CVE-2015-1855-p484.patch 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254
  1. --- a/ext/openssl/lib/openssl/ssl-internal.rb
  2. +++ b/ext/openssl/lib/openssl/ssl-internal.rb
  3. @@ -135,8 +135,7 @@ module OpenSSL
  4. case san.tag
  5. when 2 # dNSName in GeneralName (RFC5280)
  6. should_verify_common_name = false
  7. - reg = Regexp.escape(san.value).gsub(/\\\*/, "[^.]+")
  8. - return true if /\A#{reg}\z/i =~ hostname
  9. + return true if verify_hostname(hostname, san.value)
  10. when 7 # iPAddress in GeneralName (RFC5280)
  11. should_verify_common_name = false
  12. # follows GENERAL_NAME_print() in x509v3/v3_alt.c
  13. @@ -151,8 +150,7 @@ module OpenSSL
  14. if should_verify_common_name
  15. cert.subject.to_a.each{|oid, value|
  16. if oid == "CN"
  17. - reg = Regexp.escape(value).gsub(/\\\*/, "[^.]+")
  18. - return true if /\A#{reg}\z/i =~ hostname
  19. + return true if verify_hostname(hostname, value)
  20. end
  21. }
  22. end
  23. @@ -160,11 +158,67 @@ module OpenSSL
  24. end
  25. module_function :verify_certificate_identity
  26. + def verify_hostname(hostname, san) # :nodoc:
  27. + # RFC 5280, IA5String is limited to the set of ASCII characters
  28. + return false unless san.ascii_only?
  29. + return false unless hostname.ascii_only?
  30. +
  31. + # See RFC 6125, section 6.4.1
  32. + # Matching is case-insensitive.
  33. + san_parts = san.downcase.split(".")
  34. +
  35. + # TODO: this behavior should probably be more strict
  36. + return san == hostname if san_parts.size < 2
  37. +
  38. + # Matching is case-insensitive.
  39. + host_parts = hostname.downcase.split(".")
  40. +
  41. + # RFC 6125, section 6.4.3, subitem 2.
  42. + # If the wildcard character is the only character of the left-most
  43. + # label in the presented identifier, the client SHOULD NOT compare
  44. + # against anything but the left-most label of the reference
  45. + # identifier (e.g., *.example.com would match foo.example.com but
  46. + # not bar.foo.example.com or example.com).
  47. + return false unless san_parts.size == host_parts.size
  48. +
  49. + # RFC 6125, section 6.4.3, subitem 1.
  50. + # The client SHOULD NOT attempt to match a presented identifier in
  51. + # which the wildcard character comprises a label other than the
  52. + # left-most label (e.g., do not match bar.*.example.net).
  53. + return false unless verify_wildcard(host_parts.shift, san_parts.shift)
  54. +
  55. + san_parts.join(".") == host_parts.join(".")
  56. + end
  57. + module_function :verify_hostname
  58. +
  59. + def verify_wildcard(domain_component, san_component) # :nodoc:
  60. + parts = san_component.split("*", -1)
  61. +
  62. + return false if parts.size > 2
  63. + return san_component == domain_component if parts.size == 1
  64. +
  65. + # RFC 6125, section 6.4.3, subitem 3.
  66. + # The client SHOULD NOT attempt to match a presented identifier
  67. + # where the wildcard character is embedded within an A-label or
  68. + # U-label of an internationalized domain name.
  69. + return false if domain_component.start_with?("xn--") && san_component != "*"
  70. +
  71. + parts[0].length + parts[1].length < domain_component.length &&
  72. + domain_component.start_with?(parts[0]) &&
  73. + domain_component.end_with?(parts[1])
  74. + end
  75. + module_function :verify_wildcard
  76. +
  77. class SSLSocket
  78. include Buffering
  79. include SocketForwarder
  80. include Nonblock
  81. + ##
  82. + # Perform hostname verification after an SSL connection is established
  83. + #
  84. + # This method MUST be called after calling #connect to ensure that the
  85. + # hostname of a remote peer has been verified.
  86. def post_connection_check(hostname)
  87. unless OpenSSL::SSL.verify_certificate_identity(peer_cert, hostname)
  88. raise SSLError, "hostname does not match the server certificate"
  89. --- a/test/openssl/test_ssl.rb
  90. +++ b/test/openssl/test_ssl.rb
  91. @@ -1,3 +1,5 @@
  92. +# encoding: utf-8
  93. +
  94. require_relative "utils"
  95. if defined?(OpenSSL)
  96. @@ -363,6 +365,155 @@ class OpenSSL::TestSSL < OpenSSL::SSLTestCase
  97. end
  98. end
  99. + def test_verify_hostname
  100. + assert_equal(true, OpenSSL::SSL.verify_hostname("www.example.com", "*.example.com"))
  101. + assert_equal(false, OpenSSL::SSL.verify_hostname("www.subdomain.example.com", "*.example.com"))
  102. + end
  103. +
  104. + def test_verify_wildcard
  105. + assert_equal(false, OpenSSL::SSL.verify_wildcard("foo", "x*"))
  106. + assert_equal(true, OpenSSL::SSL.verify_wildcard("foo", "foo"))
  107. + assert_equal(true, OpenSSL::SSL.verify_wildcard("foo", "f*"))
  108. + assert_equal(true, OpenSSL::SSL.verify_wildcard("foo", "*"))
  109. + assert_equal(false, OpenSSL::SSL.verify_wildcard("abc*bcd", "abcd"))
  110. + assert_equal(false, OpenSSL::SSL.verify_wildcard("xn--qdk4b9b", "x*"))
  111. + assert_equal(false, OpenSSL::SSL.verify_wildcard("xn--qdk4b9b", "*--qdk4b9b"))
  112. + assert_equal(true, OpenSSL::SSL.verify_wildcard("xn--qdk4b9b", "xn--qdk4b9b"))
  113. + end
  114. +
  115. + # Comments in this test is excerpted from http://tools.ietf.org/html/rfc6125#page-27
  116. + def test_post_connection_check_wildcard_san
  117. + # case-insensitive ASCII comparison
  118. + # RFC 6125, section 6.4.1
  119. + #
  120. + # "..matching of the reference identifier against the presented identifier
  121. + # is performed by comparing the set of domain name labels using a
  122. + # case-insensitive ASCII comparison, as clarified by [DNS-CASE] (e.g.,
  123. + # "WWW.Example.Com" would be lower-cased to "www.example.com" for
  124. + # comparison purposes)
  125. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  126. + create_cert_with_san('DNS:*.example.com'), 'www.example.com'))
  127. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  128. + create_cert_with_san('DNS:*.Example.COM'), 'www.example.com'))
  129. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  130. + create_cert_with_san('DNS:*.example.com'), 'WWW.Example.COM'))
  131. + # 1. The client SHOULD NOT attempt to match a presented identifier in
  132. + # which the wildcard character comprises a label other than the
  133. + # left-most label (e.g., do not match bar.*.example.net).
  134. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  135. + create_cert_with_san('DNS:www.*.com'), 'www.example.com'))
  136. + # 2. If the wildcard character is the only character of the left-most
  137. + # label in the presented identifier, the client SHOULD NOT compare
  138. + # against anything but the left-most label of the reference
  139. + # identifier (e.g., *.example.com would match foo.example.com but
  140. + # not bar.foo.example.com or example.com).
  141. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  142. + create_cert_with_san('DNS:*.example.com'), 'foo.example.com'))
  143. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  144. + create_cert_with_san('DNS:*.example.com'), 'bar.foo.example.com'))
  145. + # 3. The client MAY match a presented identifier in which the wildcard
  146. + # character is not the only character of the label (e.g.,
  147. + # baz*.example.net and *baz.example.net and b*z.example.net would
  148. + # be taken to match baz1.example.net and foobaz.example.net and
  149. + # buzz.example.net, respectively). ...
  150. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  151. + create_cert_with_san('DNS:baz*.example.com'), 'baz1.example.com'))
  152. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  153. + create_cert_with_san('DNS:*baz.example.com'), 'foobaz.example.com'))
  154. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  155. + create_cert_with_san('DNS:b*z.example.com'), 'buzz.example.com'))
  156. + # Section 6.4.3 of RFC6125 states that client should NOT match identifier
  157. + # where wildcard is other than left-most label.
  158. + #
  159. + # Also implicitly mentions the wildcard character only in singular form,
  160. + # and discourages matching against more than one wildcard.
  161. + #
  162. + # See RFC 6125, section 7.2, subitem 2.
  163. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  164. + create_cert_with_san('DNS:*b*.example.com'), 'abc.example.com'))
  165. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  166. + create_cert_with_san('DNS:*b*.example.com'), 'ab.example.com'))
  167. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  168. + create_cert_with_san('DNS:*b*.example.com'), 'bc.example.com'))
  169. + # ... However, the client SHOULD NOT
  170. + # attempt to match a presented identifier where the wildcard
  171. + # character is embedded within an A-label or U-label [IDNA-DEFS] of
  172. + # an internationalized domain name [IDNA-PROTO].
  173. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  174. + create_cert_with_san('DNS:xn*.example.com'), 'xn1ca.example.com'))
  175. + # part of A-label
  176. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  177. + create_cert_with_san('DNS:xn--*.example.com'), 'xn--1ca.example.com'))
  178. + # part of U-label
  179. + # dNSName in RFC5280 is an IA5String so U-label should NOT be allowed
  180. + # regardless of wildcard.
  181. + #
  182. + # See Section 7.2 of RFC 5280:
  183. + # IA5String is limited to the set of ASCII characters.
  184. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  185. + create_cert_with_name('á*.example.com'), 'á1.example.com'))
  186. + end
  187. +
  188. + def test_post_connection_check_wildcard_cn
  189. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  190. + create_cert_with_name('*.example.com'), 'www.example.com'))
  191. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  192. + create_cert_with_name('*.Example.COM'), 'www.example.com'))
  193. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  194. + create_cert_with_name('*.example.com'), 'WWW.Example.COM'))
  195. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  196. + create_cert_with_name('www.*.com'), 'www.example.com'))
  197. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  198. + create_cert_with_name('*.example.com'), 'foo.example.com'))
  199. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  200. + create_cert_with_name('*.example.com'), 'bar.foo.example.com'))
  201. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  202. + create_cert_with_name('baz*.example.com'), 'baz1.example.com'))
  203. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  204. + create_cert_with_name('*baz.example.com'), 'foobaz.example.com'))
  205. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  206. + create_cert_with_name('b*z.example.com'), 'buzz.example.com'))
  207. + # Section 6.4.3 of RFC6125 states that client should NOT match identifier
  208. + # where wildcard is other than left-most label.
  209. + #
  210. + # Also implicitly mentions the wildcard character only in singular form,
  211. + # and discourages matching against more than one wildcard.
  212. + #
  213. + # See RFC 6125, section 7.2, subitem 2.
  214. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  215. + create_cert_with_name('*b*.example.com'), 'abc.example.com'))
  216. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  217. + create_cert_with_name('*b*.example.com'), 'ab.example.com'))
  218. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  219. + create_cert_with_name('*b*.example.com'), 'bc.example.com'))
  220. + assert_equal(true, OpenSSL::SSL.verify_certificate_identity(
  221. + create_cert_with_name('xn*.example.com'), 'xn1ca.example.com'))
  222. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  223. + create_cert_with_name('xn--*.example.com'), 'xn--1ca.example.com'))
  224. + # part of U-label
  225. + # Subject in RFC5280 states case-insensitive ASCII comparison.
  226. + #
  227. + # See Section 7.2 of RFC 5280:
  228. + # IA5String is limited to the set of ASCII characters.
  229. + assert_equal(false, OpenSSL::SSL.verify_certificate_identity(
  230. + create_cert_with_name('á*.example.com'), 'á1.example.com'))
  231. + end
  232. +
  233. + def create_cert_with_san(san)
  234. + ef = OpenSSL::X509::ExtensionFactory.new
  235. + cert = OpenSSL::X509::Certificate.new
  236. + cert.subject = OpenSSL::X509::Name.parse("/DC=some/DC=site/CN=Some Site")
  237. + ext = ef.create_ext('subjectAltName', san)
  238. + cert.add_extension(ext)
  239. + cert
  240. + end
  241. +
  242. + def create_cert_with_name(name)
  243. + cert = OpenSSL::X509::Certificate.new
  244. + cert.subject = OpenSSL::X509::Name.new([['DC', 'some'], ['DC', 'site'], ['CN', name]])
  245. + cert
  246. + end
  247. +
  248. # Create NULL byte SAN certificate
  249. def create_null_byte_SAN_certificate(critical = false)
  250. ef = OpenSSL::X509::ExtensionFactory.new