1
0
mirror of https://github.com/apache/httpd.git synced 2025-08-07 04:02:58 +03:00

* Add SSLStrictSNIVHostCheck to allow / disallow non SNI clients to connect to

name based virtual hosts.


git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@768596 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
Ruediger Pluem
2009-04-25 20:15:49 +00:00
parent b0de0b29b5
commit 80ccfe3613
5 changed files with 66 additions and 2 deletions

View File

@@ -1353,6 +1353,37 @@ SSLRenegBufferSize 262144
</usage> </usage>
</directivesynopsis> </directivesynopsis>
<directivesynopsis>
<name>SSLStrictSNIVHostCheck</name>
<description>Whether to allow non SNI clients to access a name based virtual
host.
</description>
<syntax>SSLStrictSNIVHostCheck on|off</syntax>
<default>SSLStrictSNIVHostCheck off</default>
<contextlist><context>server config</context>
<context>virtual host</context></contextlist>
<usage>
<p>
This directive sets whether a non SNI client is allowed to access a name based
virtual host. If set to <code>on</code> in the non default name based virtual
host, non SNI clients are not allowed to access this particular virtual host.
If set to <code>on</code> in the default name based virtual host, non SNI
clients are not allowed to access any name based virtual host belonging to
this IP / port combination.
</p>
<note type="warning"><p>
This option is only available if httpd was compiled against an SNI capable
version of OpenSSL.
</p></note>
<example><title>Example</title>
SSLStrictSNIVHostCheck on
</example>
</usage>
</directivesynopsis>
<directivesynopsis> <directivesynopsis>
<name>SSLProxyMachineCertificatePath</name> <name>SSLProxyMachineCertificatePath</name>
<description>Directory of PEM-encoded client certificates and keys to be used by the proxy</description> <description>Directory of PEM-encoded client certificates and keys to be used by the proxy</description>

View File

@@ -129,6 +129,10 @@ static const command_rec ssl_config_cmds[] = {
SSL_CMD_SRV(LogLevelDebugDump, TAKE1, SSL_CMD_SRV(LogLevelDebugDump, TAKE1,
"Include I/O Dump when LogLevel is set to Debug " "Include I/O Dump when LogLevel is set to Debug "
"([ None (default) | IO (not bytes) | Bytes ])") "([ None (default) | IO (not bytes) | Bytes ])")
#ifndef OPENSSL_NO_TLSEXT
SSL_CMD_SRV(StrictSNIVHostCheck, FLAG,
"Strict SNI virtual host checking")
#endif
/* /*
* Proxy configuration for remote SSL connections * Proxy configuration for remote SSL connections

View File

@@ -175,6 +175,9 @@ static SSLSrvConfigRec *ssl_config_server_new(apr_pool_t *p)
sc->ssl_log_level = SSL_LOG_UNSET; sc->ssl_log_level = SSL_LOG_UNSET;
sc->proxy_ssl_check_peer_expire = SSL_ENABLED_UNSET; sc->proxy_ssl_check_peer_expire = SSL_ENABLED_UNSET;
sc->proxy_ssl_check_peer_cn = SSL_ENABLED_UNSET; sc->proxy_ssl_check_peer_cn = SSL_ENABLED_UNSET;
#ifndef OPENSSL_NO_TLSEXT
sc->strict_sni_vhost_check = SSL_ENABLED_UNSET;
#endif
modssl_ctx_init_proxy(sc, p); modssl_ctx_init_proxy(sc, p);
@@ -270,6 +273,9 @@ void *ssl_config_server_merge(apr_pool_t *p, void *basev, void *addv)
cfgMerge(ssl_log_level, SSL_LOG_UNSET); cfgMerge(ssl_log_level, SSL_LOG_UNSET);
cfgMerge(proxy_ssl_check_peer_expire, SSL_ENABLED_UNSET); cfgMerge(proxy_ssl_check_peer_expire, SSL_ENABLED_UNSET);
cfgMerge(proxy_ssl_check_peer_cn, SSL_ENABLED_UNSET); cfgMerge(proxy_ssl_check_peer_cn, SSL_ENABLED_UNSET);
#ifndef OPENSSL_NO_TLSEXT
cfgMerge(strict_sni_vhost_check, SSL_ENABLED_UNSET);
#endif
modssl_ctx_cfg_merge_proxy(base->proxy, add->proxy, mrg->proxy); modssl_ctx_cfg_merge_proxy(base->proxy, add->proxy, mrg->proxy);
@@ -1440,6 +1446,17 @@ const char *ssl_cmd_SSLProxyCheckPeerCN(cmd_parms *cmd, void *dcfg, int flag)
return NULL; return NULL;
} }
#ifndef OPENSSL_NO_TLSEXT
const char *ssl_cmd_SSLStrictSNIVHostCheck(cmd_parms *cmd, void *dcfg, int flag)
{
SSLSrvConfigRec *sc = mySrvConfig(cmd->server);
sc->strict_sni_vhost_check = flag ? SSL_ENABLED_TRUE : SSL_ENABLED_FALSE;
return NULL;
}
#endif
void ssl_hook_ConfigTest(apr_pool_t *pconf, server_rec *s) void ssl_hook_ConfigTest(apr_pool_t *pconf, server_rec *s)
{ {
if (!ap_exists_config_define("DUMP_CERTS")) { if (!ap_exists_config_define("DUMP_CERTS")) {

View File

@@ -186,10 +186,16 @@ int ssl_hook_ReadReq(request_rec *r)
return HTTP_BAD_REQUEST; return HTTP_BAD_REQUEST;
} }
} }
else if (r->connection->vhost_lookup_data) { else if (((sc->strict_sni_vhost_check == SSL_ENABLED_TRUE)
|| (mySrvConfig(sslconn->server))->strict_sni_vhost_check
== SSL_ENABLED_TRUE)
&& r->connection->vhost_lookup_data) {
/* /*
* We are using a name based configuration here, but no hostname was * We are using a name based configuration here, but no hostname was
* provided via SNI. Don't allow that. * provided via SNI. Don't allow that if are requested to do strict
* checking. Check wether this strict checking was setup either in the
* server config we used for handshaking or in our current server.
* This should avoid insecure configuration by accident.
*/ */
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server, ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"No hostname was provided via SNI for a name based" "No hostname was provided via SNI for a name based"

View File

@@ -479,6 +479,9 @@ struct SSLSrvConfigRec {
ssl_log_level_e ssl_log_level; ssl_log_level_e ssl_log_level;
ssl_enabled_t proxy_ssl_check_peer_expire; ssl_enabled_t proxy_ssl_check_peer_expire;
ssl_enabled_t proxy_ssl_check_peer_cn; ssl_enabled_t proxy_ssl_check_peer_cn;
#ifndef OPENSSL_NO_TLSEXT
ssl_enabled_t strict_sni_vhost_check;
#endif
}; };
/** /**
@@ -544,6 +547,9 @@ const char *ssl_cmd_SSLRequire(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLUserName(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLUserName(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLLogLevelDebugDump(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLLogLevelDebugDump(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLRenegBufferSize(cmd_parms *cmd, void *dcfg, const char *arg); const char *ssl_cmd_SSLRenegBufferSize(cmd_parms *cmd, void *dcfg, const char *arg);
#ifndef OPENSSL_NO_TLSEXT
const char *ssl_cmd_SSLStrictSNIVHostCheck(cmd_parms *cmd, void *dcfg, int flag);
#endif
const char *ssl_cmd_SSLProxyEngine(cmd_parms *cmd, void *dcfg, int flag); const char *ssl_cmd_SSLProxyEngine(cmd_parms *cmd, void *dcfg, int flag);
const char *ssl_cmd_SSLProxyProtocol(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLProxyProtocol(cmd_parms *, void *, const char *);