mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
Add InsecureSkipTimeVerify
(#174)
* add `InsecureSkipTimeVerify` * fix the cache verification when `InsecureServerNameToVerify` set * better description of `InsecureSkipTimeVerify` Co-authored-by: Gaukas Wang <i@gauk.as> * minimize the change made + wrap the modified section * fix: use tab replace space indentation --------- Co-authored-by: Gaukas Wang <i@gauk.as>
This commit is contained in:
parent
dae72adb81
commit
17e2929ff7
3 changed files with 31 additions and 7 deletions
|
@ -656,6 +656,13 @@ type Config struct {
|
||||||
// testing or in combination with VerifyConnection or VerifyPeerCertificate.
|
// testing or in combination with VerifyConnection or VerifyPeerCertificate.
|
||||||
InsecureSkipVerify bool
|
InsecureSkipVerify bool
|
||||||
|
|
||||||
|
// InsecureSkipTimeVerify controls whether a client verifies the server's
|
||||||
|
// certificate chain against time. If InsecureSkipTimeVerify is true,
|
||||||
|
// crypto/tls accepts the certificate even when it is expired.
|
||||||
|
//
|
||||||
|
// This field is ignored when InsecureSkipVerify is true.
|
||||||
|
InsecureSkipTimeVerify bool // [uTLS]
|
||||||
|
|
||||||
// InsecureServerNameToVerify is used to verify the hostname on the returned
|
// InsecureServerNameToVerify is used to verify the hostname on the returned
|
||||||
// certificates. It is intended to use with spoofed ServerName.
|
// certificates. It is intended to use with spoofed ServerName.
|
||||||
// If InsecureServerNameToVerify is "*", crypto/tls will do normal
|
// If InsecureServerNameToVerify is "*", crypto/tls will do normal
|
||||||
|
@ -821,6 +828,7 @@ func (c *Config) Clone() *Config {
|
||||||
ClientAuth: c.ClientAuth,
|
ClientAuth: c.ClientAuth,
|
||||||
ClientCAs: c.ClientCAs,
|
ClientCAs: c.ClientCAs,
|
||||||
InsecureSkipVerify: c.InsecureSkipVerify,
|
InsecureSkipVerify: c.InsecureSkipVerify,
|
||||||
|
InsecureSkipTimeVerify: c.InsecureSkipTimeVerify,
|
||||||
InsecureServerNameToVerify: c.InsecureServerNameToVerify,
|
InsecureServerNameToVerify: c.InsecureServerNameToVerify,
|
||||||
CipherSuites: c.CipherSuites,
|
CipherSuites: c.CipherSuites,
|
||||||
PreferServerCipherSuites: c.PreferServerCipherSuites,
|
PreferServerCipherSuites: c.PreferServerCipherSuites,
|
||||||
|
|
|
@ -303,14 +303,26 @@ func (c *Conn) loadSession(hello *clientHelloMsg) (cacheKey string,
|
||||||
return cacheKey, nil, nil, nil, nil
|
return cacheKey, nil, nil, nil, nil
|
||||||
}
|
}
|
||||||
serverCert := session.serverCertificates[0]
|
serverCert := session.serverCertificates[0]
|
||||||
if c.config.time().After(serverCert.NotAfter) {
|
// [UTLS SECTION START]
|
||||||
// Expired certificate, delete the entry.
|
if !c.config.InsecureSkipTimeVerify {
|
||||||
c.config.ClientSessionCache.Put(cacheKey, nil)
|
if c.config.time().After(serverCert.NotAfter) {
|
||||||
return cacheKey, nil, nil, nil, nil
|
// Expired certificate, delete the entry.
|
||||||
|
c.config.ClientSessionCache.Put(cacheKey, nil)
|
||||||
|
return cacheKey, nil, nil, nil, nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if err := serverCert.VerifyHostname(c.config.ServerName); err != nil {
|
var dnsName string
|
||||||
return cacheKey, nil, nil, nil, nil
|
if len(c.config.InsecureServerNameToVerify) == 0 {
|
||||||
|
dnsName = c.config.ServerName
|
||||||
|
} else if c.config.InsecureServerNameToVerify != "*" {
|
||||||
|
dnsName = c.config.InsecureServerNameToVerify
|
||||||
}
|
}
|
||||||
|
if len(dnsName) > 0 {
|
||||||
|
if err := serverCert.VerifyHostname(dnsName); err != nil {
|
||||||
|
return cacheKey, nil, nil, nil, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// [UTLS SECTION END]
|
||||||
}
|
}
|
||||||
|
|
||||||
if session.vers != VersionTLS13 {
|
if session.vers != VersionTLS13 {
|
||||||
|
@ -895,6 +907,10 @@ func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
|
||||||
Intermediates: x509.NewCertPool(),
|
Intermediates: x509.NewCertPool(),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if c.config.InsecureSkipTimeVerify {
|
||||||
|
opts.CurrentTime = certs[0].NotAfter
|
||||||
|
}
|
||||||
|
|
||||||
if len(c.config.InsecureServerNameToVerify) == 0 {
|
if len(c.config.InsecureServerNameToVerify) == 0 {
|
||||||
opts.DNSName = c.config.ServerName
|
opts.DNSName = c.config.ServerName
|
||||||
} else if c.config.InsecureServerNameToVerify != "*" {
|
} else if c.config.InsecureServerNameToVerify != "*" {
|
||||||
|
|
|
@ -814,7 +814,7 @@ func TestCloneNonFuncFields(t *testing.T) {
|
||||||
f.Set(reflect.ValueOf("b"))
|
f.Set(reflect.ValueOf("b"))
|
||||||
case "ClientAuth":
|
case "ClientAuth":
|
||||||
f.Set(reflect.ValueOf(VerifyClientCertIfGiven))
|
f.Set(reflect.ValueOf(VerifyClientCertIfGiven))
|
||||||
case "InsecureSkipVerify", "SessionTicketsDisabled", "DynamicRecordSizingDisabled", "PreferServerCipherSuites":
|
case "InsecureSkipVerify", "InsecureSkipTimeVerify", "SessionTicketsDisabled", "DynamicRecordSizingDisabled", "PreferServerCipherSuites":
|
||||||
f.Set(reflect.ValueOf(true))
|
f.Set(reflect.ValueOf(true))
|
||||||
case "InsecureServerNameToVerify":
|
case "InsecureServerNameToVerify":
|
||||||
f.Set(reflect.ValueOf("c"))
|
f.Set(reflect.ValueOf("c"))
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue