This commit is contained in:
Adnan Maolood 2020-11-05 22:30:13 -05:00
parent a5712c7705
commit ff6c95930b
3 changed files with 29 additions and 20 deletions

View File

@ -213,27 +213,27 @@ func (c *Client) verifyConnection(req *Request, cs tls.ConnectionState) error {
if c.InsecureSkipTrust { if c.InsecureSkipTrust {
return nil return nil
} }
// Check the known hosts // Check the known hosts
// No need to check if it is expired as tls already does that
knownHost, ok := c.KnownHosts.Lookup(hostname) knownHost, ok := c.KnownHosts.Lookup(hostname)
if ok { if !ok || time.Now().Unix() >= knownHost.Expires {
fingerprint := NewFingerprint(cert) // See if the client trusts the certificate
if knownHost.Hex != fingerprint.Hex { if c.TrustCertificate != nil {
return errors.New("gemini: fingerprint does not match") switch c.TrustCertificate(hostname, cert) {
case TrustOnce:
c.KnownHosts.AddTemporary(hostname, cert)
return nil
case TrustAlways:
c.KnownHosts.Add(hostname, cert)
return nil
}
} }
return nil return errors.New("gemini: certificate not trusted")
} }
// See if the client trusts the certificate fingerprint := NewFingerprint(cert)
if c.TrustCertificate != nil { if knownHost.Hex == fingerprint.Hex {
switch c.TrustCertificate(hostname, cert) { return nil
case TrustOnce:
c.KnownHosts.AddTemporary(hostname, cert)
return nil
case TrustAlways:
c.KnownHosts.Add(hostname, cert)
return nil
}
} }
return errors.New("gemini: certificate not trusted") return errors.New("gemini: fingerprint does not match")
} }

View File

@ -156,7 +156,7 @@ func (s *Server) getCertificateFor(hostname string) (*tls.Certificate, error) {
// Generate a new certificate if it is missing or expired // Generate a new certificate if it is missing or expired
cert, ok := s.Certificates.Lookup(hostname) cert, ok := s.Certificates.Lookup(hostname)
if !ok || cert.Leaf != nil && !time.Now().After(cert.Leaf.NotAfter) { if !ok || cert.Leaf != nil && cert.Leaf.NotAfter.Before(time.Now()) {
if s.CreateCertificate != nil { if s.CreateCertificate != nil {
cert, err := s.CreateCertificate(hostname) cert, err := s.CreateCertificate(hostname)
if err == nil { if err == nil {

13
tofu.go
View File

@ -8,6 +8,7 @@ import (
"io" "io"
"os" "os"
"path/filepath" "path/filepath"
"strconv"
"strings" "strings"
) )
@ -105,7 +106,7 @@ func (k *KnownHosts) Parse(r io.Reader) {
for scanner.Scan() { for scanner.Scan() {
text := scanner.Text() text := scanner.Text()
parts := strings.Split(text, " ") parts := strings.Split(text, " ")
if len(parts) < 3 { if len(parts) < 4 {
continue continue
} }
@ -116,9 +117,15 @@ func (k *KnownHosts) Parse(r io.Reader) {
} }
fingerprint := parts[2] fingerprint := parts[2]
expires, err := strconv.ParseInt(parts[3], 10, 0)
if err != nil {
continue
}
k.hosts[hostname] = Fingerprint{ k.hosts[hostname] = Fingerprint{
Algorithm: algorithm, Algorithm: algorithm,
Hex: fingerprint, Hex: fingerprint,
Expires: expires,
} }
} }
} }
@ -131,13 +138,14 @@ func (k *KnownHosts) Write(w io.Writer) {
} }
func appendKnownHost(w io.Writer, hostname string, f Fingerprint) (int, error) { func appendKnownHost(w io.Writer, hostname string, f Fingerprint) (int, error) {
return fmt.Fprintf(w, "%s %s %s\n", hostname, f.Algorithm, f.Hex) return fmt.Fprintf(w, "%s %s %s %d\n", hostname, f.Algorithm, f.Hex, f.Expires)
} }
// Fingerprint represents a fingerprint using a certain algorithm. // Fingerprint represents a fingerprint using a certain algorithm.
type Fingerprint struct { type Fingerprint struct {
Algorithm string // fingerprint algorithm e.g. SHA-512 Algorithm string // fingerprint algorithm e.g. SHA-512
Hex string // fingerprint in hexadecimal, with ':' between each octet Hex string // fingerprint in hexadecimal, with ':' between each octet
Expires int64 // unix time of the fingerprint expiration date
} }
// NewFingerprint returns the SHA-512 fingerprint of the provided certificate. // NewFingerprint returns the SHA-512 fingerprint of the provided certificate.
@ -153,6 +161,7 @@ func NewFingerprint(cert *x509.Certificate) Fingerprint {
return Fingerprint{ return Fingerprint{
Algorithm: "SHA-512", Algorithm: "SHA-512",
Hex: b.String(), Hex: b.String(),
Expires: cert.NotAfter.Unix(),
} }
} }