mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
crypto/tls: add support for Certificate Transparency
This change adds support for serving and receiving Signed Certificate Timestamps as described in RFC 6962. The server is now capable of serving SCTs listed in the Certificate structure. The client now asks for SCTs and, if any are received, they are exposed in the ConnectionState structure. Fixes #10201 Change-Id: Ib3adae98cb4f173bc85cec04d2bdd3aa0fec70bb Reviewed-on: https://go-review.googlesource.com/8988 Reviewed-by: Adam Langley <agl@golang.org> Run-TryBot: Adam Langley <agl@golang.org> Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
This commit is contained in:
parent
06b29738e8
commit
cf04082452
31 changed files with 1106 additions and 779 deletions
|
@ -9,6 +9,8 @@ import (
|
|||
"crypto/ecdsa"
|
||||
"crypto/rsa"
|
||||
"crypto/x509"
|
||||
"encoding/base64"
|
||||
"encoding/binary"
|
||||
"encoding/pem"
|
||||
"fmt"
|
||||
"io"
|
||||
|
@ -49,6 +51,10 @@ type clientTest struct {
|
|||
// key, if not nil, contains either a *rsa.PrivateKey or
|
||||
// *ecdsa.PrivateKey which is the private key for the reference server.
|
||||
key interface{}
|
||||
// extensions, if not nil, contains a list of extension data to be returned
|
||||
// from the ServerHello. The data should be in standard TLS format with
|
||||
// a 2-byte uint16 type, 2-byte data length, followed by the extension data.
|
||||
extensions [][]byte
|
||||
// validate, if not nil, is a function that will be called with the
|
||||
// ConnectionState of the resulting connection. It returns a non-nil
|
||||
// error if the ConnectionState is unacceptable.
|
||||
|
@ -111,6 +117,19 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
|||
const serverPort = 24323
|
||||
command = append(command, "-accept", strconv.Itoa(serverPort))
|
||||
|
||||
if len(test.extensions) > 0 {
|
||||
var serverInfo bytes.Buffer
|
||||
for _, ext := range test.extensions {
|
||||
pem.Encode(&serverInfo, &pem.Block{
|
||||
Type: fmt.Sprintf("SERVERINFO FOR EXTENSION %d", binary.BigEndian.Uint16(ext)),
|
||||
Bytes: ext,
|
||||
})
|
||||
}
|
||||
serverInfoPath := tempFile(serverInfo.String())
|
||||
defer os.Remove(serverInfoPath)
|
||||
command = append(command, "-serverinfo", serverInfoPath)
|
||||
}
|
||||
|
||||
cmd := exec.Command(command[0], command[1:]...)
|
||||
stdin = blockingSource(make(chan bool))
|
||||
cmd.Stdin = stdin
|
||||
|
@ -193,7 +212,7 @@ func (test *clientTest) run(t *testing.T, write bool) {
|
|||
}
|
||||
if test.validate != nil {
|
||||
if err := test.validate(client.ConnectionState()); err != nil {
|
||||
t.Logf("validate callback returned error: %s", err)
|
||||
t.Errorf("validate callback returned error: %s", err)
|
||||
}
|
||||
}
|
||||
client.Close()
|
||||
|
@ -394,7 +413,7 @@ func TestClientResumption(t *testing.T) {
|
|||
}
|
||||
|
||||
testResumeState := func(test string, didResume bool) {
|
||||
hs, err := testHandshake(clientConfig, serverConfig)
|
||||
_, hs, err := testHandshake(clientConfig, serverConfig)
|
||||
if err != nil {
|
||||
t.Fatalf("%s: handshake failed: %s", test, err)
|
||||
}
|
||||
|
@ -507,3 +526,41 @@ func TestHandshakeClientALPNNoMatch(t *testing.T) {
|
|||
}
|
||||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
||||
// sctsBase64 contains data from `openssl s_client -serverinfo 18 -connect ritter.vg:443`
|
||||
const sctsBase64 = "ABIBaQFnAHUApLkJkLQYWBSHuxOizGdwCjw1mAT5G9+443fNDsgN3BAAAAFHl5nuFgAABAMARjBEAiAcS4JdlW5nW9sElUv2zvQyPoZ6ejKrGGB03gjaBZFMLwIgc1Qbbn+hsH0RvObzhS+XZhr3iuQQJY8S9G85D9KeGPAAdgBo9pj4H2SCvjqM7rkoHUz8cVFdZ5PURNEKZ6y7T0/7xAAAAUeX4bVwAAAEAwBHMEUCIDIhFDgG2HIuADBkGuLobU5a4dlCHoJLliWJ1SYT05z6AiEAjxIoZFFPRNWMGGIjskOTMwXzQ1Wh2e7NxXE1kd1J0QsAdgDuS723dc5guuFCaR+r4Z5mow9+X7By2IMAxHuJeqj9ywAAAUhcZIqHAAAEAwBHMEUCICmJ1rBT09LpkbzxtUC+Hi7nXLR0J+2PmwLp+sJMuqK+AiEAr0NkUnEVKVhAkccIFpYDqHOlZaBsuEhWWrYpg2RtKp0="
|
||||
|
||||
func TestHandshakClientSCTs(t *testing.T) {
|
||||
config := *testConfig
|
||||
|
||||
scts, err := base64.StdEncoding.DecodeString(sctsBase64)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
test := &clientTest{
|
||||
name: "SCT",
|
||||
// Note that this needs OpenSSL 1.0.2 because that is the first
|
||||
// version that supports the -serverinfo flag.
|
||||
command: []string{"openssl", "s_server"},
|
||||
config: &config,
|
||||
extensions: [][]byte{scts},
|
||||
validate: func(state ConnectionState) error {
|
||||
expectedSCTs := [][]byte{
|
||||
scts[8:125],
|
||||
scts[127:245],
|
||||
scts[247:],
|
||||
}
|
||||
if n := len(state.SignedCertificateTimestamps); n != len(expectedSCTs) {
|
||||
return fmt.Errorf("Got %d scts, wanted %d", n, len(expectedSCTs))
|
||||
}
|
||||
for i, expected := range expectedSCTs {
|
||||
if sct := state.SignedCertificateTimestamps[i]; !bytes.Equal(sct, expected) {
|
||||
return fmt.Errorf("SCT #%d contained %x, expected %x", i, sct, expected)
|
||||
}
|
||||
}
|
||||
return nil
|
||||
},
|
||||
}
|
||||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue