/*
* Claws Mail -- a GTK+ based, lightweight, and fast e-mail client
- * Copyright (C) 1999-2007 Colin Leroy <colin@colino.net>
+ * Copyright (C) 1999-2016 Colin Leroy <colin@colino.net>
* and the Claws Mail team
*
* This program is free software; you can redistribute it and/or modify
#ifdef HAVE_CONFIG_H
# include "config.h"
+#include "claws-features.h"
#endif
-#if (defined(USE_OPENSSL) || defined (USE_GNUTLS))
+#ifdef USE_GNUTLS
-#if USE_OPENSSL
-#include <openssl/ssl.h>
-#else
#include <gnutls/gnutls.h>
#include <gnutls/x509.h>
#include <sys/types.h>
#include <stdio.h>
#include <unistd.h>
#include <string.h>
-#endif
+
#include <glib.h>
#include <glib/gi18n.h>
#include <gtk/gtk.h>
char *issuer_commonname, *issuer_location, *issuer_organization;
char *subject_commonname, *subject_location, *subject_organization;
char *sig_status, *exp_date;
- char *md5_fingerprint, *sha1_fingerprint, *fingerprint;
- unsigned int n;
+ char *sha1_fingerprint, *sha256_fingerprint, *fingerprint;
+ size_t n;
char buf[100];
unsigned char md[128];
-#if USE_OPENSSL
- ASN1_TIME *validity;
-#else
char *tmp;
-#endif
time_t exp_time_t;
struct tm lt;
/* issuer */
-#if USE_OPENSSL
- if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_commonName, buf, 100) >= 0)
- issuer_commonname = g_strdup(buf);
- else
- issuer_commonname = g_strdup(_("<not in certificate>"));
- if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_localityName, buf, 100) >= 0) {
- issuer_location = g_strdup(buf);
- if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_countryName, buf, 100) >= 0)
- issuer_location = g_strconcat(issuer_location,", ",buf, NULL);
- } else if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_countryName, buf, 100) >= 0)
- issuer_location = g_strdup(buf);
- else
- issuer_location = g_strdup(_("<not in certificate>"));
-
- if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_organizationName, buf, 100) >= 0)
- issuer_organization = g_strdup(buf);
- else
- issuer_organization = g_strdup(_("<not in certificate>"));
-
- /* subject */
- if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_commonName, buf, 100) >= 0)
- subject_commonname = g_strdup(buf);
- else
- subject_commonname = g_strdup(_("<not in certificate>"));
- if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_localityName, buf, 100) >= 0) {
- subject_location = g_strdup(buf);
- if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_countryName, buf, 100) >= 0)
- subject_location = g_strconcat(subject_location,", ",buf, NULL);
- } else if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_countryName, buf, 100) >= 0)
- subject_location = g_strdup(buf);
- else
- subject_location = g_strdup(_("<not in certificate>"));
-
- if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_organizationName, buf, 100) >= 0)
- subject_organization = g_strdup(buf);
- else
- subject_organization = g_strdup(_("<not in certificate>"));
-
- if ((validity = X509_get_notAfter(cert->x509_cert)) != NULL) {
- exp_time_t = asn1toTime(validity);
- } else {
- exp_time_t = (time_t)0;
- }
-#else
issuer_commonname = g_malloc(BUFFSIZE);
issuer_location = g_malloc(BUFFSIZE);
issuer_organization = g_malloc(BUFFSIZE);
tmp = g_malloc(BUFFSIZE);
if (gnutls_x509_crt_get_issuer_dn_by_oid(cert->x509_cert,
GNUTLS_OID_X520_COUNTRY_NAME, 0, 0, tmp, &n) == 0) {
- strncat(issuer_location, ", ", BUFFSIZE-strlen(issuer_location));
- strncat(issuer_location, tmp, BUFFSIZE-strlen(issuer_location));
+ strncat(issuer_location, ", ", BUFFSIZE-strlen(issuer_location)-1);
+ strncat(issuer_location, tmp, BUFFSIZE-strlen(issuer_location)-1);
}
g_free(tmp);
}
tmp = g_malloc(BUFFSIZE);
if (gnutls_x509_crt_get_dn_by_oid(cert->x509_cert,
GNUTLS_OID_X520_COUNTRY_NAME, 0, 0, tmp, &n) == 0) {
- strncat(subject_location, ", ", BUFFSIZE-strlen(subject_location));
- strncat(subject_location, tmp, BUFFSIZE-strlen(subject_location));
+ strncat(subject_location, ", ", BUFFSIZE-strlen(subject_location)-1);
+ strncat(subject_location, tmp, BUFFSIZE-strlen(subject_location)-1);
}
g_free(tmp);
}
strncpy(subject_organization, _("<not in certificate>"), BUFFSIZE);
exp_time_t = gnutls_x509_crt_get_expiration_time(cert->x509_cert);
-#endif
memset(buf, 0, sizeof(buf));
- strftime(buf, sizeof(buf)-1, prefs_common.date_format, localtime_r(&exp_time_t, <));
- exp_date = (*buf) ? g_strdup(buf):g_strdup("?");
+ if (exp_time_t > 0) {
+ fast_strftime(buf, sizeof(buf)-1, prefs_common.date_format, localtime_r(&exp_time_t, <));
+ exp_date = (*buf) ? g_strdup(buf):g_strdup("?");
+ } else
+ exp_date = g_strdup("");
/* fingerprint */
-#if USE_OPENSSL
- X509_digest(cert->x509_cert, EVP_md5(), md, &n);
- md5_fingerprint = readable_fingerprint(md, (int)n);
- X509_digest(cert->x509_cert, EVP_sha1(), md, &n);
- sha1_fingerprint = readable_fingerprint(md, (int)n);
-
- /* signature */
- sig_status = ssl_certificate_check_signer(cert->x509_cert);
-#else
- n = 128;
- gnutls_x509_crt_get_fingerprint(cert->x509_cert, GNUTLS_DIG_MD5, md, &n);
- md5_fingerprint = readable_fingerprint(md, (int)n);
n = 128;
gnutls_x509_crt_get_fingerprint(cert->x509_cert, GNUTLS_DIG_SHA1, md, &n);
sha1_fingerprint = readable_fingerprint(md, (int)n);
+ gnutls_x509_crt_get_fingerprint(cert->x509_cert, GNUTLS_DIG_SHA256, md, &n);
+ sha256_fingerprint = readable_fingerprint(md, (int)n);
+
/* signature */
- sig_status = ssl_certificate_check_signer(cert->x509_cert, cert->status);
-#endif
+ sig_status = ssl_certificate_check_signer(cert, cert->status);
if (sig_status==NULL)
- sig_status = g_strdup(_("correct"));
+ sig_status = g_strdup_printf(_("Correct%s"),exp_time_t < time(NULL)? _(" (expired)"): "");
+ else if (exp_time_t < time(NULL))
+ sig_status = g_strconcat(sig_status,_(" (expired)"),NULL);
vbox = gtk_vbox_new(FALSE, 5);
hbox = gtk_hbox_new(FALSE, 5);
label = gtk_label_new(_("Fingerprint: \n"));
gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
gtk_table_attach(status_table, label, 0, 1, 0, 1, GTK_EXPAND|GTK_FILL, 0, 0, 0);
- fingerprint = g_strdup_printf("MD5: %s\nSHA1: %s",
- md5_fingerprint, sha1_fingerprint);
+ fingerprint = g_strdup_printf("SHA1: %s\nSHA256: %s",
+ sha1_fingerprint, sha256_fingerprint);
label = gtk_label_new(fingerprint);
g_free(fingerprint);
gtk_label_set_selectable(GTK_LABEL(label), TRUE);
gtk_label_set_selectable(GTK_LABEL(label), TRUE);
gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
gtk_table_attach(status_table, label, 1, 2, 1, 2, GTK_EXPAND|GTK_FILL, 0, 0, 0);
- label = gtk_label_new(_("Expires on: "));
+ label = gtk_label_new(exp_time_t < time(NULL)? _("Expired on: "): _("Expires on: "));
gtk_misc_set_alignment (GTK_MISC (label), 1, 0.5);
gtk_table_attach(status_table, label, 0, 1, 2, 3, GTK_EXPAND|GTK_FILL, 0, 0, 0);
label = gtk_label_new(exp_date);
g_free(subject_commonname);
g_free(subject_location);
g_free(subject_organization);
- g_free(md5_fingerprint);
g_free(sha1_fingerprint);
+ g_free(sha256_fingerprint);
g_free(sig_status);
g_free(exp_date);
return vbox;
{
SSLCertHookData *hookdata = (SSLCertHookData *)source;
- if (prefs_common.skip_ssl_cert_check)
- return TRUE;
-
if (hookdata == NULL) {
return FALSE;
}
+
+ if (prefs_common.skip_ssl_cert_check) {
+ hookdata->accept = TRUE;
+ return TRUE;
+ }
+
if (hookdata->old_cert == NULL) {
if (hookdata->expired)
hookdata->accept = sslcertwindow_ask_expired_cert(hookdata->cert);
} else {
hookdata->accept = sslcertwindow_ask_changed_cert(hookdata->old_cert, hookdata->cert);
}
+
return TRUE;
}
GtkWidget *cert_widget = cert_presenter(cert);
gchar *buf;
- buf = g_strdup_printf(_("SSL certificate for %s"), cert->host);
+ buf = g_strdup_printf(_("SSL/TLS certificate for %s"), cert->host);
alertpanel_full(buf, NULL, GTK_STOCK_CLOSE, NULL, NULL,
- FALSE, cert_widget, ALERT_NOTICE, G_ALERTDEFAULT);
+ ALERTFOCUS_FIRST, FALSE, cert_widget, ALERT_NOTICE);
g_free(buf);
}
+static gchar *sslcertwindow_get_invalid_str(SSLCertificate *cert)
+{
+ gchar *subject_cn = NULL;
+ gchar *str = NULL;
+
+ if (ssl_certificate_check_subject_cn(cert))
+ return g_strdup("");
+
+ subject_cn = ssl_certificate_get_subject_cn(cert);
+
+ str = g_strdup_printf(_("Certificate is for %s, but connection is to %s.\n"
+ "You may be connecting to a rogue server.\n\n"),
+ subject_cn, cert->host);
+ g_free(subject_cn);
+
+ return str;
+}
+
static gboolean sslcertwindow_ask_new_cert(SSLCertificate *cert)
{
gchar *buf, *sig_status;
GtkWidget *label;
GtkWidget *button;
GtkWidget *cert_widget;
-
+ gchar *invalid_str = sslcertwindow_get_invalid_str(cert);
+ const gchar *title;
+
vbox = gtk_vbox_new(FALSE, 5);
- buf = g_strdup_printf(_("Certificate for %s is unknown.\nDo you want to accept it?"), cert->host);
+ buf = g_strdup_printf(_("Certificate for %s is unknown.\n%sDo you want to accept it?"), cert->host, invalid_str);
+ g_free(invalid_str);
+
label = gtk_label_new(buf);
gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
g_free(buf);
-#if USE_OPENSSL
- sig_status = ssl_certificate_check_signer(cert->x509_cert);
-#else
- sig_status = ssl_certificate_check_signer(cert->x509_cert, cert->status);
-#endif
+ sig_status = ssl_certificate_check_signer(cert, cert->status);
if (sig_status==NULL)
- sig_status = g_strdup(_("correct"));
+ sig_status = g_strdup(_("Correct"));
buf = g_strdup_printf(_("Signature status: %s"), sig_status);
label = gtk_label_new(buf);
cert_widget = cert_presenter(cert);
gtk_container_add(GTK_CONTAINER(button), cert_widget);
- val = alertpanel_full(_("Unknown SSL Certificate"), NULL,
+ if (!ssl_certificate_check_subject_cn(cert))
+ title = _("SSL/TLS certificate is invalid");
+ else
+ title = _("SSL/TLS certificate is unknown");
+
+ val = alertpanel_full(title, NULL,
_("_Cancel connection"), _("_Accept and save"), NULL,
- FALSE, vbox, ALERT_QUESTION, G_ALERTDEFAULT);
+ ALERTFOCUS_FIRST, FALSE, vbox, ALERT_QUESTION);
return (val == G_ALERTALTERNATE);
}
GtkWidget *label;
GtkWidget *button;
GtkWidget *cert_widget;
-
+ gchar *invalid_str = sslcertwindow_get_invalid_str(cert);
+ const gchar *title;
+
vbox = gtk_vbox_new(FALSE, 5);
- buf = g_strdup_printf(_("Certificate for %s is expired.\nDo you want to continue?"), cert->host);
+ buf = g_strdup_printf(_("Certificate for %s is expired.\n%sDo you want to continue?"), cert->host, invalid_str);
+ g_free(invalid_str);
+
label = gtk_label_new(buf);
gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
gtk_box_pack_start(GTK_BOX(vbox), label, TRUE, TRUE, 0);
g_free(buf);
-#if USE_OPENSSL
- sig_status = ssl_certificate_check_signer(cert->x509_cert);
-#else
- sig_status = ssl_certificate_check_signer(cert->x509_cert, cert->status);
-#endif
+ sig_status = ssl_certificate_check_signer(cert, cert->status);
if (sig_status==NULL)
- sig_status = g_strdup(_("correct"));
+ sig_status = g_strdup(_("Correct"));
buf = g_strdup_printf(_("Signature status: %s"), sig_status);
label = gtk_label_new(buf);
cert_widget = cert_presenter(cert);
gtk_container_add(GTK_CONTAINER(button), cert_widget);
- val = alertpanel_full(_("Expired SSL Certificate"), NULL,
+ if (!ssl_certificate_check_subject_cn(cert))
+ title = _("SSL/TLS certificate is invalid and expired");
+ else
+ title = _("SSL/TLS certificate is expired");
+
+ val = alertpanel_full(title, NULL,
_("_Cancel connection"), _("_Accept"), NULL,
- FALSE, vbox, ALERT_QUESTION, G_ALERTDEFAULT);
+ ALERTFOCUS_FIRST, FALSE, vbox, ALERT_QUESTION);
return (val == G_ALERTALTERNATE);
}
GtkWidget *label;
GtkWidget *button;
AlertValue val;
-
+ gchar *invalid_str = sslcertwindow_get_invalid_str(new_cert);
+ const gchar *title;
+
vbox = gtk_vbox_new(FALSE, 5);
label = gtk_label_new(_("New certificate:"));
gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
gtk_widget_show_all(vbox);
vbox2 = gtk_vbox_new(FALSE, 5);
- buf = g_strdup_printf(_("Certificate for %s has changed. Do you want to accept it?"), new_cert->host);
+ buf = g_strdup_printf(_("Certificate for %s has changed.\n%sDo you want to accept it?"), new_cert->host, invalid_str);
+ g_free(invalid_str);
+
label = gtk_label_new(buf);
gtk_misc_set_alignment (GTK_MISC (label), 0, 0.5);
gtk_box_pack_start(GTK_BOX(vbox2), label, TRUE, TRUE, 0);
g_free(buf);
-#if USE_OPENSSL
- sig_status = ssl_certificate_check_signer(new_cert->x509_cert);
-#else
- sig_status = ssl_certificate_check_signer(new_cert->x509_cert, new_cert->status);
-#endif
+ sig_status = ssl_certificate_check_signer(new_cert, new_cert->status);
if (sig_status==NULL)
- sig_status = g_strdup(_("correct"));
+ sig_status = g_strdup(_("Correct"));
buf = g_strdup_printf(_("Signature status: %s"), sig_status);
label = gtk_label_new(buf);
gtk_box_pack_start(GTK_BOX(vbox2), button, FALSE, FALSE, 0);
gtk_container_add(GTK_CONTAINER(button), vbox);
- val = alertpanel_full(_("Changed SSL Certificate"), NULL,
+ if (!ssl_certificate_check_subject_cn(new_cert))
+ title = _("SSL/TLS certificate changed and is invalid");
+ else
+ title = _("SSL/TLS certificate changed");
+ val = alertpanel_full(title, NULL,
_("_Cancel connection"), _("_Accept and save"), NULL,
- FALSE, vbox2, ALERT_WARNING, G_ALERTDEFAULT);
+ ALERTFOCUS_FIRST, FALSE, vbox2, ALERT_WARNING);
return (val == G_ALERTALTERNATE);
}