diff options
| author | reyk <> | 2015-02-09 09:23:39 +0000 | 
|---|---|---|
| committer | reyk <> | 2015-02-09 09:23:39 +0000 | 
| commit | 157b832965c968aac98859f2f0bc3494c13ef7ef (patch) | |
| tree | 286e7d2e6be1a2a638c4d5b3c7070a8b70adf66a /src/lib/libtls/tls_client.c | |
| parent | c1f670c471e829ef687e5148edca56ef2101455f (diff) | |
| download | openbsd-157b832965c968aac98859f2f0bc3494c13ef7ef.tar.gz openbsd-157b832965c968aac98859f2f0bc3494c13ef7ef.tar.bz2 openbsd-157b832965c968aac98859f2f0bc3494c13ef7ef.zip | |
When parsing the host in tls_connect(), first check if it is a numeric
IPv4 or IPv6 address before trying to resolve the address with the
AI_ADDRCONFIG flag set.  This makes sure that attempts to connect to
numeric IPs or loopback addresses are always possible and not
prevented by AI_ADDRCONFIG.
OK jsing@ tedu@
Diffstat (limited to 'src/lib/libtls/tls_client.c')
| -rw-r--r-- | src/lib/libtls/tls_client.c | 78 | 
1 files changed, 49 insertions, 29 deletions
| diff --git a/src/lib/libtls/tls_client.c b/src/lib/libtls/tls_client.c index 0894ce6333..907c334f15 100644 --- a/src/lib/libtls/tls_client.c +++ b/src/lib/libtls/tls_client.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls_client.c,v 1.12 2015/02/08 04:12:34 reyk Exp $ */ | 1 | /* $OpenBSD: tls_client.c,v 1.13 2015/02/09 09:23:39 reyk Exp $ */ | 
| 2 | /* | 2 | /* | 
| 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 
| 4 | * | 4 | * | 
| @@ -44,10 +44,45 @@ tls_client(void) | |||
| 44 | return (ctx); | 44 | return (ctx); | 
| 45 | } | 45 | } | 
| 46 | 46 | ||
| 47 | static int | ||
| 48 | tls_connect_host(struct tls *ctx, const char *host, const char *port, | ||
| 49 | int af, int flag) | ||
| 50 | { | ||
| 51 | struct addrinfo hints, *res, *res0; | ||
| 52 | int s = -1; | ||
| 53 | |||
| 54 | memset(&hints, 0, sizeof(hints)); | ||
| 55 | hints.ai_family = af; | ||
| 56 | hints.ai_socktype = SOCK_STREAM; | ||
| 57 | hints.ai_flags = flag; | ||
| 58 | |||
| 59 | if ((s = getaddrinfo(host, port, &hints, &res0)) != 0) { | ||
| 60 | tls_set_error(ctx, "%s", gai_strerror(s)); | ||
| 61 | return (-1); | ||
| 62 | } | ||
| 63 | for (res = res0; res; res = res->ai_next) { | ||
| 64 | s = socket(res->ai_family, res->ai_socktype, res->ai_protocol); | ||
| 65 | if (s == -1) { | ||
| 66 | tls_set_error(ctx, "socket"); | ||
| 67 | continue; | ||
| 68 | } | ||
| 69 | if (connect(s, res->ai_addr, res->ai_addrlen) == -1) { | ||
| 70 | tls_set_error(ctx, "connect"); | ||
| 71 | close(s); | ||
| 72 | s = -1; | ||
| 73 | continue; | ||
| 74 | } | ||
| 75 | |||
| 76 | break; /* Connected. */ | ||
| 77 | } | ||
| 78 | freeaddrinfo(res0); | ||
| 79 | |||
| 80 | return (s); | ||
| 81 | } | ||
| 82 | |||
| 47 | int | 83 | int | 
| 48 | tls_connect(struct tls *ctx, const char *host, const char *port) | 84 | tls_connect(struct tls *ctx, const char *host, const char *port) | 
| 49 | { | 85 | { | 
| 50 | struct addrinfo hints, *res, *res0; | ||
| 51 | const char *h = NULL, *p = NULL; | 86 | const char *h = NULL, *p = NULL; | 
| 52 | char *hs = NULL, *ps = NULL; | 87 | char *hs = NULL, *ps = NULL; | 
| 53 | int rv = -1, s = -1, ret; | 88 | int rv = -1, s = -1, ret; | 
| @@ -79,33 +114,18 @@ tls_connect(struct tls *ctx, const char *host, const char *port) | |||
| 79 | h = (hs != NULL) ? hs : host; | 114 | h = (hs != NULL) ? hs : host; | 
| 80 | p = (ps != NULL) ? ps : port; | 115 | p = (ps != NULL) ? ps : port; | 
| 81 | 116 | ||
| 82 | memset(&hints, 0, sizeof(hints)); | 117 | /* | 
| 83 | hints.ai_family = AF_UNSPEC; | 118 | * First check if the host is specified as a numeric IP address, | 
| 84 | hints.ai_socktype = SOCK_STREAM; | 119 | * either IPv4 or IPv6, before trying to resolve the host. | 
| 85 | hints.ai_flags = AI_ADDRCONFIG; | 120 | * The AI_ADDRCONFIG resolver option will not return IPv4 or IPv6 | 
| 86 | 121 | * records if it is not configured on an interface; not considering | |
| 87 | if ((ret = getaddrinfo(h, p, &hints, &res0)) != 0) { | 122 | * loopback addresses. Checking the numeric addresses first makes | 
| 88 | tls_set_error(ctx, "%s", gai_strerror(ret)); | 123 | * sure that connection attempts to numeric addresses and especially | 
| 89 | goto err; | 124 | * 127.0.0.1 or ::1 loopback addresses are always possible. | 
| 90 | } | 125 | */ | 
| 91 | for (res = res0; res; res = res->ai_next) { | 126 | if ((s = tls_connect_host(ctx, h, p, AF_INET, AI_NUMERICHOST)) == -1 && | 
| 92 | s = socket(res->ai_family, res->ai_socktype, res->ai_protocol); | 127 | (s = tls_connect_host(ctx, h, p, AF_INET6, AI_NUMERICHOST)) == -1 && | 
| 93 | if (s == -1) { | 128 | (s = tls_connect_host(ctx, h, p, AF_UNSPEC, AI_ADDRCONFIG)) == -1) | 
| 94 | tls_set_error(ctx, "socket"); | ||
| 95 | continue; | ||
| 96 | } | ||
| 97 | if (connect(s, res->ai_addr, res->ai_addrlen) == -1) { | ||
| 98 | tls_set_error(ctx, "connect"); | ||
| 99 | close(s); | ||
| 100 | s = -1; | ||
| 101 | continue; | ||
| 102 | } | ||
| 103 | |||
| 104 | break; /* Connected. */ | ||
| 105 | } | ||
| 106 | freeaddrinfo(res0); | ||
| 107 | |||
| 108 | if (s == -1) | ||
| 109 | goto err; | 129 | goto err; | 
| 110 | 130 | ||
| 111 | if (tls_connect_socket(ctx, s, h) != 0) { | 131 | if (tls_connect_socket(ctx, s, h) != 0) { | 
