2021-01-30 07:51:39 +01:00
//
// Context.h
//
// Library: NetSSL_OpenSSL
// Package: SSLCore
// Module: Context
//
// Definition of the Context class.
//
// Copyright (c) 2006-2010, Applied Informatics Software Engineering GmbH.
// and Contributors.
//
// SPDX-License-Identifier: BSL-1.0
//
# ifndef NetSSL_Context_INCLUDED
# define NetSSL_Context_INCLUDED
# include "Poco/Net/NetSSL.h"
# include "Poco/Net/SocketDefs.h"
2021-08-22 17:07:06 +02:00
# include "Poco/Net/InvalidCertificateHandler.h"
2021-01-30 07:51:39 +01:00
# include "Poco/Crypto/X509Certificate.h"
# include "Poco/Crypto/EVPPKey.h"
# include "Poco/Crypto/RSAKey.h"
# include "Poco/RefCountedObject.h"
2021-08-22 17:07:06 +02:00
# include "Poco/SharedPtr.h"
2021-01-30 07:51:39 +01:00
# include "Poco/AutoPtr.h"
# include <openssl/ssl.h>
# include <cstdlib>
namespace Poco {
namespace Net {
class NetSSL_API Context : public Poco : : RefCountedObject
/// This class encapsulates context information for
/// an SSL server or client, such as the certificate
/// verification mode and the location of certificates
/// and private key files, as well as the list of
/// supported ciphers.
///
/// The Context class is also used to control
/// SSL session caching on the server and client side.
///
/// A Note Regarding TLSv1.3 Support:
///
/// TLSv1.3 support requires at least OpenSSL version 1.1.1.
/// Make sure that the TLSv1.3 cipher suites are enabled:
///
/// - TLS_AES_256_GCM_SHA384
/// - TLS_CHACHA20_POLY1305_SHA256
/// - TLS_AES_128_GCM_SHA256
/// - TLS_AES_128_CCM_8_SHA256
/// - TLS_AES_128_CCM_SHA256
///
/// The first three of the above cipher suites should be enabled
/// by default in OpenSSL if you do not provide an explicit
/// cipher configuration (cipherList).
{
public :
using Ptr = Poco : : AutoPtr < Context > ;
enum Usage
{
TLS_CLIENT_USE , /// Context is used by a client for TLSv1 or higher. Use requireMinimumProtocol() or disableProtocols() to disable undesired older versions.
TLS_SERVER_USE , /// Context is used by a client for TLSv1 or higher. Use requireMinimumProtocol() or disableProtocols() to disable undesired older versions.
CLIENT_USE , /// DEPRECATED. Context is used by a client.
SERVER_USE , /// DEPRECATED. Context is used by a server.
TLSV1_CLIENT_USE , /// DEPRECATED. Context is used by a client requiring TLSv1.
TLSV1_SERVER_USE , /// DEPRECATED. Context is used by a server requiring TLSv1.
TLSV1_1_CLIENT_USE , /// DEPRECATED. Context is used by a client requiring TLSv1.1 (OpenSSL 1.0.0 or newer).
TLSV1_1_SERVER_USE , /// DEPRECATED. Context is used by a server requiring TLSv1.1 (OpenSSL 1.0.0 or newer).
TLSV1_2_CLIENT_USE , /// DEPRECATED. Context is used by a client requiring TLSv1.2 (OpenSSL 1.0.1 or newer).
TLSV1_2_SERVER_USE , /// DEPRECATED. Context is used by a server requiring TLSv1.2 (OpenSSL 1.0.1 or newer).
TLSV1_3_CLIENT_USE , /// DEPRECATED. Context is used by a client requiring TLSv1.3 (OpenSSL 1.1.1 or newer).
TLSV1_3_SERVER_USE /// DEPRECATED. Context is used by a server requiring TLSv1.3 (OpenSSL 1.1.1 or newer).
} ;
enum VerificationMode
{
VERIFY_NONE = SSL_VERIFY_NONE ,
/// Server: The server will not send a client certificate
/// request to the client, so the client will not send a certificate.
///
/// Client: If not using an anonymous cipher (by default disabled),
/// the server will send a certificate which will be checked, but
/// the result of the check will be ignored.
VERIFY_RELAXED = SSL_VERIFY_PEER ,
/// Server: The server sends a client certificate request to the
/// client. The certificate returned (if any) is checked.
/// If the verification process fails, the TLS/SSL handshake is
/// immediately terminated with an alert message containing the
/// reason for the verification failure.
///
/// Client: The server certificate is verified, if one is provided.
/// If the verification process fails, the TLS/SSL handshake is
/// immediately terminated with an alert message containing the
/// reason for the verification failure.
VERIFY_STRICT = SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT ,
/// Server: If the client did not return a certificate, the TLS/SSL
/// handshake is immediately terminated with a handshake failure
/// alert.
///
/// Client: Same as VERIFY_RELAXED.
VERIFY_ONCE = SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE
/// Server: Only request a client certificate on the initial
/// TLS/SSL handshake. Do not ask for a client certificate
/// again in case of a renegotiation.
///
/// Client: Same as VERIFY_RELAXED.
} ;
enum Protocols
{
PROTO_SSLV2 = 0x01 ,
PROTO_SSLV3 = 0x02 ,
PROTO_TLSV1 = 0x04 ,
PROTO_TLSV1_1 = 0x08 ,
PROTO_TLSV1_2 = 0x10 ,
PROTO_TLSV1_3 = 0x20
} ;
struct NetSSL_API Params
{
Params ( ) ;
/// Initializes the struct with default values.
std : : string privateKeyFile ;
/// Path to the private key file used for encryption.
/// Can be empty if no private key file is used.
std : : string certificateFile ;
/// Path to the certificate file (in PEM format).
2021-08-22 17:07:06 +02:00
///
2021-01-30 07:51:39 +01:00
/// If the private key and the certificate are stored in the same file, this
/// can be empty if privateKeyFile is given.
std : : string caLocation ;
/// Path to the file or directory containing the CA/root certificates.
/// Can be empty if the OpenSSL builtin CA certificates
/// are used (see loadDefaultCAs).
VerificationMode verificationMode ;
/// Specifies whether and how peer certificates are validated.
/// Defaults to VERIFY_RELAXED.
int verificationDepth ;
/// Sets the upper limit for verification chain sizes. Verification
/// will fail if a certificate chain larger than this is encountered.
/// Defaults to 9.
bool loadDefaultCAs ;
/// Specifies whether the builtin CA certificates from OpenSSL are used.
/// Defaults to false.
2021-08-22 17:07:06 +02:00
bool ocspStaplingVerification ;
/// Specifies whether Client should verify OCSP Response
/// Defaults to false.
2021-01-30 07:51:39 +01:00
std : : string cipherList ;
/// Specifies the supported ciphers in OpenSSL notation.
/// Defaults to "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH".
std : : string dhParamsFile ;
/// Specifies a file containing Diffie-Hellman parameters.
/// If empty, the default parameters are used.
bool dhUse2048Bits ;
/// If set to true, will use 2048-bit MODP Group with 256-bit
/// prime order subgroup (RFC5114) instead of 1024-bit for DH.
std : : string ecdhCurve ;
/// OpenSSL 1.0.1 and earlier:
/// Specifies the name of the curve to use for ECDH, based
/// on the curve names specified in RFC 4492.
/// Defaults to "prime256v1".
/// OpenSSL 1.0.2 to 1.1.0:
/// Specifies the colon-separated list of curves
/// to be used for ECDH, based on the curve names
/// defined by OpenSSL, such as
/// "X448:X25519:P-521:P-384:P-256"
/// Defaults to the subset supported by the OpenSSL version
/// among the above.
/// OpenSSL 1.1.1 and above:
/// Specifies the colon-separated list of groups
/// (some of which can be curves) to be used for ECDH
/// and other TLSv1.3 ephemeral key negotiation, based
/// on the group names defined by OpenSSL. Defaults to
/// "X448:X25519:ffdhe4096:ffdhe3072:ffdhe2048:ffdhe6144:ffdhe8192:P-521:P-384:P-256"
} ;
2021-08-22 17:07:06 +02:00
using InvalidCertificateHandlerPtr = Poco : : SharedPtr < InvalidCertificateHandler > ;
2021-01-30 07:51:39 +01:00
Context ( Usage usage , const Params & params ) ;
/// Creates a Context using the given parameters.
///
/// * usage specifies whether the context is used by a client or server.
/// * params specifies the context parameters.
Context (
Usage usage ,
const std : : string & privateKeyFile ,
const std : : string & certificateFile ,
const std : : string & caLocation ,
VerificationMode verificationMode = VERIFY_RELAXED ,
int verificationDepth = 9 ,
bool loadDefaultCAs = false ,
const std : : string & cipherList = " ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH " ) ;
/// Creates a Context.
///
/// * usage specifies whether the context is used by a client or server.
/// * privateKeyFile contains the path to the private key file used for encryption.
/// Can be empty if no private key file is used.
/// * certificateFile contains the path to the certificate file (in PEM format).
/// If the private key and the certificate are stored in the same file, this
/// can be empty if privateKeyFile is given.
/// * caLocation contains the path to the file or directory containing the
/// CA/root certificates. Can be empty if the OpenSSL builtin CA certificates
/// are used (see loadDefaultCAs).
/// * verificationMode specifies whether and how peer certificates are validated.
/// * verificationDepth sets the upper limit for verification chain sizes. Verification
/// will fail if a certificate chain larger than this is encountered.
/// * loadDefaultCAs specifies whether the builtin CA certificates from OpenSSL are used.
/// * cipherList specifies the supported ciphers in OpenSSL notation.
///
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
/// event must be handled.
Context (
Usage usage ,
const std : : string & caLocation ,
VerificationMode verificationMode = VERIFY_RELAXED ,
int verificationDepth = 9 ,
bool loadDefaultCAs = false ,
const std : : string & cipherList = " ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH " ) ;
/// Creates a Context.
///
/// * usage specifies whether the context is used by a client or server.
/// * caLocation contains the path to the file or directory containing the
/// CA/root certificates. Can be empty if the OpenSSL builtin CA certificates
/// are used (see loadDefaultCAs).
/// * verificationMode specifies whether and how peer certificates are validated.
/// * verificationDepth sets the upper limit for verification chain sizes. Verification
/// will fail if a certificate chain larger than this is encountered.
/// * loadDefaultCAs specifies whether the builtin CA certificates from OpenSSL are used.
/// * cipherList specifies the supported ciphers in OpenSSL notation.
///
/// Note that a private key and/or certificate must be specified with
/// usePrivateKey()/useCertificate() before the Context can be used.
~ Context ( ) ;
/// Destroys the Context.
void useCertificate ( const Poco : : Crypto : : X509Certificate & certificate ) ;
/// Sets the certificate to be used by the Context.
///
/// To set-up a complete certificate chain, it might be
/// necessary to call addChainCertificate() to specify
/// additional certificates.
///
/// Note that useCertificate() must always be called before
/// usePrivateKey().
void addChainCertificate ( const Poco : : Crypto : : X509Certificate & certificate ) ;
/// Adds a certificate for certificate chain validation.
void addCertificateAuthority ( const Poco : : Crypto : : X509Certificate & certificate ) ;
/// Add one trusted certification authority to be used by the Context.
void usePrivateKey ( const Poco : : Crypto : : RSAKey & key ) ;
/// Sets the private key to be used by the Context.
///
/// Note that useCertificate() must always be called before
/// usePrivateKey().
///
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
/// event must be handled.
void usePrivateKey ( const Poco : : Crypto : : EVPPKey & pkey ) ;
/// Sets the private key to be used by the Context.
///
/// Note that useCertificate() must always be called before
/// usePrivateKey().
///
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
/// event must be handled.
SSL_CTX * sslContext ( ) const ;
/// Returns the underlying OpenSSL SSL Context object.
Usage usage ( ) const ;
/// Returns whether the context is for use by a client or by a server
/// and whether TLSv1 is required.
bool isForServerUse ( ) const ;
/// Returns true iff the context is for use by a server.
Context : : VerificationMode verificationMode ( ) const ;
/// Returns the verification mode.
void enableSessionCache ( bool flag = true ) ;
/// Enable or disable SSL/TLS session caching.
/// For session caching to work, it must be enabled
/// on the server, as well as on the client side.
///
/// The default is disabled session caching.
///
/// To enable session caching on the server side, use the
/// two-argument version of this method to specify
/// a session ID context.
void enableSessionCache ( bool flag , const std : : string & sessionIdContext ) ;
/// Enables or disables SSL/TLS session caching on the server.
/// For session caching to work, it must be enabled
/// on the server, as well as on the client side.
///
/// SessionIdContext contains the application's unique
/// session ID context, which becomes part of each
/// session identifier generated by the server within this
/// context. SessionIdContext can be an arbitrary sequence
/// of bytes with a maximum length of SSL_MAX_SSL_SESSION_ID_LENGTH.
///
/// A non-empty sessionIdContext should be specified even if
/// session caching is disabled to avoid problems with clients
/// requesting to reuse a session (e.g. Firefox 3.6).
///
/// This method may only be called on SERVER_USE Context objects.
bool sessionCacheEnabled ( ) const ;
/// Returns true iff the session cache is enabled.
void setSessionCacheSize ( std : : size_t size ) ;
/// Sets the maximum size of the server session cache, in number of
/// sessions. The default size (according to OpenSSL documentation)
/// is 1024*20, which may be too large for many applications,
/// especially on embedded platforms with limited memory.
///
/// Specifying a size of 0 will set an unlimited cache size.
///
/// This method may only be called on SERVER_USE Context objects.
std : : size_t getSessionCacheSize ( ) const ;
/// Returns the current maximum size of the server session cache.
///
/// This method may only be called on SERVER_USE Context objects.
void setSessionTimeout ( long seconds ) ;
/// Sets the timeout (in seconds) of cached sessions on the server.
/// A cached session will be removed from the cache if it has
/// not been used for the given number of seconds.
///
/// This method may only be called on SERVER_USE Context objects.
long getSessionTimeout ( ) const ;
/// Returns the timeout (in seconds) of cached sessions on the server.
///
/// This method may only be called on SERVER_USE Context objects.
void flushSessionCache ( ) ;
/// Flushes the SSL session cache on the server.
///
/// This method may only be called on SERVER_USE Context objects.
void enableExtendedCertificateVerification ( bool flag = true ) ;
/// Enable or disable the automatic post-connection
/// extended certificate verification.
///
/// See X509Certificate::verify() for more information.
bool extendedCertificateVerificationEnabled ( ) const ;
/// Returns true iff automatic extended certificate
/// verification is enabled.
void disableStatelessSessionResumption ( ) ;
/// Newer versions of OpenSSL support RFC 4507 tickets for stateless
/// session resumption.
///
/// The feature can be disabled by calling this method.
void disableProtocols ( int protocols ) ;
/// Disables the given protocols.
///
/// The protocols to be disabled are specified by OR-ing
/// values from the Protocols enumeration, e.g.:
///
/// context.disableProtocols(PROTO_SSLV2 | PROTO_SSLV3);
void requireMinimumProtocol ( Protocols protocol ) ;
/// Disables all protocol version lower than the given one.
/// To require at least TLS 1.2 or later:
///
/// context.requireMinimumProtocol(PROTO_TLSV1_2);
void preferServerCiphers ( ) ;
/// When choosing a cipher, use the server's preferences instead of the client
/// preferences. When not called, the SSL server will always follow the clients
/// preferences. When called, the SSL/TLS server will choose following its own
/// preferences.
2021-08-22 17:07:06 +02:00
bool ocspStaplingResponseVerificationEnabled ( ) const ;
/// Returns true if automatic OCSP response
/// reception and verification is enabled for client connections
void setInvalidCertificateHandler ( InvalidCertificateHandlerPtr pInvalidCertificageHandler ) ;
/// Sets a Context-specific InvalidCertificateHandler.
///
/// If specified, this InvalidCertificateHandler will be used instead of the
/// one globally set in the SSLManager.
InvalidCertificateHandlerPtr getInvalidCertificateHandler ( ) const ;
/// Returns the InvalidCertificateHandler set for this Context,
/// or a null pointer if none has been set.
2021-01-30 07:51:39 +01:00
private :
void init ( const Params & params ) ;
/// Initializes the Context with the given parameters.
void initDH ( bool use2048Bits , const std : : string & dhFile ) ;
/// Initializes the Context with Diffie-Hellman parameters.
void initECDH ( const std : : string & curve ) ;
/// Initializes the Context with Elliptic-Curve Diffie-Hellman key
/// exchange curve parameters.
void createSSLContext ( ) ;
/// Create a SSL_CTX object according to Context configuration.
Usage _usage ;
VerificationMode _mode ;
SSL_CTX * _pSSLContext ;
bool _extendedCertificateVerification ;
2021-08-22 17:07:06 +02:00
bool _ocspStaplingResponseVerification ;
InvalidCertificateHandlerPtr _pInvalidCertificateHandler ;
2021-01-30 07:51:39 +01:00
} ;
//
// inlines
//
inline Context : : Usage Context : : usage ( ) const
{
return _usage ;
}
inline bool Context : : isForServerUse ( ) const
{
return _usage = = SERVER_USE
| | _usage = = TLS_SERVER_USE
| | _usage = = TLSV1_SERVER_USE
| | _usage = = TLSV1_1_SERVER_USE
| | _usage = = TLSV1_2_SERVER_USE
| | _usage = = TLSV1_3_SERVER_USE ;
}
inline Context : : VerificationMode Context : : verificationMode ( ) const
{
return _mode ;
}
inline SSL_CTX * Context : : sslContext ( ) const
{
return _pSSLContext ;
}
inline bool Context : : extendedCertificateVerificationEnabled ( ) const
{
return _extendedCertificateVerification ;
}
2021-08-22 17:07:06 +02:00
inline bool Context : : ocspStaplingResponseVerificationEnabled ( ) const
{
return _ocspStaplingResponseVerification ;
}
inline Context : : InvalidCertificateHandlerPtr Context : : getInvalidCertificateHandler ( ) const
{
return _pInvalidCertificateHandler ;
}
2021-01-30 07:51:39 +01:00
} } // namespace Poco::Net
# endif // NetSSL_Context_INCLUDED