mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
add InsecureSkipServerNameVerify to tls.Config
This commit is contained in:
parent
5eb62ee120
commit
da622db4a3
3 changed files with 22 additions and 3 deletions
|
@ -656,6 +656,15 @@ type Config struct {
|
|||
// testing or in combination with VerifyConnection or VerifyPeerCertificate.
|
||||
InsecureSkipVerify bool
|
||||
|
||||
// InsecureSkipServerNameVerify controls whether a client verifies the
|
||||
// server's certificate chain only without verify host name.
|
||||
// If InsecureSkipServerNameVerify is true, crypto/tls will do normal
|
||||
// certificate validation but ignore certifacate's DNSName. This is intended
|
||||
// to use with spoofed ServerName and VerifyConnection.
|
||||
//
|
||||
// This field is ignored when InsecureSkipVerify is true.
|
||||
InsecureSkipServerNameVerify bool // [uTLS]
|
||||
|
||||
// CipherSuites is a list of enabled TLS 1.0–1.2 cipher suites. The order of
|
||||
// the list is ignored. Note that TLS 1.3 ciphersuites are not configurable.
|
||||
//
|
||||
|
|
|
@ -40,9 +40,13 @@ var testingOnlyForceClientHelloSignatureAlgorithms []SignatureScheme
|
|||
|
||||
func (c *Conn) makeClientHello() (*clientHelloMsg, ecdheParameters, error) {
|
||||
config := c.config
|
||||
if len(config.ServerName) == 0 && !config.InsecureSkipVerify {
|
||||
|
||||
// [UTLS SECTION START]
|
||||
skipServerNameVerify := config.InsecureSkipVerify || config.InsecureSkipServerNameVerify
|
||||
if len(config.ServerName) == 0 && !skipServerNameVerify {
|
||||
return nil, nil, errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
|
||||
}
|
||||
// [UTLS SECTION END]
|
||||
|
||||
nextProtosLength := 0
|
||||
for _, proto := range config.NextProtos {
|
||||
|
@ -874,13 +878,18 @@ func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
|
|||
}
|
||||
|
||||
if !c.config.InsecureSkipVerify {
|
||||
// [UTLS SECTION START]
|
||||
opts := x509.VerifyOptions{
|
||||
Roots: c.config.RootCAs,
|
||||
CurrentTime: c.config.time(),
|
||||
DNSName: c.config.ServerName,
|
||||
Intermediates: x509.NewCertPool(),
|
||||
}
|
||||
|
||||
if !c.config.InsecureSkipServerNameVerify {
|
||||
opts.DNSName = c.config.ServerName
|
||||
}
|
||||
// [UTLS SECTION END]
|
||||
|
||||
for _, cert := range certs[1:] {
|
||||
opts.Intermediates.AddCert(cert)
|
||||
}
|
||||
|
|
|
@ -377,7 +377,8 @@ func (c *UConn) clientHandshake(ctx context.Context) (err error) {
|
|||
// [uTLS section begins]
|
||||
// don't make new ClientHello, use hs.hello
|
||||
// preserve the checks from beginning and end of makeClientHello()
|
||||
if len(c.config.ServerName) == 0 && !c.config.InsecureSkipVerify {
|
||||
skipServerNameVerify := c.config.InsecureSkipVerify || c.config.InsecureSkipServerNameVerify
|
||||
if len(c.config.ServerName) == 0 && !skipServerNameVerify {
|
||||
return errors.New("tls: either ServerName or InsecureSkipVerify must be specified in the tls.Config")
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue