#include <openssl/ssl.h>
#include <glib.h>
#include "ssl_certificate.h"
-#include "alertpanel.h"
+#include "sslcertwindow.h"
#include "utils.h"
#include "intl.h"
#include "prefs_common.h"
+#include "log.h"
-static void ssl_certificate_destroy(SSLCertificate *cert);
-static char *ssl_certificate_check_signer (X509 *cert);
+static SSLCertificate *ssl_certificate_new_lookup(X509 *x509_cert, gchar *host, gushort port, gboolean lookup);
-static char * readable_fingerprint(unsigned char *src, int len)
+static char * get_fqdn(char *host)
+{
+ struct hostent *hp;
+
+ if (host == NULL || strlen(host) == 0)
+ return g_strdup("");
+
+ hp = my_gethostbyname(host);
+ if (hp == NULL)
+ return g_strdup(host); /*caller should free*/
+ else
+ return g_strdup(hp->h_name);
+}
+
+char * readable_fingerprint(unsigned char *src, int len)
{
int i=0;
char * ret;
return ret;
}
-SSLCertificate *ssl_certificate_new(X509 *x509_cert, gchar *host)
+SSLCertificate *ssl_certificate_new(X509 *x509_cert, gchar *host, gushort port)
+{
+ return ssl_certificate_new_lookup(x509_cert, host, port, TRUE);
+}
+
+static SSLCertificate *ssl_certificate_new_lookup(X509 *x509_cert, gchar *host, gushort port, gboolean lookup)
{
SSLCertificate *cert = g_new0(SSLCertificate, 1);
ssl_certificate_destroy(cert);
return NULL;
}
-
cert->x509_cert = X509_dup(x509_cert);
- cert->host = g_strdup(host);
+ if (lookup)
+ cert->host = get_fqdn(host);
+ else
+ cert->host = g_strdup(host);
+ cert->port = port;
return cert;
}
static void ssl_certificate_save (SSLCertificate *cert)
{
- gchar *file;
+ gchar *file, *port;
FILE *fp;
+
file = g_strconcat(get_rc_dir(), G_DIR_SEPARATOR_S,
"certs", G_DIR_SEPARATOR_S, NULL);
make_dir_hier(file);
g_free(file);
+ port = g_strdup_printf("%d", cert->port);
file = g_strconcat(get_rc_dir(), G_DIR_SEPARATOR_S,
"certs", G_DIR_SEPARATOR_S,
- cert->host, ".cert", NULL);
+ cert->host, ".", port, ".cert", NULL);
- fp = fopen(file, "w");
+ g_free(port);
+ fp = fopen(file, "wb");
if (fp == NULL) {
g_free(file);
- alertpanel_error(_("Can't save certificate !"));
+ debug_print("Can't save certificate !\n");
return;
}
i2d_X509_fp(fp, cert->x509_cert);
}
-static char* ssl_certificate_to_string(SSLCertificate *cert)
+char* ssl_certificate_to_string(SSLCertificate *cert)
{
char *ret, buf[100];
char *issuer_commonname, *issuer_location, *issuer_organization;
unsigned char md[EVP_MAX_MD_SIZE];
/* issuer */
- X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_commonName, buf, 100);
- issuer_commonname = g_strdup(buf);
- X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_localityName, buf, 100);
- issuer_location = g_strdup(buf);
- X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_countryName, buf, 100);
- issuer_location = g_strconcat(issuer_location,", ",buf, NULL);
- X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
- NID_organizationName, buf, 100);
- issuer_organization = g_strdup(buf);
-
- /* issuer */
- X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_commonName, buf, 100);
- subject_commonname = g_strdup(buf);
- X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_localityName, buf, 100);
- subject_location = g_strdup(buf);
- X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_countryName, buf, 100);
- subject_location = g_strconcat(subject_location,", ",buf, NULL);
- X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
- NID_organizationName, buf, 100);
- subject_organization = g_strdup(buf);
-
+ if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
+ NID_commonName, buf, 100) >= 0)
+ issuer_commonname = g_strdup(buf);
+ else
+ issuer_commonname = g_strdup(_("<not in certificate>"));
+ if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
+ NID_localityName, buf, 100) >= 0) {
+ issuer_location = g_strdup(buf);
+ if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
+ NID_countryName, buf, 100) >= 0)
+ issuer_location = g_strconcat(issuer_location,", ",buf, NULL);
+ } else if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
+ NID_countryName, buf, 100) >= 0)
+ issuer_location = g_strdup(buf);
+ else
+ issuer_location = g_strdup(_("<not in certificate>"));
+
+ if (X509_NAME_get_text_by_NID(X509_get_issuer_name(cert->x509_cert),
+ NID_organizationName, buf, 100) >= 0)
+ issuer_organization = g_strdup(buf);
+ else
+ issuer_organization = g_strdup(_("<not in certificate>"));
+
+ /* subject */
+ if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
+ NID_commonName, buf, 100) >= 0)
+ subject_commonname = g_strdup(buf);
+ else
+ subject_commonname = g_strdup(_("<not in certificate>"));
+ if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
+ NID_localityName, buf, 100) >= 0) {
+ subject_location = g_strdup(buf);
+ if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
+ NID_countryName, buf, 100) >= 0)
+ subject_location = g_strconcat(subject_location,", ",buf, NULL);
+ } else if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
+ NID_countryName, buf, 100) >= 0)
+ subject_location = g_strdup(buf);
+ else
+ subject_location = g_strdup(_("<not in certificate>"));
+
+ if (X509_NAME_get_text_by_NID(X509_get_subject_name(cert->x509_cert),
+ NID_organizationName, buf, 100) >= 0)
+ subject_organization = g_strdup(buf);
+ else
+ subject_organization = g_strdup(_("<not in certificate>"));
+
/* fingerprint */
X509_digest(cert->x509_cert, EVP_md5(), md, &n);
fingerprint = readable_fingerprint(md, (int)n);
void ssl_certificate_destroy(SSLCertificate *cert)
{
- g_return_if_fail(cert != NULL);
+ if (cert == NULL)
+ return;
+
if (cert->x509_cert)
X509_free(cert->x509_cert);
if (cert->host)
cert = NULL;
}
-static SSLCertificate *ssl_certificate_find (gchar *host)
+void ssl_certificate_delete_from_disk(SSLCertificate *cert)
{
+ gchar *buf;
gchar *file;
- gchar buf[1024], *subject, *issuer, *fingerprint;
+ buf = g_strdup_printf("%d", cert->port);
+ file = g_strconcat(get_rc_dir(), G_DIR_SEPARATOR_S,
+ "certs", G_DIR_SEPARATOR_S,
+ cert->host, ".", buf, ".cert", NULL);
+ unlink (file);
+ g_free(buf);
+ g_free(file);
+}
+
+SSLCertificate *ssl_certificate_find (gchar *host, gushort port)
+{
+ return ssl_certificate_find_lookup (host, port, TRUE);
+}
+
+SSLCertificate *ssl_certificate_find_lookup (gchar *host, gushort port, gboolean lookup)
+{
+ gchar *file;
+ gchar *buf;
+ gchar *fqdn_host;
SSLCertificate *cert = NULL;
X509 *tmp_x509;
FILE *fp;
-
+
+ if (lookup)
+ fqdn_host = get_fqdn(host);
+ else
+ fqdn_host = g_strdup(host);
+
+ buf = g_strdup_printf("%d", port);
file = g_strconcat(get_rc_dir(), G_DIR_SEPARATOR_S,
"certs", G_DIR_SEPARATOR_S,
- host, ".cert", NULL);
+ fqdn_host, ".", buf, ".cert", NULL);
- fp = fopen(file, "r");
+ g_free(buf);
+ fp = fopen(file, "rb");
if (fp == NULL) {
g_free(file);
+ g_free(fqdn_host);
return NULL;
}
if ((tmp_x509 = d2i_X509_fp(fp, 0)) != NULL) {
- cert = ssl_certificate_new(tmp_x509, host);
+ cert = ssl_certificate_new_lookup(tmp_x509, fqdn_host, port, lookup);
X509_free(tmp_x509);
}
fclose(fp);
g_free(file);
+ g_free(fqdn_host);
return cert;
}
return FALSE;
}
-static char *ssl_certificate_check_signer (X509 *cert)
+char *ssl_certificate_check_signer (X509 *cert)
{
X509_STORE_CTX store_ctx;
X509_STORE *store;
return NULL;
}
-gboolean ssl_certificate_check (X509 *x509_cert, gchar *host)
+gboolean ssl_certificate_check (X509 *x509_cert, gchar *host, gushort port)
{
- SSLCertificate *current_cert = ssl_certificate_new(x509_cert, host);
+ SSLCertificate *current_cert = ssl_certificate_new(x509_cert, host, port);
SSLCertificate *known_cert;
if (current_cert == NULL) {
return FALSE;
}
- known_cert = ssl_certificate_find (host);
+ known_cert = ssl_certificate_find (host, port);
if (known_cert == NULL) {
- gint val;
- gchar *err_msg, *cur_cert_str;
+ gboolean val;
+ gchar *err_msg, *cur_cert_str, *sig_status;
+ sig_status = ssl_certificate_check_signer(x509_cert);
+
+ if (sig_status == NULL && !prefs_common.ssl_ask_unknown_valid) {
+ /* trust and accept silently if hostnames match */
+ char *buf; /* don't free buf ! */
+ if (X509_NAME_get_text_by_NID(X509_get_subject_name(x509_cert),
+ NID_commonName, buf, 100) >= 0)
+ if (!strcmp(buf, current_cert->host)) {
+ g_free(sig_status);
+ ssl_certificate_save(current_cert);
+ ssl_certificate_destroy(current_cert);
+ return TRUE;
+ }
+ }
+
+ g_free(sig_status);
+
cur_cert_str = ssl_certificate_to_string(current_cert);
err_msg = g_strdup_printf(_("%s presented an unknown SSL certificate:\n%s"),
- host,
+ current_cert->host,
cur_cert_str);
g_free (cur_cert_str);
g_free(err_msg);
return FALSE;
}
-
- val = alertpanel(_("Warning"),
- err_msg,
- _("Accept and save"), _("Cancel connection"), NULL);
+
+ /* FIXME: replace this with a hook, then uncomment the check in ssl.c */
+ val = sslcertwindow_ask_new_cert(current_cert);
g_free(err_msg);
- switch (val) {
- case G_ALERTALTERNATE:
- ssl_certificate_destroy(current_cert);
- return FALSE;
- default:
- ssl_certificate_save(current_cert);
- ssl_certificate_destroy(current_cert);
- return TRUE;
+ if (!val) {
+ ssl_certificate_destroy(current_cert);
+ return FALSE;
+ } else {
+ ssl_certificate_save(current_cert);
+ ssl_certificate_destroy(current_cert);
+ return TRUE;
}
}
else if (!ssl_certificate_compare (current_cert, known_cert)) {
- gint val;
- gchar *err_msg, *known_cert_str, *cur_cert_str, *sig_status;
+ gboolean val;
+ gchar *err_msg, *known_cert_str, *cur_cert_str;
- sig_status = ssl_certificate_check_signer(x509_cert);
-
known_cert_str = ssl_certificate_to_string(known_cert);
cur_cert_str = ssl_certificate_to_string(current_cert);
err_msg = g_strdup_printf(_("%s's SSL certificate changed !\nWe have saved this one:\n%s\n\nIt is now:\n%s\n\nThis could mean the server answering is not the known one."),
- host,
+ current_cert->host,
known_cert_str,
cur_cert_str);
g_free (cur_cert_str);
g_free (known_cert_str);
- if (sig_status)
- g_free (sig_status);
if (prefs_common.no_recv_err_panel) {
log_error(_("%s\n\nMail won't be retrieved on this account until you save the certificate.\n(Uncheck the \"%s\" preference).\n"),
return FALSE;
}
- val = alertpanel(_("Warning"),
- err_msg,
- _("Accept and save"), _("Cancel connection"), NULL);
+ /* FIXME: replace this with a hook, then uncomment the check in ssl.c */
+ val = sslcertwindow_ask_changed_cert(known_cert, current_cert);
g_free(err_msg);
- switch (val) {
- case G_ALERTALTERNATE:
- ssl_certificate_destroy(current_cert);
- ssl_certificate_destroy(known_cert);
- return FALSE;
- default:
- ssl_certificate_save(current_cert);
- ssl_certificate_destroy(current_cert);
- ssl_certificate_destroy(known_cert);
- return TRUE;
+ if (!val) {
+ ssl_certificate_destroy(current_cert);
+ ssl_certificate_destroy(known_cert);
+ return FALSE;
+ } else {
+ ssl_certificate_save(current_cert);
+ ssl_certificate_destroy(current_cert);
+ ssl_certificate_destroy(known_cert);
+ return TRUE;
}
}