mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-05 13:07:36 +03:00
crypto/tls: replace VerifyPeerCertificate example with VerifyConnection
Look at how much better it is! Updates #36736 Change-Id: I53a314a103a42dd869c05823fa50f37d70f9d283 Reviewed-on: https://go-review.googlesource.com/c/go/+/239560 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Katie Hockman <katie@golang.org>
This commit is contained in:
parent
7a18f5843c
commit
b574d1d528
1 changed files with 39 additions and 44 deletions
|
@ -7,7 +7,6 @@ package tls_test
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"errors"
|
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
|
@ -184,54 +183,50 @@ EKTcWGekdmdDPsHloRNtsiCa697B2O9IFA==
|
||||||
log.Fatal(srv.ListenAndServeTLS("", ""))
|
log.Fatal(srv.ListenAndServeTLS("", ""))
|
||||||
}
|
}
|
||||||
|
|
||||||
func ExampleConfig_verifyPeerCertificate() {
|
func ExampleConfig_verifyConnection() {
|
||||||
// VerifyPeerCertificate can be used to replace and customize certificate
|
// VerifyConnection can be used to replace and customize connection
|
||||||
// verification. This example shows a VerifyPeerCertificate implementation
|
// verification. This example shows a VerifyConnection implementation that
|
||||||
// that will be approximately equivalent to what crypto/tls does normally.
|
// will be approximately equivalent to what crypto/tls does normally to
|
||||||
|
// verify the peer's certificate.
|
||||||
|
|
||||||
config := &tls.Config{
|
// Client side configuration.
|
||||||
|
_ = &tls.Config{
|
||||||
// Set InsecureSkipVerify to skip the default validation we are
|
// Set InsecureSkipVerify to skip the default validation we are
|
||||||
// replacing. This will not disable VerifyPeerCertificate.
|
// replacing. This will not disable VerifyConnection.
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
|
VerifyConnection: func(cs tls.ConnectionState) error {
|
||||||
// While packages like net/http will implicitly set ServerName, the
|
|
||||||
// VerifyPeerCertificate callback can't access that value, so it has to be set
|
|
||||||
// explicitly here or in VerifyPeerCertificate on the client side. If in
|
|
||||||
// an http.Transport DialTLS callback, this can be obtained by passing
|
|
||||||
// the addr argument to net.SplitHostPort.
|
|
||||||
ServerName: "example.com",
|
|
||||||
|
|
||||||
// On the server side, set ClientAuth to require client certificates (or
|
|
||||||
// VerifyPeerCertificate will run anyway and panic accessing certs[0])
|
|
||||||
// but not verify them with the default verifier.
|
|
||||||
// ClientAuth: tls.RequireAnyClientCert,
|
|
||||||
}
|
|
||||||
|
|
||||||
config.VerifyPeerCertificate = func(certificates [][]byte, _ [][]*x509.Certificate) error {
|
|
||||||
certs := make([]*x509.Certificate, len(certificates))
|
|
||||||
for i, asn1Data := range certificates {
|
|
||||||
cert, err := x509.ParseCertificate(asn1Data)
|
|
||||||
if err != nil {
|
|
||||||
return errors.New("tls: failed to parse certificate from server: " + err.Error())
|
|
||||||
}
|
|
||||||
certs[i] = cert
|
|
||||||
}
|
|
||||||
|
|
||||||
opts := x509.VerifyOptions{
|
opts := x509.VerifyOptions{
|
||||||
Roots: config.RootCAs, // On the server side, use config.ClientCAs.
|
DNSName: cs.ServerName,
|
||||||
DNSName: config.ServerName,
|
|
||||||
Intermediates: x509.NewCertPool(),
|
Intermediates: x509.NewCertPool(),
|
||||||
// On the server side, set KeyUsages to ExtKeyUsageClientAuth. The
|
|
||||||
// default value is appropriate for clients side verification.
|
|
||||||
// KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
|
|
||||||
}
|
}
|
||||||
for _, cert := range certs[1:] {
|
for _, cert := range cs.PeerCertificates[1:] {
|
||||||
opts.Intermediates.AddCert(cert)
|
opts.Intermediates.AddCert(cert)
|
||||||
}
|
}
|
||||||
_, err := certs[0].Verify(opts)
|
_, err := cs.PeerCertificates[0].Verify(opts)
|
||||||
return err
|
return err
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// Note that when InsecureSkipVerify and VerifyPeerCertificate are in use,
|
// Server side configuration.
|
||||||
|
_ = &tls.Config{
|
||||||
|
// Require client certificates (or VerifyConnection will run anyway and
|
||||||
|
// panic accessing cs.PeerCertificates[0]) but don't verify them with the
|
||||||
|
// default verifier. This will not disable VerifyConnection.
|
||||||
|
ClientAuth: tls.RequireAnyClientCert,
|
||||||
|
VerifyConnection: func(cs tls.ConnectionState) error {
|
||||||
|
opts := x509.VerifyOptions{
|
||||||
|
DNSName: cs.ServerName,
|
||||||
|
Intermediates: x509.NewCertPool(),
|
||||||
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
|
||||||
|
}
|
||||||
|
for _, cert := range cs.PeerCertificates[1:] {
|
||||||
|
opts.Intermediates.AddCert(cert)
|
||||||
|
}
|
||||||
|
_, err := cs.PeerCertificates[0].Verify(opts)
|
||||||
|
return err
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Note that when certificates are not handled by the default verifier
|
||||||
// ConnectionState.VerifiedChains will be nil.
|
// ConnectionState.VerifiedChains will be nil.
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue