Commit graph

152 commits

Author SHA1 Message Date
Kim Alvefur
e8128c1d60 core.certmanager: Validate that 'tls_profile' is one of the valid values
A typo should not result in ending up with "legacy"
2023-10-27 19:03:59 +02:00
Kim Alvefur
59f9a608fd core.certmanager: Update Mozilla TLS config to version 5.7
Ref https://github.com/mozilla/server-side-tls/issues/285
2023-07-09 21:18:47 +02:00
Kim Alvefur
1f668fed00 core.certmanager: Expand debug messages about cert lookups in index
Answers my recurring question of
> Using cert "certs/example.com.crt" from index
... for what?
2022-05-16 11:39:17 +02:00
Matthew Wild
b47c7951d5 Merge config-updates+check-turn from timber 2022-03-04 16:33:41 +00:00
Kim Alvefur
dd1e42f499 core.certmanager: Ensure key exists for fullchain
Since 5cd075ed4fd3 any file matching "fullchain" would be considered for
use.

Dehydrated stores fullchain certs in e.g, fullchain-1641171024.pem and a
symlink fullchain.pem pointing at the latest one. However the current
rule for finding a corresponding private key would try
privkey-1641171024.pem in the same directory, which may not exist.
2022-02-21 08:54:39 +01:00
Kim Alvefur
406b90d31d core.certmanager: Turn soft dependency on LuaSec into a hard
The default network backend server_epoll already requires LuaSec so
Prosody won't even start without it, so we can get rid of these lines
here too.
2022-02-10 17:15:55 +01:00
Kim Alvefur
26b898bc52 core.certmanager: Relax certificate filename check #1713
After a survey of ACME clients it seems *.crt and *fullchain* should
work for the majority. The rest get to manually copy their files.
2022-02-14 18:29:31 +01:00
Kim Alvefur
73c3ab7888 core.certmanager: Use 'tls_profile' instead of 'tls_preset' to match documentation
Confusion!

Thanks Martin
2022-01-18 11:52:35 +01:00
Kim Alvefur
8edd063114 core.certmanager: Apply TLS preset before global settings (thanks Menel)
Allows overriding settings via the global 'ssl' settings as before.
This order was probably accidental. That said, 'ssl' is a giant footgun
we will want to discourage use of.
2022-01-18 08:04:16 +01:00
Kim Alvefur
3b2c39901a core.certmanager: Disable DANE name checks (not needed for XMPP)
Pending https://github.com/brunoos/luasec/pull/179

Should not be done globally, but rather only for s2sout, but that would
have to be in mod_tls then.
2021-09-16 09:52:51 +02:00
Kim Alvefur
f343cf5ba0 core.certmanager: Add curveslist to 'old' Mozilla TLS preset
Unsure if this was overlooked before or a recent addition.

Reproduced the data from JSON file available. Would be nice to have a
tool that does that.
2021-12-26 00:05:16 +01:00
Kim Alvefur
da1bffce1d core.certmanager: Check index for wildcard certs 2021-12-22 15:13:49 +01:00
Jonas Schäfer
7c93370ad5 prosodyctl cert: use the indexing functions for better UX
These provide (a) a way to deal with random assortments of certs
and (b) avoid unnecessary error messages and warnings, according
to #1669 anyway, which this fixes.
2021-12-21 21:20:21 +01:00
Kim Alvefur
46a6dafd28 core.certmanager: Rename preset option to 'tls_preset'
TLS good, SSL bad.
2021-12-22 14:24:26 +01:00
Kim Alvefur
184b0a62cb core.certmanager: Add "legacy" preset for keeping previous default settings
If anyone wants that.
2021-12-22 14:12:10 +01:00
Kim Alvefur
99a73bdcf6 core.certmanager: Add TLS 1.3 cipher suites to Mozilla TLS presets 2021-11-03 12:23:29 +01:00
Kim Alvefur
d2ff803262 core.certmanager: Presets based on Mozilla SSL Configuration Generator
ssl_preset = "modern"
2019-12-22 02:25:37 +01:00
Kim Alvefur
4d26d4cb15 core.certmanager: Support 'use_dane' setting to enable DANE support
Removes the need to enable DANE with two separate settings.
Previously you had to also set `ssl = { dane = true }` to activate DANE
support in LuaSec and OpenSSL.
2021-07-18 22:46:57 +02:00
Kim Alvefur
8df4b320f4 core.certmanager: Skip service certificate lookup for https client
Quick Fix\u{2122} to stop prevent certmanager from automatically adding
a client certificate for net.http.request, since this normally does not
require such.
2021-05-27 09:22:07 +02:00
Matthew Wild
5bc8b2a379 Merge 0.11->trunk 2021-05-13 11:17:13 +01:00
Kim Alvefur
37ad3b8fb2 core.certmanager: Catch error from lfs
lfs.dir() throws a hard error if there's a problem, e.g. no such
directory or permission issues. This also gets called early enough that
the main loop error protection hasn't been brought up yet, causing a
proper crash.
2021-05-07 16:47:58 +02:00
Kim Alvefur
2c902f163f core.certmanager: Resolve certs path relative to config dir
Otherwise the default "certs" would be relative to $PWD, which works
when testing from a source checkout, but not on installed systems where
it usually points to the data directory.

Also, the LuaFileSystem dir() iterator throws a hard error, which may
cause a crash or other problems.
2021-05-07 16:35:37 +02:00
Kim Alvefur
f2a8b90b30 core.certmanager: Skip directly to guessing of key from cert filename
Cuts down on a ton of debug logs
2021-05-05 15:56:39 +02:00
Kim Alvefur
2d707a905f core.certmanager: Join paths with OS-aware util.paths function
Right thing to do, rather than hardcoding '/'
2021-05-05 15:54:05 +02:00
Kim Alvefur
c372b19359 core.certmanager: Build an index over certificates 2021-04-10 14:45:40 +02:00
Kim Alvefur
003e8f633a core.certmanager: Check for complete filename
Prevents a false positive match on files with fullchain.pem as suffix
2021-04-10 14:45:03 +02:00
Kim Alvefur
3fd016e66a core.certmanager: Add comments explaining the 'verifyext' TLS settings
Thanks to debacle for reminding me, in the context of mod_auth_ccert

I wonder if we still need lsec_ignore_purpose, Let's Encrypt seems to
include both client and server purposes in certs.
2021-02-06 22:12:38 +01:00
Matthew Wild
f0c2ed1201 certmanager: Disable renegotiation by default
This requires LuaSec 0.7+ and OpenSSL 1.1.1+
2021-05-11 14:14:15 +01:00
Kim Alvefur
b369dea3d8 core.certmanager: Test for SSL options in absence of LuaSec config 2021-04-26 15:32:05 +02:00
Kim Alvefur
a174420e52 core.certmanager: Attempt to directly access LuaSec config table
Due to a bug this field was not properly exported before
See https://github.com/brunoos/luasec/issues/149
2021-04-26 15:30:13 +02:00
Kim Alvefur
5291ea4c7c core.certmanager: Move EECDH ciphers before EDH in default cipherstring (fixes #1513)
Backport of 94e341dee51c

The original intent of having kEDH before kEECDH was that if a `dhparam`
file was specified, this would be interpreted as a preference by the
admin for old and well-tested Diffie-Hellman key agreement over newer
elliptic curve ones. Otherwise the faster elliptic curve ciphersuites
would be preferred. This didn't really work as intended since this
affects the ClientHello on outgoing s2s connections, leading to some
servers using poorly configured kEDH.

With Debian shipping OpenSSL settings that enforce a higher security
level, this caused interoperability problems with servers that use DH
params smaller than 2048 bits. E.g. jabber.org at the time of this
writing has 1024 bit DH params.

MattJ says
> Curves have won, and OpenSSL is less weird about them now
2019-08-25 20:22:35 +02:00
Kim Alvefur
96620cafe5 core.certmanager: Look for privkey.pem to go with fullchain.pem (fix #1526)
This makes
`prosodyctl cert import example.com /path/to/example.com/fullchain.pem`
work. This was never intended to, yet users commonly tried this and got
problems.
2020-04-10 16:11:09 +02:00
Kim Alvefur
fb5e6faad6 core.certmanager: Add TODO about LuaSec issue 2020-06-07 02:12:50 +02:00
Kim Alvefur
64ea805d66 Merge 0.11->trunk 2020-04-10 19:03:36 +02:00
Kim Alvefur
1f33d9c6bb core.portmanager: Fix TLS context inheritance for SNI hosts (completes SNI support) 2019-11-29 23:24:14 +01:00
Kim Alvefur
5bba716be9 core.certmanager: Lower severity for tls config not having cert
This is needed for SNI where certificates are in separate
per-hostname contexts, not the main one.

If there is a cert, it will still require a corresponding key.
2019-09-07 00:00:40 +02:00
Kim Alvefur
f39535cfd0 core.certmanager: Remove unused import [luacheck] 2019-08-25 23:25:42 +02:00
Kim Alvefur
b16782257d Remove COMPAT with temporary luasec fork
The changes in the temporary fork were merged into mainline luasec ca
2013 and included in the 0.5 release in 2014.
2019-08-25 23:12:55 +02:00
Kim Alvefur
df3f84ce54 core.certmanager: Move EECDH ciphers before EDH in default cipherstring
The original intent of having kEDH before kEECDH was that if a `dhparam`
file was specified, this would be interpreted as a preference by the
admin for old and well-tested Diffie-Hellman key agreement over newer
elliptic curve ones. Otherwise the faster elliptic curve ciphersuites
would be preferred. This didn't really work as intended since this
affects the ClientHello on outgoing s2s connections, leading to some
servers using poorly configured kEDH.

With Debian shipping OpenSSL settings that enforce a higher security
level, this caused interoperability problems with servers that use DH
params smaller than 2048 bits. E.g. jabber.org at the time of this
writing has 1024 bit DH params.

MattJ says
> Curves have won, and OpenSSL is less weird about them now
2019-08-25 20:22:35 +02:00
Kim Alvefur
dedba5658e Merge 0.10->trunk 2018-05-25 03:33:13 +02:00
Kim Alvefur
400d3337aa core.certmanager: Allow all non-whitespace in service name (fixes #1019) 2018-05-25 03:30:16 +02:00
Kim Alvefur
43b814a83b vairious: Add annotation when an empty environment is set [luacheck] 2018-02-28 20:06:26 +01:00
Kim Alvefur
b8915c9db4 certmanager: Check for missing certificate before key in configuration (should be marginally less confusing) 2017-12-28 17:32:56 +01:00
Kim Alvefur
0158bad7ad certmanager: Set single curve conditioned on LuaSec advertising EC crypto support 2017-11-20 00:27:26 +01:00
Kim Alvefur
b9005e7b8a certmanager: Filter out curves not supported by LuaSec 2017-11-20 00:26:41 +01:00
Kim Alvefur
0315d775b2 certmanager: Change table representing LuaSec capabilities to match capabilities table exposed in LuaSec 0.7 2017-11-20 00:25:18 +01:00
Kim Alvefur
e1a94acbb9 core.certmanager: Set a default curveslist [sic], fixes #879, #943, #951 if used along with luasec 0.7 and openssl 1.1 2017-09-27 15:45:07 +02:00
Kim Alvefur
296e430244 prosodyctl: cert import: Reuse function from certmanager for locating certificates and keys 2017-09-27 15:21:20 +02:00
Matthew Wild
2ae9801ba6 certmanager: Add debug logging (thanks av6) 2017-09-23 17:13:29 +01:00
Kim Alvefur
f65858dd27 certmanager: Update the 'certificates' option after the config has been reloaded (fixes #929) 2017-06-01 14:03:50 +02:00