mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: don't reverify but check certificate expiration on resumption
We used to inconsistently run certificate verification on the server on resumption, but not on the client. This made TLS 1.3 resumption pretty much useless, as it didn't save bytes, CPU, or round-trips. This requires serializing the verified chains into the session ticket, so it's a tradeoff making the ticket bigger to save computation (and for consistency). The previous behavior also had a "stickyness" issue: if a ticket contained invalid certificates, they would be used even if the client had in the meantime configured valid certificates for a full handshake. We also didn't check expiration on the client side on resumption if InsecureSkipVerify was set. Again for consistency, we do that now. Also, we used to run VerifyPeerCertificates on resumption even if NoClientCerts was set. Fixes #31641 Change-Id: Icc88269ea4adb544fa81158114aae76f3c91a15f Reviewed-on: https://go-review.googlesource.com/c/go/+/497895 Reviewed-by: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Run-TryBot: Filippo Valsorda <filippo@golang.org> Reviewed-by: Roland Shoemaker <roland@golang.org> Auto-Submit: Filippo Valsorda <filippo@golang.org>
This commit is contained in:
parent
b6a93d8a50
commit
5ca720fc5e
36 changed files with 2436 additions and 2275 deletions
144
tls_test.go
144
tls_test.go
|
@ -1658,3 +1658,147 @@ func TestPKCS1OnlyCert(t *testing.T) {
|
|||
t.Error(err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestVerifyCertificates(t *testing.T) {
|
||||
// See https://go.dev/issue/31641.
|
||||
t.Run("TLSv12", func(t *testing.T) { testVerifyCertificates(t, VersionTLS12) })
|
||||
t.Run("TLSv13", func(t *testing.T) { testVerifyCertificates(t, VersionTLS13) })
|
||||
}
|
||||
|
||||
func testVerifyCertificates(t *testing.T, version uint16) {
|
||||
tests := []struct {
|
||||
name string
|
||||
|
||||
InsecureSkipVerify bool
|
||||
ClientAuth ClientAuthType
|
||||
ClientCertificates bool
|
||||
}{
|
||||
{
|
||||
name: "defaults",
|
||||
},
|
||||
{
|
||||
name: "InsecureSkipVerify",
|
||||
InsecureSkipVerify: true,
|
||||
},
|
||||
{
|
||||
name: "RequestClientCert with no certs",
|
||||
ClientAuth: RequestClientCert,
|
||||
},
|
||||
{
|
||||
name: "RequestClientCert with certs",
|
||||
ClientAuth: RequestClientCert,
|
||||
ClientCertificates: true,
|
||||
},
|
||||
{
|
||||
name: "RequireAnyClientCert",
|
||||
ClientAuth: RequireAnyClientCert,
|
||||
ClientCertificates: true,
|
||||
},
|
||||
{
|
||||
name: "VerifyClientCertIfGiven with no certs",
|
||||
ClientAuth: VerifyClientCertIfGiven,
|
||||
},
|
||||
{
|
||||
name: "VerifyClientCertIfGiven with certs",
|
||||
ClientAuth: VerifyClientCertIfGiven,
|
||||
ClientCertificates: true,
|
||||
},
|
||||
{
|
||||
name: "RequireAndVerifyClientCert",
|
||||
ClientAuth: RequireAndVerifyClientCert,
|
||||
ClientCertificates: true,
|
||||
},
|
||||
}
|
||||
|
||||
issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
rootCAs := x509.NewCertPool()
|
||||
rootCAs.AddCert(issuer)
|
||||
|
||||
for _, test := range tests {
|
||||
test := test
|
||||
t.Run(test.name, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
var serverVerifyConnection, clientVerifyConnection bool
|
||||
var serverVerifyPeerCertificates, clientVerifyPeerCertificates bool
|
||||
|
||||
clientConfig := testConfig.Clone()
|
||||
clientConfig.Time = func() time.Time { return time.Unix(1476984729, 0) }
|
||||
clientConfig.MaxVersion = version
|
||||
clientConfig.MinVersion = version
|
||||
clientConfig.RootCAs = rootCAs
|
||||
clientConfig.ServerName = "example.golang"
|
||||
clientConfig.ClientSessionCache = NewLRUClientSessionCache(1)
|
||||
serverConfig := clientConfig.Clone()
|
||||
serverConfig.ClientCAs = rootCAs
|
||||
|
||||
clientConfig.VerifyConnection = func(cs ConnectionState) error {
|
||||
clientVerifyConnection = true
|
||||
return nil
|
||||
}
|
||||
clientConfig.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
||||
clientVerifyPeerCertificates = true
|
||||
return nil
|
||||
}
|
||||
serverConfig.VerifyConnection = func(cs ConnectionState) error {
|
||||
serverVerifyConnection = true
|
||||
return nil
|
||||
}
|
||||
serverConfig.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
|
||||
serverVerifyPeerCertificates = true
|
||||
return nil
|
||||
}
|
||||
|
||||
clientConfig.InsecureSkipVerify = test.InsecureSkipVerify
|
||||
serverConfig.ClientAuth = test.ClientAuth
|
||||
if !test.ClientCertificates {
|
||||
clientConfig.Certificates = nil
|
||||
}
|
||||
|
||||
if _, _, err := testHandshake(t, clientConfig, serverConfig); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
want := serverConfig.ClientAuth != NoClientCert
|
||||
if serverVerifyPeerCertificates != want {
|
||||
t.Errorf("VerifyPeerCertificates on the server: got %v, want %v",
|
||||
serverVerifyPeerCertificates, want)
|
||||
}
|
||||
if !clientVerifyPeerCertificates {
|
||||
t.Errorf("VerifyPeerCertificates not called on the client")
|
||||
}
|
||||
if !serverVerifyConnection {
|
||||
t.Error("VerifyConnection did not get called on the server")
|
||||
}
|
||||
if !clientVerifyConnection {
|
||||
t.Error("VerifyConnection did not get called on the client")
|
||||
}
|
||||
|
||||
serverVerifyPeerCertificates, clientVerifyPeerCertificates = false, false
|
||||
serverVerifyConnection, clientVerifyConnection = false, false
|
||||
cs, _, err := testHandshake(t, clientConfig, serverConfig)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
if !cs.DidResume {
|
||||
t.Error("expected resumption")
|
||||
}
|
||||
|
||||
if serverVerifyPeerCertificates {
|
||||
t.Error("VerifyPeerCertificates got called on the server on resumption")
|
||||
}
|
||||
if clientVerifyPeerCertificates {
|
||||
t.Error("VerifyPeerCertificates got called on the client on resumption")
|
||||
}
|
||||
if !serverVerifyConnection {
|
||||
t.Error("VerifyConnection did not get called on the server on resumption")
|
||||
}
|
||||
if !clientVerifyConnection {
|
||||
t.Error("VerifyConnection did not get called on the client on resumption")
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue