]> git.ipfire.org Git - thirdparty/strongswan.git/commitdiff
optional certificate-based peer authentication on TLS server side
authorAndreas Steffen <andreas.steffen@strongswan.org>
Sun, 15 Aug 2010 11:02:57 +0000 (13:02 +0200)
committerAndreas Steffen <andreas.steffen@strongswan.org>
Sun, 15 Aug 2010 11:02:57 +0000 (13:02 +0200)
src/libcharon/plugins/eap_tls/eap_tls.c
src/libcharon/plugins/eap_ttls/eap_ttls.c
src/libtls/tls.c
src/libtls/tls.h
src/libtls/tls_server.c
src/libtls/tls_server.h

index e4f12d7f6d0e392fddf7b89108b51ec5303dcfb2..849f038758cc6be436bfd75e137e279a05355645 100644 (file)
@@ -433,8 +433,8 @@ static eap_tls_t *eap_tls_create(identification_t *server,
                .is_server = is_server,
        );
        /* MSK PRF ASCII constant label according to EAP-TLS RFC 5216 */
-       this->tls = tls_create(is_server, server, peer, "client EAP encryption",
-                                                  NULL);
+       this->tls = tls_create(is_server, server, peer, TRUE,
+                                                  "client EAP encryption", NULL);
 
        return &this->public;
 }
index 56713c30283cf0460a77aee6fb55a37801668985..dd24f401a59376d23d3f5ac4fc0850ac8d7f8a51 100644 (file)
@@ -441,8 +441,8 @@ static eap_ttls_t *eap_ttls_create(identification_t *server,
                .is_server = is_server,
        );
        /* MSK PRF ASCII constant label according to EAP-TTLS RFC 5281 */
-       this->tls = tls_create(is_server, server, peer, "ttls keying material",
-                                                  application);
+       this->tls = tls_create(is_server, server, peer, FALSE,
+                                                  "ttls keying material", application);
        return &this->public;
 }
 
index 24f442ca9a609bf25a354eae5773448eecc6854b..e3be79dda0a3dec1b81da947e25f944c50fa652f 100644 (file)
@@ -178,8 +178,8 @@ METHOD(tls_t, destroy, void,
  * See header
  */
 tls_t *tls_create(bool is_server, identification_t *server,
-                                 identification_t *peer, char *msk_label,
-                                 tls_application_t *application)
+                                 identification_t *peer, bool request_peer_auth,
+                                 char *msk_label, tls_application_t *application)
 {
        private_tls_t *this;
 
@@ -205,7 +205,8 @@ tls_t *tls_create(bool is_server, identification_t *server,
        if (is_server)
        {
                this->handshake = &tls_server_create(&this->public, this->crypto,
-                                                                               this->server, this->peer)->handshake;
+                                                                               this->server, this->peer,
+                                                                               request_peer_auth)->handshake;
        }
        else
        {
index ea66b76619fab9ae137395d584371f187c4015f5..95ec6011c1070668e6364c9455cf05c1323d7800 100644 (file)
@@ -161,15 +161,16 @@ struct tls_t {
 /**
  * Create a tls instance.
  *
- * @param is_server            TRUE to act as server, FALSE for client
- * @param server               server identity
- * @param peer                 peer identity
- * @param msk_label            ASCII string constant used as seed for MSK PRF
- * @param application  higher layer application or NULL if none
- * @return                             TLS stack
+ * @param is_server                    TRUE to act as server, FALSE for client
+ * @param server                       server identity
+ * @param peer                         peer identity
+ * @param request_peer_auth    TRUE to request certificate-based peer authentication
+ * @param msk_label                    ASCII string constant used as seed for MSK PRF
+ * @param application          higher layer application or NULL if none
+ * @return                                     TLS stack
  */
 tls_t *tls_create(bool is_server, identification_t *server,
-                                 identification_t *peer, char *msk_label,
-                                 tls_application_t *application);
+                                 identification_t *peer, bool request_peer_auth,
+                                 char *msk_label, tls_application_t *application);
 
 #endif /** TLS_H_ @}*/
index 673b20145e264692ee21a8f9d3626cfc65928294..2b2845ea130beb6c800b6ffa601454966f0c8770 100644 (file)
@@ -83,6 +83,11 @@ struct private_tls_server_t {
         */
        char server_random[32];
 
+       /**
+        * Does the server request a peer authentication?
+        */
+       bool request_peer_auth;
+
        /**
         * Auth helper for peer authentication
         */
@@ -332,8 +337,12 @@ METHOD(tls_handshake_t, process, status_t,
                        {
                                return process_certificate(this, reader);
                        }
-                       expected = TLS_CERTIFICATE;
-                       break;
+                       if (this->request_peer_auth)
+                       {
+                               expected = TLS_CERTIFICATE;
+                               break;
+                       }
+                       /* otherwise fall through to next state */
                case STATE_CERT_RECEIVED:
                        if (type == TLS_CLIENT_KEY_EXCHANGE)
                        {
@@ -346,8 +355,15 @@ METHOD(tls_handshake_t, process, status_t,
                        {
                                return process_cert_verify(this, reader);
                        }
-                       expected = TLS_CERTIFICATE_VERIFY;
-                       break;
+                       if (this->request_peer_auth)
+                       {
+                               expected = TLS_CERTIFICATE_VERIFY;
+                               break;
+                       }
+                       else
+                       {
+                               return INVALID_STATE;
+                       }
                case STATE_CIPHERSPEC_CHANGED_IN:
                        if (type == TLS_FINISHED)
                        {
@@ -547,7 +563,11 @@ METHOD(tls_handshake_t, build, status_t,
                case STATE_HELLO_SENT:
                        return send_certificate(this, type, writer);
                case STATE_CERT_SENT:
-                       return send_certificate_request(this, type, writer);
+                       if (this->request_peer_auth)
+                       {
+                               return send_certificate_request(this, type, writer);
+                       }
+                       /* otherwise fall through to next state */
                case STATE_CERTREQ_SENT:
                        return send_hello_done(this, type, writer);
                case STATE_CIPHERSPEC_CHANGED_OUT:
@@ -574,7 +594,8 @@ METHOD(tls_handshake_t, cipherspec_changed, bool,
 METHOD(tls_handshake_t, change_cipherspec, bool,
        private_tls_server_t *this)
 {
-       if (this->state == STATE_CERT_VERIFY_RECEIVED)
+       if ((this->request_peer_auth && this->state == STATE_CERT_VERIFY_RECEIVED) ||
+          (!this->request_peer_auth && this->state == STATE_KEY_EXCHANGE_RECEIVED))
        {
                this->crypto->change_cipher(this->crypto, TRUE);
                this->state = STATE_CIPHERSPEC_CHANGED_IN;
@@ -602,7 +623,8 @@ METHOD(tls_handshake_t, destroy, void,
  * See header
  */
 tls_server_t *tls_server_create(tls_t *tls, tls_crypto_t *crypto,
-                                                       identification_t *server, identification_t *peer)
+                                                       identification_t *server, identification_t *peer,
+                                                       bool request_peer_auth)
 {
        private_tls_server_t *this;
 
@@ -620,6 +642,7 @@ tls_server_t *tls_server_create(tls_t *tls, tls_crypto_t *crypto,
                .server = server,
                .peer = peer,
                .state = STATE_INIT,
+               .request_peer_auth = request_peer_auth,
                .peer_auth = auth_cfg_create(),
                .server_auth = auth_cfg_create(),
        );
index 6dc26cd3fa209e61e3b7ca2e220d42ce545069fb..a15d54f02b185188a59c2e9a970a7a2dd1c3d3aa 100644 (file)
@@ -43,6 +43,7 @@ struct tls_server_t {
  * Create a tls_server instance.
  */
 tls_server_t *tls_server_create(tls_t *tls, tls_crypto_t *crypto,
-                                                       identification_t *server, identification_t *peer);
+                                                       identification_t *server, identification_t *peer,
+                                                       bool request_peer_auth);
 
 #endif /** TLS_SERVER_H_ @}*/