summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjsing <>2020-05-29 17:47:30 +0000
committerjsing <>2020-05-29 17:47:30 +0000
commit574d6f0d7739a1810b9aad1f62716ceadbe58540 (patch)
tree87f4d432f87e6b391e38fa5c2e73bbef1e8dd87d /src
parentff2fa7afa324d94c7698c829a723c0673f95c345 (diff)
downloadopenbsd-574d6f0d7739a1810b9aad1f62716ceadbe58540.tar.gz
openbsd-574d6f0d7739a1810b9aad1f62716ceadbe58540.tar.bz2
openbsd-574d6f0d7739a1810b9aad1f62716ceadbe58540.zip
Wire up the servername callback in the TLSv1.3 server.
This makes SNI work correctly with TLSv1.3. Found the hard way by danj@, gonzalo@ and others. ok beck@ inoguchi@ tb@
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/tls13_internal.h3
-rw-r--r--src/lib/libssl/tls13_legacy.c28
-rw-r--r--src/lib/libssl/tls13_server.c17
3 files changed, 45 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_internal.h b/src/lib/libssl/tls13_internal.h
index 770c18d6ad..96ed981959 100644
--- a/src/lib/libssl/tls13_internal.h
+++ b/src/lib/libssl/tls13_internal.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_internal.h,v 1.82 2020/05/23 11:57:41 jsing Exp $ */ 1/* $OpenBSD: tls13_internal.h,v 1.83 2020/05/29 17:47:30 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018 Bob Beck <beck@openbsd.org> 3 * Copyright (c) 2018 Bob Beck <beck@openbsd.org>
4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> 4 * Copyright (c) 2018 Theo Buehler <tb@openbsd.org>
@@ -311,6 +311,7 @@ int tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len,
311 int peek); 311 int peek);
312int tls13_legacy_write_bytes(SSL *ssl, int type, const void *buf, int len); 312int tls13_legacy_write_bytes(SSL *ssl, int type, const void *buf, int len);
313int tls13_legacy_shutdown(SSL *ssl); 313int tls13_legacy_shutdown(SSL *ssl);
314int tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert);
314 315
315/* 316/*
316 * Message Types - RFC 8446, Section B.3. 317 * Message Types - RFC 8446, Section B.3.
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c
index be89e9aa24..4d68287141 100644
--- a/src/lib/libssl/tls13_legacy.c
+++ b/src/lib/libssl/tls13_legacy.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_legacy.c,v 1.7 2020/05/16 14:42:35 jsing Exp $ */ 1/* $OpenBSD: tls13_legacy.c,v 1.8 2020/05/29 17:47:30 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -519,3 +519,29 @@ tls13_legacy_shutdown(SSL *ssl)
519 519
520 return 0; 520 return 0;
521} 521}
522
523int
524tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert)
525{
526 int legacy_alert = SSL_AD_UNRECOGNIZED_NAME;
527 int ret = SSL_TLSEXT_ERR_NOACK;
528 SSL_CTX *ssl_ctx = ctx->ssl->ctx;
529 SSL *ssl = ctx->ssl;
530
531 if (ssl_ctx->internal->tlsext_servername_callback == NULL)
532 ssl_ctx = ssl->initial_ctx;
533 if (ssl_ctx->internal->tlsext_servername_callback == NULL)
534 return 1;
535
536 ret = ssl_ctx->internal->tlsext_servername_callback(ssl, &legacy_alert,
537 ssl_ctx->internal->tlsext_servername_arg);
538
539 if (ret == SSL_TLSEXT_ERR_ALERT_FATAL ||
540 ret == SSL_TLSEXT_ERR_ALERT_WARNING) {
541 if (legacy_alert >= 0 && legacy_alert <= 255)
542 *alert = legacy_alert;
543 return 0;
544 }
545
546 return 1;
547}
diff --git a/src/lib/libssl/tls13_server.c b/src/lib/libssl/tls13_server.c
index 621e51d501..181ba583a0 100644
--- a/src/lib/libssl/tls13_server.c
+++ b/src/lib/libssl/tls13_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_server.c,v 1.53 2020/05/23 11:58:46 jsing Exp $ */ 1/* $OpenBSD: tls13_server.c,v 1.54 2020/05/29 17:47:30 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2020 Bob Beck <beck@openbsd.org> 4 * Copyright (c) 2020 Bob Beck <beck@openbsd.org>
@@ -373,6 +373,19 @@ tls13_client_hello_retry_recv(struct tls13_ctx *ctx, CBS *cbs)
373 return 1; 373 return 1;
374} 374}
375 375
376static int
377tls13_servername_process(struct tls13_ctx *ctx)
378{
379 uint8_t alert = TLS13_ALERT_INTERNAL_ERROR;
380
381 if (!tls13_legacy_servername_process(ctx, &alert)) {
382 ctx->alert = alert;
383 return 0;
384 }
385
386 return 1;
387}
388
376int 389int
377tls13_server_hello_send(struct tls13_ctx *ctx, CBB *cbb) 390tls13_server_hello_send(struct tls13_ctx *ctx, CBB *cbb)
378{ 391{
@@ -380,6 +393,8 @@ tls13_server_hello_send(struct tls13_ctx *ctx, CBB *cbb)
380 return 0; 393 return 0;
381 if (!tls13_key_share_generate(ctx->hs->key_share)) 394 if (!tls13_key_share_generate(ctx->hs->key_share))
382 return 0; 395 return 0;
396 if (!tls13_servername_process(ctx))
397 return 0;
383 398
384 ctx->hs->server_group = 0; 399 ctx->hs->server_group = 0;
385 400