mirror of
https://github.com/VCMP-SqMod/SqMod.git
synced 2024-11-08 16:57:16 +01:00
500 lines
18 KiB
C++
500 lines
18 KiB
C++
//
|
|
// Context.h
|
|
//
|
|
// Library: NetSSL_OpenSSL
|
|
// Package: SSLCore
|
|
// Module: Context
|
|
//
|
|
// Definition of the Context class.
|
|
//
|
|
// Copyright (c) 2006-2010, Applied Informatics Software Engineering GmbH.
|
|
// and Contributors.
|
|
//
|
|
// SPDX-License-Identifier: BSL-1.0
|
|
//
|
|
|
|
|
|
#ifndef NetSSL_Context_INCLUDED
|
|
#define NetSSL_Context_INCLUDED
|
|
|
|
|
|
#include "Poco/Net/NetSSL.h"
|
|
#include "Poco/Net/SocketDefs.h"
|
|
#include "Poco/Net/InvalidCertificateHandler.h"
|
|
#include "Poco/Crypto/X509Certificate.h"
|
|
#include "Poco/Crypto/EVPPKey.h"
|
|
#include "Poco/Crypto/RSAKey.h"
|
|
#include "Poco/RefCountedObject.h"
|
|
#include "Poco/SharedPtr.h"
|
|
#include "Poco/AutoPtr.h"
|
|
#include <openssl/ssl.h>
|
|
#include <cstdlib>
|
|
|
|
|
|
namespace Poco {
|
|
namespace Net {
|
|
|
|
|
|
class NetSSL_API Context: public Poco::RefCountedObject
|
|
/// This class encapsulates context information for
|
|
/// an SSL server or client, such as the certificate
|
|
/// verification mode and the location of certificates
|
|
/// and private key files, as well as the list of
|
|
/// supported ciphers.
|
|
///
|
|
/// The Context class is also used to control
|
|
/// SSL session caching on the server and client side.
|
|
///
|
|
/// A Note Regarding TLSv1.3 Support:
|
|
///
|
|
/// TLSv1.3 support requires at least OpenSSL version 1.1.1.
|
|
/// Make sure that the TLSv1.3 cipher suites are enabled:
|
|
///
|
|
/// - TLS_AES_256_GCM_SHA384
|
|
/// - TLS_CHACHA20_POLY1305_SHA256
|
|
/// - TLS_AES_128_GCM_SHA256
|
|
/// - TLS_AES_128_CCM_8_SHA256
|
|
/// - TLS_AES_128_CCM_SHA256
|
|
///
|
|
/// The first three of the above cipher suites should be enabled
|
|
/// by default in OpenSSL if you do not provide an explicit
|
|
/// cipher configuration (cipherList).
|
|
{
|
|
public:
|
|
using Ptr = Poco::AutoPtr<Context>;
|
|
|
|
enum Usage
|
|
{
|
|
TLS_CLIENT_USE, /// Context is used by a client for TLSv1 or higher. Use requireMinimumProtocol() or disableProtocols() to disable undesired older versions.
|
|
TLS_SERVER_USE, /// Context is used by a client for TLSv1 or higher. Use requireMinimumProtocol() or disableProtocols() to disable undesired older versions.
|
|
CLIENT_USE, /// DEPRECATED. Context is used by a client.
|
|
SERVER_USE, /// DEPRECATED. Context is used by a server.
|
|
TLSV1_CLIENT_USE, /// DEPRECATED. Context is used by a client requiring TLSv1.
|
|
TLSV1_SERVER_USE, /// DEPRECATED. Context is used by a server requiring TLSv1.
|
|
TLSV1_1_CLIENT_USE, /// DEPRECATED. Context is used by a client requiring TLSv1.1 (OpenSSL 1.0.0 or newer).
|
|
TLSV1_1_SERVER_USE, /// DEPRECATED. Context is used by a server requiring TLSv1.1 (OpenSSL 1.0.0 or newer).
|
|
TLSV1_2_CLIENT_USE, /// DEPRECATED. Context is used by a client requiring TLSv1.2 (OpenSSL 1.0.1 or newer).
|
|
TLSV1_2_SERVER_USE, /// DEPRECATED. Context is used by a server requiring TLSv1.2 (OpenSSL 1.0.1 or newer).
|
|
TLSV1_3_CLIENT_USE, /// DEPRECATED. Context is used by a client requiring TLSv1.3 (OpenSSL 1.1.1 or newer).
|
|
TLSV1_3_SERVER_USE /// DEPRECATED. Context is used by a server requiring TLSv1.3 (OpenSSL 1.1.1 or newer).
|
|
};
|
|
|
|
enum VerificationMode
|
|
{
|
|
VERIFY_NONE = SSL_VERIFY_NONE,
|
|
/// Server: The server will not send a client certificate
|
|
/// request to the client, so the client will not send a certificate.
|
|
///
|
|
/// Client: If not using an anonymous cipher (by default disabled),
|
|
/// the server will send a certificate which will be checked, but
|
|
/// the result of the check will be ignored.
|
|
|
|
VERIFY_RELAXED = SSL_VERIFY_PEER,
|
|
/// Server: The server sends a client certificate request to the
|
|
/// client. The certificate returned (if any) is checked.
|
|
/// If the verification process fails, the TLS/SSL handshake is
|
|
/// immediately terminated with an alert message containing the
|
|
/// reason for the verification failure.
|
|
///
|
|
/// Client: The server certificate is verified, if one is provided.
|
|
/// If the verification process fails, the TLS/SSL handshake is
|
|
/// immediately terminated with an alert message containing the
|
|
/// reason for the verification failure.
|
|
|
|
VERIFY_STRICT = SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
|
|
/// Server: If the client did not return a certificate, the TLS/SSL
|
|
/// handshake is immediately terminated with a handshake failure
|
|
/// alert.
|
|
///
|
|
/// Client: Same as VERIFY_RELAXED.
|
|
|
|
VERIFY_ONCE = SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE
|
|
/// Server: Only request a client certificate on the initial
|
|
/// TLS/SSL handshake. Do not ask for a client certificate
|
|
/// again in case of a renegotiation.
|
|
///
|
|
/// Client: Same as VERIFY_RELAXED.
|
|
};
|
|
|
|
enum Protocols
|
|
{
|
|
PROTO_SSLV2 = 0x01,
|
|
PROTO_SSLV3 = 0x02,
|
|
PROTO_TLSV1 = 0x04,
|
|
PROTO_TLSV1_1 = 0x08,
|
|
PROTO_TLSV1_2 = 0x10,
|
|
PROTO_TLSV1_3 = 0x20
|
|
};
|
|
|
|
struct NetSSL_API Params
|
|
{
|
|
Params();
|
|
/// Initializes the struct with default values.
|
|
|
|
std::string privateKeyFile;
|
|
/// Path to the private key file used for encryption.
|
|
/// Can be empty if no private key file is used.
|
|
|
|
std::string certificateFile;
|
|
/// Path to the certificate file (in PEM format).
|
|
///
|
|
/// If the private key and the certificate are stored in the same file, this
|
|
/// can be empty if privateKeyFile is given.
|
|
|
|
std::string caLocation;
|
|
/// Path to the file or directory containing the CA/root certificates.
|
|
/// Can be empty if the OpenSSL builtin CA certificates
|
|
/// are used (see loadDefaultCAs).
|
|
|
|
VerificationMode verificationMode;
|
|
/// Specifies whether and how peer certificates are validated.
|
|
/// Defaults to VERIFY_RELAXED.
|
|
|
|
int verificationDepth;
|
|
/// Sets the upper limit for verification chain sizes. Verification
|
|
/// will fail if a certificate chain larger than this is encountered.
|
|
/// Defaults to 9.
|
|
|
|
bool loadDefaultCAs;
|
|
/// Specifies whether the builtin CA certificates from OpenSSL are used.
|
|
/// Defaults to false.
|
|
|
|
bool ocspStaplingVerification;
|
|
/// Specifies whether Client should verify OCSP Response
|
|
/// Defaults to false.
|
|
|
|
std::string cipherList;
|
|
/// Specifies the supported ciphers in OpenSSL notation.
|
|
/// Defaults to "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH".
|
|
|
|
std::string dhParamsFile;
|
|
/// Specifies a file containing Diffie-Hellman parameters.
|
|
/// If empty, the default parameters are used.
|
|
|
|
bool dhUse2048Bits;
|
|
/// If set to true, will use 2048-bit MODP Group with 256-bit
|
|
/// prime order subgroup (RFC5114) instead of 1024-bit for DH.
|
|
|
|
std::string ecdhCurve;
|
|
/// OpenSSL 1.0.1 and earlier:
|
|
/// Specifies the name of the curve to use for ECDH, based
|
|
/// on the curve names specified in RFC 4492.
|
|
/// Defaults to "prime256v1".
|
|
/// OpenSSL 1.0.2 to 1.1.0:
|
|
/// Specifies the colon-separated list of curves
|
|
/// to be used for ECDH, based on the curve names
|
|
/// defined by OpenSSL, such as
|
|
/// "X448:X25519:P-521:P-384:P-256"
|
|
/// Defaults to the subset supported by the OpenSSL version
|
|
/// among the above.
|
|
/// OpenSSL 1.1.1 and above:
|
|
/// Specifies the colon-separated list of groups
|
|
/// (some of which can be curves) to be used for ECDH
|
|
/// and other TLSv1.3 ephemeral key negotiation, based
|
|
/// on the group names defined by OpenSSL. Defaults to
|
|
/// "X448:X25519:ffdhe4096:ffdhe3072:ffdhe2048:ffdhe6144:ffdhe8192:P-521:P-384:P-256"
|
|
};
|
|
|
|
using InvalidCertificateHandlerPtr = Poco::SharedPtr<InvalidCertificateHandler>;
|
|
|
|
Context(Usage usage, const Params& params);
|
|
/// Creates a Context using the given parameters.
|
|
///
|
|
/// * usage specifies whether the context is used by a client or server.
|
|
/// * params specifies the context parameters.
|
|
|
|
Context(
|
|
Usage usage,
|
|
const std::string& privateKeyFile,
|
|
const std::string& certificateFile,
|
|
const std::string& caLocation,
|
|
VerificationMode verificationMode = VERIFY_RELAXED,
|
|
int verificationDepth = 9,
|
|
bool loadDefaultCAs = false,
|
|
const std::string& cipherList = "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH");
|
|
/// Creates a Context.
|
|
///
|
|
/// * usage specifies whether the context is used by a client or server.
|
|
/// * privateKeyFile contains the path to the private key file used for encryption.
|
|
/// Can be empty if no private key file is used.
|
|
/// * certificateFile contains the path to the certificate file (in PEM format).
|
|
/// If the private key and the certificate are stored in the same file, this
|
|
/// can be empty if privateKeyFile is given.
|
|
/// * caLocation contains the path to the file or directory containing the
|
|
/// CA/root certificates. Can be empty if the OpenSSL builtin CA certificates
|
|
/// are used (see loadDefaultCAs).
|
|
/// * verificationMode specifies whether and how peer certificates are validated.
|
|
/// * verificationDepth sets the upper limit for verification chain sizes. Verification
|
|
/// will fail if a certificate chain larger than this is encountered.
|
|
/// * loadDefaultCAs specifies whether the builtin CA certificates from OpenSSL are used.
|
|
/// * cipherList specifies the supported ciphers in OpenSSL notation.
|
|
///
|
|
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
|
|
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
|
|
/// event must be handled.
|
|
|
|
Context(
|
|
Usage usage,
|
|
const std::string& caLocation,
|
|
VerificationMode verificationMode = VERIFY_RELAXED,
|
|
int verificationDepth = 9,
|
|
bool loadDefaultCAs = false,
|
|
const std::string& cipherList = "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH");
|
|
/// Creates a Context.
|
|
///
|
|
/// * usage specifies whether the context is used by a client or server.
|
|
/// * caLocation contains the path to the file or directory containing the
|
|
/// CA/root certificates. Can be empty if the OpenSSL builtin CA certificates
|
|
/// are used (see loadDefaultCAs).
|
|
/// * verificationMode specifies whether and how peer certificates are validated.
|
|
/// * verificationDepth sets the upper limit for verification chain sizes. Verification
|
|
/// will fail if a certificate chain larger than this is encountered.
|
|
/// * loadDefaultCAs specifies whether the builtin CA certificates from OpenSSL are used.
|
|
/// * cipherList specifies the supported ciphers in OpenSSL notation.
|
|
///
|
|
/// Note that a private key and/or certificate must be specified with
|
|
/// usePrivateKey()/useCertificate() before the Context can be used.
|
|
|
|
~Context();
|
|
/// Destroys the Context.
|
|
|
|
void useCertificate(const Poco::Crypto::X509Certificate& certificate);
|
|
/// Sets the certificate to be used by the Context.
|
|
///
|
|
/// To set-up a complete certificate chain, it might be
|
|
/// necessary to call addChainCertificate() to specify
|
|
/// additional certificates.
|
|
///
|
|
/// Note that useCertificate() must always be called before
|
|
/// usePrivateKey().
|
|
|
|
void addChainCertificate(const Poco::Crypto::X509Certificate& certificate);
|
|
/// Adds a certificate for certificate chain validation.
|
|
|
|
void addCertificateAuthority(const Poco::Crypto::X509Certificate& certificate);
|
|
/// Add one trusted certification authority to be used by the Context.
|
|
|
|
void usePrivateKey(const Poco::Crypto::RSAKey& key);
|
|
/// Sets the private key to be used by the Context.
|
|
///
|
|
/// Note that useCertificate() must always be called before
|
|
/// usePrivateKey().
|
|
///
|
|
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
|
|
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
|
|
/// event must be handled.
|
|
|
|
void usePrivateKey(const Poco::Crypto::EVPPKey &pkey);
|
|
/// Sets the private key to be used by the Context.
|
|
///
|
|
/// Note that useCertificate() must always be called before
|
|
/// usePrivateKey().
|
|
///
|
|
/// Note: If the private key is protected by a passphrase, a PrivateKeyPassphraseHandler
|
|
/// must have been setup with the SSLManager, or the SSLManager's PrivateKeyPassphraseRequired
|
|
/// event must be handled.
|
|
|
|
SSL_CTX* sslContext() const;
|
|
/// Returns the underlying OpenSSL SSL Context object.
|
|
|
|
Usage usage() const;
|
|
/// Returns whether the context is for use by a client or by a server
|
|
/// and whether TLSv1 is required.
|
|
|
|
bool isForServerUse() const;
|
|
/// Returns true iff the context is for use by a server.
|
|
|
|
Context::VerificationMode verificationMode() const;
|
|
/// Returns the verification mode.
|
|
|
|
void enableSessionCache(bool flag = true);
|
|
/// Enable or disable SSL/TLS session caching.
|
|
/// For session caching to work, it must be enabled
|
|
/// on the server, as well as on the client side.
|
|
///
|
|
/// The default is disabled session caching.
|
|
///
|
|
/// To enable session caching on the server side, use the
|
|
/// two-argument version of this method to specify
|
|
/// a session ID context.
|
|
|
|
void enableSessionCache(bool flag, const std::string& sessionIdContext);
|
|
/// Enables or disables SSL/TLS session caching on the server.
|
|
/// For session caching to work, it must be enabled
|
|
/// on the server, as well as on the client side.
|
|
///
|
|
/// SessionIdContext contains the application's unique
|
|
/// session ID context, which becomes part of each
|
|
/// session identifier generated by the server within this
|
|
/// context. SessionIdContext can be an arbitrary sequence
|
|
/// of bytes with a maximum length of SSL_MAX_SSL_SESSION_ID_LENGTH.
|
|
///
|
|
/// A non-empty sessionIdContext should be specified even if
|
|
/// session caching is disabled to avoid problems with clients
|
|
/// requesting to reuse a session (e.g. Firefox 3.6).
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
bool sessionCacheEnabled() const;
|
|
/// Returns true iff the session cache is enabled.
|
|
|
|
void setSessionCacheSize(std::size_t size);
|
|
/// Sets the maximum size of the server session cache, in number of
|
|
/// sessions. The default size (according to OpenSSL documentation)
|
|
/// is 1024*20, which may be too large for many applications,
|
|
/// especially on embedded platforms with limited memory.
|
|
///
|
|
/// Specifying a size of 0 will set an unlimited cache size.
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
std::size_t getSessionCacheSize() const;
|
|
/// Returns the current maximum size of the server session cache.
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
void setSessionTimeout(long seconds);
|
|
/// Sets the timeout (in seconds) of cached sessions on the server.
|
|
/// A cached session will be removed from the cache if it has
|
|
/// not been used for the given number of seconds.
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
long getSessionTimeout() const;
|
|
/// Returns the timeout (in seconds) of cached sessions on the server.
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
void flushSessionCache();
|
|
/// Flushes the SSL session cache on the server.
|
|
///
|
|
/// This method may only be called on SERVER_USE Context objects.
|
|
|
|
void enableExtendedCertificateVerification(bool flag = true);
|
|
/// Enable or disable the automatic post-connection
|
|
/// extended certificate verification.
|
|
///
|
|
/// See X509Certificate::verify() for more information.
|
|
|
|
bool extendedCertificateVerificationEnabled() const;
|
|
/// Returns true iff automatic extended certificate
|
|
/// verification is enabled.
|
|
|
|
void disableStatelessSessionResumption();
|
|
/// Newer versions of OpenSSL support RFC 4507 tickets for stateless
|
|
/// session resumption.
|
|
///
|
|
/// The feature can be disabled by calling this method.
|
|
|
|
void disableProtocols(int protocols);
|
|
/// Disables the given protocols.
|
|
///
|
|
/// The protocols to be disabled are specified by OR-ing
|
|
/// values from the Protocols enumeration, e.g.:
|
|
///
|
|
/// context.disableProtocols(PROTO_SSLV2 | PROTO_SSLV3);
|
|
|
|
void requireMinimumProtocol(Protocols protocol);
|
|
/// Disables all protocol version lower than the given one.
|
|
/// To require at least TLS 1.2 or later:
|
|
///
|
|
/// context.requireMinimumProtocol(PROTO_TLSV1_2);
|
|
|
|
void preferServerCiphers();
|
|
/// When choosing a cipher, use the server's preferences instead of the client
|
|
/// preferences. When not called, the SSL server will always follow the clients
|
|
/// preferences. When called, the SSL/TLS server will choose following its own
|
|
/// preferences.
|
|
|
|
bool ocspStaplingResponseVerificationEnabled() const;
|
|
/// Returns true if automatic OCSP response
|
|
/// reception and verification is enabled for client connections
|
|
|
|
void setInvalidCertificateHandler(InvalidCertificateHandlerPtr pInvalidCertificageHandler);
|
|
/// Sets a Context-specific InvalidCertificateHandler.
|
|
///
|
|
/// If specified, this InvalidCertificateHandler will be used instead of the
|
|
/// one globally set in the SSLManager.
|
|
|
|
InvalidCertificateHandlerPtr getInvalidCertificateHandler() const;
|
|
/// Returns the InvalidCertificateHandler set for this Context,
|
|
/// or a null pointer if none has been set.
|
|
|
|
private:
|
|
void init(const Params& params);
|
|
/// Initializes the Context with the given parameters.
|
|
|
|
void initDH(bool use2048Bits, const std::string& dhFile);
|
|
/// Initializes the Context with Diffie-Hellman parameters.
|
|
|
|
void initECDH(const std::string& curve);
|
|
/// Initializes the Context with Elliptic-Curve Diffie-Hellman key
|
|
/// exchange curve parameters.
|
|
|
|
void createSSLContext();
|
|
/// Create a SSL_CTX object according to Context configuration.
|
|
|
|
Usage _usage;
|
|
VerificationMode _mode;
|
|
SSL_CTX* _pSSLContext;
|
|
bool _extendedCertificateVerification;
|
|
bool _ocspStaplingResponseVerification;
|
|
InvalidCertificateHandlerPtr _pInvalidCertificateHandler;
|
|
};
|
|
|
|
|
|
//
|
|
// inlines
|
|
//
|
|
inline Context::Usage Context::usage() const
|
|
{
|
|
return _usage;
|
|
}
|
|
|
|
|
|
inline bool Context::isForServerUse() const
|
|
{
|
|
return _usage == SERVER_USE
|
|
|| _usage == TLS_SERVER_USE
|
|
|| _usage == TLSV1_SERVER_USE
|
|
|| _usage == TLSV1_1_SERVER_USE
|
|
|| _usage == TLSV1_2_SERVER_USE
|
|
|| _usage == TLSV1_3_SERVER_USE;
|
|
}
|
|
|
|
|
|
inline Context::VerificationMode Context::verificationMode() const
|
|
{
|
|
return _mode;
|
|
}
|
|
|
|
|
|
inline SSL_CTX* Context::sslContext() const
|
|
{
|
|
return _pSSLContext;
|
|
}
|
|
|
|
|
|
inline bool Context::extendedCertificateVerificationEnabled() const
|
|
{
|
|
return _extendedCertificateVerification;
|
|
}
|
|
|
|
|
|
inline bool Context::ocspStaplingResponseVerificationEnabled() const
|
|
{
|
|
return _ocspStaplingResponseVerification;
|
|
}
|
|
|
|
|
|
inline Context::InvalidCertificateHandlerPtr Context::getInvalidCertificateHandler() const
|
|
{
|
|
return _pInvalidCertificateHandler;
|
|
}
|
|
|
|
|
|
} } // namespace Poco::Net
|
|
|
|
|
|
#endif // NetSSL_Context_INCLUDED
|