sprintf("SSL_CTX_new() failed: %s", ssl_errstring);
3039 }
3040
3041 DEBUG(D_tls)
3042 debug_printf("tls_require_ciphers expands to \"%s\"\n", expciphers);
3043
3044 if (!SSL_CTX_set_cipher_list(ctx, CS expciphers))
3045 {
3046 ERR_error_string(ERR_get_error(), ssl_errstring);
3047 err = string_sprintf("SSL_CTX_set_cipher_list(%s) failed: %s",
3048 expciphers, ssl_errstring);
3049 }
3050
3051 SSL_CTX_free(ctx);
3052
3053 return err;
3054 }
3055
3056
3057
3058
3059 /*************************************************
3060 * Report the library versions. *
3061 *************************************************/
3062
3063 /* There have historically been some issues with binary compatibility in
3064 OpenSSL libraries; if Exim (like many other applications) is built against
3065 one version of OpenSSL but the run-time linker picks up another version,
3066 it can result in serious failures, including crashing with a SIGSEGV. So
3067 report the version found by the compiler and the run-time version.
3068
3069 Note: some OS vendors backport security fixes without changing the version
3070 number/string, and the version date remains unchanged. The _build_ date
3071 will change, so we can more usefully assist with version diagnosis by also
3072 reporting the build date.
3073
3074 Arguments: a FILE* to print the results to
3075 Returns: nothing
3076 */
3077
3078 void
3079 tls_version_report(FILE *f)
3080 {
3081 fprintf(f, "Library version: OpenSSL: Compile: %s\n"
3082 " Runtime: %s\n"
3083 " : %s\n",
3084 OPENSSL_VERSION_TEXT,
3085 SSLeay_version(SSLEAY_VERSION),
3086 SSLeay_version(SSLEAY_BUILT_ON));
3087 /* third line is 38 characters for the %s and the line is 73 chars long;
3088 the OpenSSL output includes a "built on: " prefix already. */
3089 }
3090
3091
3092
3093
3094 /*************************************************
3095 * Random number generation *
3096 *************************************************/
3097
3098 /* Pseudo-random number generation. The result is not expected to be
3099 cryptographically strong but not so weak that someone will shoot themselves
3100 in the foot using it as a nonce in input in some email header scheme or
3101 whatever weirdness they'll twist this into. The result should handle fork()
3102 and avoid repeating sequences. OpenSSL handles that for us.
3103
3104 Arguments:
3105 max range maximum
3106 Returns a random number in range [0, max-1]
3107 */
3108
3109 int
3110 vaguely_random_number(int max)
3111 {
3112 unsigned int r;
3113 int i, needed_len;
3114 static pid_t pidlast = 0;
3115 pid_t pidnow;
3116 uschar *p;
3117 uschar smallbuf[sizeof(r)];
3118
3119 if (max <= 1)
3120 return 0;
3121
3122 pidnow = getpid();
3123 if (pidnow != pidlast)
3124 {
3125 /* Although OpenSSL documents that "OpenSSL makes sure that the PRNG state
3126 is unique for each thread", this doesn't apparently apply across processes,
3127 so our own warning from vaguely_random_number_fallback() applies here too.
3128 Fix per PostgreSQL. */
3129 if (pidlast != 0)
3130 RAND_cleanup();
3131 pidlast = pidnow;
3132 }
3133
3134 /* OpenSSL auto-seeds from /dev/random, etc, but this a double-check. */
3135 if (!RAND_status())
3136 {
3137 randstuff r;
3138 gettimeofday(&r.tv, NULL);
3139 r.p = getpid();
3140
3141 RAND_seed(US (&r), sizeof(r));
3142 }
3143 /* We're after pseudo-random, not random; if we still don't have enough data
3144 in the internal PRNG then our options are limited. We could sleep and hope
3145 for entropy to come along (prayer technique) but if the system is so depleted
3146 in the first place then something is likely to just keep taking it. Instead,
3147 we'll just take whatever little bit of pseudo-random we can still manage to
3148 get. */
3149
3150 needed_len = sizeof(r);
3151 /* Don't take 8 times more entropy than needed if int is 8 octets and we were
3152 asked for a number less than 10. */
3153 for (r = max, i = 0; r; ++i)
3154 r >>= 1;
3155 i = (i + 7) / 8;
3156 if (i < needed_len)
3157 needed_len = i;
3158
3159 #ifdef EXIM_HAVE_RAND_PSEUDO
3160 /* We do not care if crypto-strong */
3161 i = RAND_pseudo_bytes(smallbuf, needed_len);
3162 #else
3163 i = RAND_bytes(smallbuf, needed_len);
3164 #endif
3165
3166 if (i < 0)
3167 {
3168 DEBUG(D_all)
3169 debug_printf("OpenSSL RAND_pseudo_bytes() not supported by RAND method, using fallback.\n");
3170 return vaguely_random_number_fallback(max);
3171 }
3172
3173 r = 0;
3174 for (p = smallbuf; needed_len; --needed_len, ++p)
3175 {
3176 r *= 256;
3177 r += *p;
3178 }
3179
3180 /* We don't particularly care about weighted results; if someone wants
3181 smooth distribution and cares enough then they should submit a patch then. */
3182 return r % max;
3183 }
3184
3185
3186
3187
3188 /*************************************************
3189 * OpenSSL option parse *
3190 *************************************************/
3191
3192 /* Parse one option for tls_openssl_options_parse below
3193
3194 Arguments:
3195 name one option name
3196 value place to store a value for it
3197 Returns success or failure in parsing
3198 */
3199
3200
3201
3202 static BOOL
3203 tls_openssl_one_option_parse(uschar *name, long *value)
3204 {
3205 int first = 0;
3206 int last = exim_openssl_options_size;
3207 while (last > first)
3208 {
3209 int middle = (first + last)/2;
3210 int c = Ustrcmp(name, exim_openssl_options[middle].name);
3211 if (c == 0)
3212 {
3213 *value = exim_openssl_options[middle].value;
3214 return TRUE;
3215 }
3216 else if (c > 0)
3217 first = middle + 1;
3218 else
3219 last = middle;
3220 }
3221 return FALSE;
3222 }
3223
3224
3225
3226
3227 /*************************************************
3228 * OpenSSL option parsing logic *
3229 *************************************************/
3230
3231 /* OpenSSL has a number of compatibility options which an administrator might
3232 reasonably wish to set. Interpret a list similarly to decode_bits(), so that
3233 we look like log_selector.
3234
3235 Arguments:
3236 option_spec the administrator-supplied string of options
3237 results ptr to long storage for the options bitmap
3238 Returns success or failure
3239 */
3240
3241 BOOL
3242 tls_openssl_options_parse(uschar *option_spec, long *results)
3243 {
3244 long result, item;
3245 uschar *s, *end;
3246 uschar keep_c;
3247 BOOL adding, item_parsed;
3248
3249 result = SSL_OP_NO_TICKET;
3250 /* Prior to 4.80 we or'd in SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; removed
3251 * from default because it increases BEAST susceptibility. */
3252 #ifdef SSL_OP_NO_SSLv2
3253 result |= SSL_OP_NO_SSLv2;
3254 #endif
3255 #ifdef SSL_OP_SINGLE_DH_USE
3256 result |= SSL_OP_SINGLE_DH_USE;
3257 #endif
3258
3259 if (!option_spec)
3260 {
3261 *results = result;
3262 return TRUE;
3263 }
3264
3265 for (s=option_spec; *s != '\0'; /**/)
3266 {
3267 while (isspace(*s)) ++s;
3268 if (*s == '\0')
3269 break;
3270 if (*s != '+' && *s != '-')
3271 {
3272 DEBUG(D_tls) debug_printf("malformed openssl option setting: "
3273 "+ or - expected but found \"%s\"\n", s);
3274 return FALSE;
3275 }
3276 adding = *s++ == '+';
3277 for (end = s; (*end != '\0') && !isspace(*end); ++end) /**/ ;
3278 keep_c = *end;
3279 *end = '\0';
3280 item_parsed = tls_openssl_one_option_parse(s, &item);
3281 *end = keep_c;
3282 if (!item_parsed)
3283 {
3284 DEBUG(D_tls) debug_printf("openssl option setting unrecognised: \"%s\"\n", s);
3285 return FALSE;
3286 }
3287 DEBUG(D_tls) debug_printf("openssl option, %s from %lx: %lx (%s)\n",
3288 adding ? "adding" : "removing", result, item, s);
3289 if (adding)
3290 result |= item;
3291 else
3292 result &= ~item;
3293 s = end;
3294 }
3295
3296 *results = result;
3297 return TRUE;
3298 }
3299
3300 #endif /*!MACRO_PREDEF*/
3301 /* vi: aw ai sw=2
3302 */
3303 /* End of tls-openssl.c */