Commit graph

165 commits

Author SHA1 Message Date
Matthew Wild
faf20e5dc9 certmanager: Add more debug logging around cert indexing
Currently it's not obvious which directories have been indexed (especially
when the resulting index is empty), or why certain files have been skipped.
2025-02-24 17:48:58 +00:00
Kim Alvefur
346f58c9d9 core.certmanager: Move LuaSec verification tweaks to mod_s2s
These two settings are only really needed for XMPP server-to-server
connections.
2025-02-15 00:19:01 +01:00
Kim Alvefur
cf446f4188 core.certmanager: Include ffdhe2048 from RFC 7919 as default DH param
This removes one manual (yet undocumented) step that was supposed to be
done to get a complete 'intermediate' configuration.

This file can be found on the Internet by searching for "ffdhe2048" and
can be verified by comparing the hexadecimal representation of p from
the RFC with the output of `openssl asn1parse`.

Given the preference and prevalence of ECDHE, it seems likely that few
would have noticed this.
2024-07-12 15:06:42 +02:00
Kim Alvefur
7b6a2f64e2 core.certmanager: Handle dane context setting same way on reload as on initialization 2023-11-04 15:59:51 +01:00
Kim Alvefur
2c9c0fab32 core.certmanager: Tweak log level of message about SNI being required
Everything supports SNI today, so this is not useful information.
2023-10-29 21:31:07 +01:00
Kim Alvefur
7a9e8092ac Merge 0.12->trunk 2023-10-27 22:38:00 +02:00
Kim Alvefur
e8128c1d60 core.certmanager: Validate that 'tls_profile' is one of the valid values
A typo should not result in ending up with "legacy"
2023-10-27 19:03:59 +02:00
Kim Alvefur
59f9a608fd core.certmanager: Update Mozilla TLS config to version 5.7
Ref https://github.com/mozilla/server-side-tls/issues/285
2023-07-09 21:18:47 +02:00
Kim Alvefur
1f668fed00 core.certmanager: Expand debug messages about cert lookups in index
Answers my recurring question of
> Using cert "certs/example.com.crt" from index
... for what?
2022-05-16 11:39:17 +02:00
Matthew Wild
b47c7951d5 Merge config-updates+check-turn from timber 2022-03-04 16:33:41 +00:00
Kim Alvefur
dd1e42f499 core.certmanager: Ensure key exists for fullchain
Since 5cd075ed4fd3 any file matching "fullchain" would be considered for
use.

Dehydrated stores fullchain certs in e.g, fullchain-1641171024.pem and a
symlink fullchain.pem pointing at the latest one. However the current
rule for finding a corresponding private key would try
privkey-1641171024.pem in the same directory, which may not exist.
2022-02-21 08:54:39 +01:00
Kim Alvefur
406b90d31d core.certmanager: Turn soft dependency on LuaSec into a hard
The default network backend server_epoll already requires LuaSec so
Prosody won't even start without it, so we can get rid of these lines
here too.
2022-02-10 17:15:55 +01:00
Kim Alvefur
2b56e0473a Merge 0.12->trunk 2023-07-10 00:34:37 +02:00
Kim Alvefur
e6f0e0b9d0 net.tls_luasec: Expose method for loading a certificate
Further isolates LuaSec from Prosody core, with the ultimate goal of
allowing LuaSec to be replaced more easily.
2023-05-27 15:40:49 +02:00
Kim Alvefur
296710c701 net.certmanager: Move LuaSec feature detection to net.tls_luasec
Further isolates LuaSec from Prosody core, with the ultimate goal of
allowing LuaSec to be replaced more easily.
2023-05-27 15:39:26 +02:00
Kim Alvefur
d47a7bb3bd core: Prefix module imports with prosody namespace 2023-03-17 16:23:07 +01:00
Kim Alvefur
bd9db0ee1a Merge 0.12->trunk 2022-05-16 11:42:31 +02:00
Jonas Schäfer
9f7c3b9ba6 net: refactor sslconfig to not depend on LuaSec
This now requires that the network backend exposes a tls_builder
function, which essentially wraps the former util.sslconfig.new()
function, passing a factory to create the eventual SSL context.

That allows a net.server backend to pick whatever it likes as SSL
context factory, as long as it understands the config table passed by
the SSL config builder. Heck, a backend could even mock and replace the
entire SSL config builder API.
2022-04-02 11:15:33 +02:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Kim Alvefur
26b898bc52 core.certmanager: Relax certificate filename check #1713
After a survey of ACME clients it seems *.crt and *fullchain* should
work for the majority. The rest get to manually copy their files.
2022-02-14 18:29:31 +01:00
Kim Alvefur
73c3ab7888 core.certmanager: Use 'tls_profile' instead of 'tls_preset' to match documentation
Confusion!

Thanks Martin
2022-01-18 11:52:35 +01:00
Kim Alvefur
8edd063114 core.certmanager: Apply TLS preset before global settings (thanks Menel)
Allows overriding settings via the global 'ssl' settings as before.
This order was probably accidental. That said, 'ssl' is a giant footgun
we will want to discourage use of.
2022-01-18 08:04:16 +01:00
Kim Alvefur
3b2c39901a core.certmanager: Disable DANE name checks (not needed for XMPP)
Pending https://github.com/brunoos/luasec/pull/179

Should not be done globally, but rather only for s2sout, but that would
have to be in mod_tls then.
2021-09-16 09:52:51 +02:00
Kim Alvefur
f343cf5ba0 core.certmanager: Add curveslist to 'old' Mozilla TLS preset
Unsure if this was overlooked before or a recent addition.

Reproduced the data from JSON file available. Would be nice to have a
tool that does that.
2021-12-26 00:05:16 +01:00
Kim Alvefur
da1bffce1d core.certmanager: Check index for wildcard certs 2021-12-22 15:13:49 +01:00
Jonas Schäfer
7c93370ad5 prosodyctl cert: use the indexing functions for better UX
These provide (a) a way to deal with random assortments of certs
and (b) avoid unnecessary error messages and warnings, according
to #1669 anyway, which this fixes.
2021-12-21 21:20:21 +01:00
Kim Alvefur
46a6dafd28 core.certmanager: Rename preset option to 'tls_preset'
TLS good, SSL bad.
2021-12-22 14:24:26 +01:00
Kim Alvefur
184b0a62cb core.certmanager: Add "legacy" preset for keeping previous default settings
If anyone wants that.
2021-12-22 14:12:10 +01:00
Kim Alvefur
99a73bdcf6 core.certmanager: Add TLS 1.3 cipher suites to Mozilla TLS presets 2021-11-03 12:23:29 +01:00
Kim Alvefur
d2ff803262 core.certmanager: Presets based on Mozilla SSL Configuration Generator
ssl_preset = "modern"
2019-12-22 02:25:37 +01:00
Kim Alvefur
4d26d4cb15 core.certmanager: Support 'use_dane' setting to enable DANE support
Removes the need to enable DANE with two separate settings.
Previously you had to also set `ssl = { dane = true }` to activate DANE
support in LuaSec and OpenSSL.
2021-07-18 22:46:57 +02:00
Kim Alvefur
8df4b320f4 core.certmanager: Skip service certificate lookup for https client
Quick Fix\u{2122} to stop prevent certmanager from automatically adding
a client certificate for net.http.request, since this normally does not
require such.
2021-05-27 09:22:07 +02:00
Matthew Wild
5bc8b2a379 Merge 0.11->trunk 2021-05-13 11:17:13 +01:00
Kim Alvefur
37ad3b8fb2 core.certmanager: Catch error from lfs
lfs.dir() throws a hard error if there's a problem, e.g. no such
directory or permission issues. This also gets called early enough that
the main loop error protection hasn't been brought up yet, causing a
proper crash.
2021-05-07 16:47:58 +02:00
Kim Alvefur
2c902f163f core.certmanager: Resolve certs path relative to config dir
Otherwise the default "certs" would be relative to $PWD, which works
when testing from a source checkout, but not on installed systems where
it usually points to the data directory.

Also, the LuaFileSystem dir() iterator throws a hard error, which may
cause a crash or other problems.
2021-05-07 16:35:37 +02:00
Kim Alvefur
f2a8b90b30 core.certmanager: Skip directly to guessing of key from cert filename
Cuts down on a ton of debug logs
2021-05-05 15:56:39 +02:00
Kim Alvefur
2d707a905f core.certmanager: Join paths with OS-aware util.paths function
Right thing to do, rather than hardcoding '/'
2021-05-05 15:54:05 +02:00
Kim Alvefur
c372b19359 core.certmanager: Build an index over certificates 2021-04-10 14:45:40 +02:00
Kim Alvefur
003e8f633a core.certmanager: Check for complete filename
Prevents a false positive match on files with fullchain.pem as suffix
2021-04-10 14:45:03 +02:00
Kim Alvefur
3fd016e66a core.certmanager: Add comments explaining the 'verifyext' TLS settings
Thanks to debacle for reminding me, in the context of mod_auth_ccert

I wonder if we still need lsec_ignore_purpose, Let's Encrypt seems to
include both client and server purposes in certs.
2021-02-06 22:12:38 +01:00
Matthew Wild
f0c2ed1201 certmanager: Disable renegotiation by default
This requires LuaSec 0.7+ and OpenSSL 1.1.1+
2021-05-11 14:14:15 +01:00
Kim Alvefur
b369dea3d8 core.certmanager: Test for SSL options in absence of LuaSec config 2021-04-26 15:32:05 +02:00
Kim Alvefur
a174420e52 core.certmanager: Attempt to directly access LuaSec config table
Due to a bug this field was not properly exported before
See https://github.com/brunoos/luasec/issues/149
2021-04-26 15:30:13 +02:00
Kim Alvefur
5291ea4c7c core.certmanager: Move EECDH ciphers before EDH in default cipherstring (fixes #1513)
Backport of 94e341dee51c

The original intent of having kEDH before kEECDH was that if a `dhparam`
file was specified, this would be interpreted as a preference by the
admin for old and well-tested Diffie-Hellman key agreement over newer
elliptic curve ones. Otherwise the faster elliptic curve ciphersuites
would be preferred. This didn't really work as intended since this
affects the ClientHello on outgoing s2s connections, leading to some
servers using poorly configured kEDH.

With Debian shipping OpenSSL settings that enforce a higher security
level, this caused interoperability problems with servers that use DH
params smaller than 2048 bits. E.g. jabber.org at the time of this
writing has 1024 bit DH params.

MattJ says
> Curves have won, and OpenSSL is less weird about them now
2019-08-25 20:22:35 +02:00
Kim Alvefur
96620cafe5 core.certmanager: Look for privkey.pem to go with fullchain.pem (fix #1526)
This makes
`prosodyctl cert import example.com /path/to/example.com/fullchain.pem`
work. This was never intended to, yet users commonly tried this and got
problems.
2020-04-10 16:11:09 +02:00
Kim Alvefur
fb5e6faad6 core.certmanager: Add TODO about LuaSec issue 2020-06-07 02:12:50 +02:00
Kim Alvefur
64ea805d66 Merge 0.11->trunk 2020-04-10 19:03:36 +02:00
Kim Alvefur
1f33d9c6bb core.portmanager: Fix TLS context inheritance for SNI hosts (completes SNI support) 2019-11-29 23:24:14 +01:00
Kim Alvefur
5bba716be9 core.certmanager: Lower severity for tls config not having cert
This is needed for SNI where certificates are in separate
per-hostname contexts, not the main one.

If there is a cert, it will still require a corresponding key.
2019-09-07 00:00:40 +02:00
Kim Alvefur
f39535cfd0 core.certmanager: Remove unused import [luacheck] 2019-08-25 23:25:42 +02:00