shithub: opusfile

Download patch

ref: 3bc748078a135fc3b31a611c4074f1f416c3e758
parent: 3f54b9ddde0cc11327887c6c207b5c48b3af451d
author: Timothy B. Terriberry <tterribe@xiph.org>
date: Sat Oct 27 02:52:11 EDT 2012

A few small updates to the hostname verification.

Fixes the case where a raw IPv6 address would be rejected as not
 looking like a FQDN.
Also simplifies the wildcard comparison a little.

--- a/src/http.c
+++ b/src/http.c
@@ -1428,9 +1428,11 @@
  ASN1_STRING *_pattern){
   const char *pattern;
   size_t      host_label_len;
+  size_t      host_suffix_len;
   size_t      pattern_len;
   size_t      pattern_label_len;
   size_t      pattern_prefix_len;
+  size_t      pattern_suffix_len;
   pattern=(const char *)ASN1_STRING_data(_pattern);
   pattern_len=strlen(pattern);
   /*Check the pattern for embedded NULs.*/
@@ -1450,9 +1452,9 @@
        the ASCII range.*/
     return _host_len==pattern_len&&op_strncasecmp(_host,pattern,_host_len)==0;
   }
-  /*"However, the client SHOULD NOT attempt to match a presented identifier where
-     the wildcard character is embedded within an A-label or U-label of an
-     internationalized domain name.*/
+  /*"However, the client SHOULD NOT attempt to match a presented identifier
+     where the wildcard character is embedded within an A-label or U-label of
+     an internationalized domain name.*/
   if(op_strncasecmp(pattern,"xn--",4)==0)return 0;
   host_label_len=strcspn(_host,".");
   /*Make sure the host has at least two dots, to prevent the wildcard match
@@ -1472,12 +1474,7 @@
     We also use the fact that the wildcard must match at least one character,
      so the left-most label of the hostname must be at least as large as the
      left-most label of the pattern.*/
-  if(host_label_len<pattern_label_len
-   ||pattern_len-pattern_label_len!=_host_len-host_label_len
-   ||op_strncasecmp(_host+host_label_len,pattern+pattern_label_len,
-   _host_len-host_label_len)!=0){
-    return 0;
-  }
+  if(host_label_len<pattern_label_len)return 0;
   OP_ASSERT(pattern[pattern_prefix_len]=='*');
   /*"The client MAY match a presented identifier in which the wildcard
      character is not the only character of the label (e.g., baz*.example.net
@@ -1484,9 +1481,13 @@
      and *baz.example.net and b*z.example.net would be taken to match
      baz1.example.net and foobaz.example.net and buzz.example.net,
      respectively)."*/
-  return op_strncasecmp(_host,pattern,pattern_prefix_len)==0&&
-   op_strncasecmp(_host+host_label_len-(pattern_label_len-pattern_prefix_len-1),
-   pattern+pattern_prefix_len+1,pattern_label_len-pattern_prefix_len-1)==0;
+  pattern_suffix_len=pattern_len-pattern_prefix_len-1;
+  host_suffix_len=_host_len-host_label_len
+   +pattern_label_len-pattern_prefix_len-1;
+  return pattern_suffix_len==host_suffix_len
+   &&op_strncasecmp(_host,pattern,pattern_prefix_len)==0
+   &&op_strncasecmp(_host+_host_len-host_suffix_len,
+   pattern+pattern_prefix_len+1,host_suffix_len)==0;
 }
 
 /*Convert a host to a numeric address, if possible.
@@ -1498,7 +1499,7 @@
   memset(&hints,0,sizeof(hints));
   hints.ai_socktype=SOCK_STREAM;
   hints.ai_flags=AI_NUMERICHOST;
-  if(OP_LIKELY(!getaddrinfo(_host,NULL,&hints,&addrs)))return addrs;
+  if(!getaddrinfo(_host,NULL,&hints,&addrs))return addrs;
   return NULL;
 }
 
@@ -1514,26 +1515,6 @@
   int                     ret;
   host=_stream->url.host;
   host_len=strlen(host);
-  /*We can only verify fully-qualified domain names.
-    To quote RFC 6125: "The extracted data MUST include only information that
-     can be securely parsed out of the inputs (e.g., parsing the fully
-     qualified DNS domain name out of the "host" component (or its equivalent)
-     of a URI or deriving the application service type from the scheme of a
-     URI) ..."
-    We don't have a way to check (without relying on DNS records, which might
-     be subverted), if this address is fully-qualified.
-    This is particularly problematic when using a CONNECT tunnel, as it is the
-     server that does DNS lookup, not us.
-    However, we are certain that if the hostname has no '.', it is definitely
-     not a fully-qualified domain name (with the exception of crazy TLDs that
-     actually resolve, like "uz", but I am willing to ignore those).
-    RFC 1535 says "...in any event where a '.' exists in a specified name it
-     should be assumed to be a fully qualified domain name (FQDN) and SHOULD be
-     tried as a rooted name first."
-    That doesn't give us any security guarantees, of course (a subverted DNS
-     could fail the original query and our resolver might still retry with a
-     local domain appended).*/
-  if(strchr(host,'.')==NULL)return 0;
   peer_cert=SSL_get_peer_certificate(_ssl_conn);
   /*We set VERIFY_PEER, so we shouldn't get here without a certificate.*/
   if(OP_UNLIKELY(peer_cert==NULL))return 0;
@@ -1587,6 +1568,26 @@
         }break;
       }
     }
+    /*We can only verify fully-qualified domain names.
+      To quote RFC 6125: "The extracted data MUST include only information that
+       can be securely parsed out of the inputs (e.g., parsing the fully
+       qualified DNS domain name out of the "host" component (or its
+       equivalent) of a URI or deriving the application service type from the
+       scheme of a URI) ..."
+      We don't have a way to check (without relying on DNS records, which might
+       be subverted), if this address is fully-qualified.
+      This is particularly problematic when using a CONNECT tunnel, as it is
+       the server that does DNS lookup, not us.
+      However, we are certain that if the hostname has no '.', it is definitely
+       not a fully-qualified domain name (with the exception of crazy TLDs that
+       actually resolve, like "uz", but I am willing to ignore those).
+      RFC 1535 says "...in any event where a '.' exists in a specified name it
+       should be assumed to be a fully qualified domain name (FQDN) and SHOULD
+       be tried as a rooted name first."
+      That doesn't give us any security guarantees, of course (a subverted DNS
+       could fail the original query and our resolver might still retry with a
+       local domain appended).*/
+    if(ip==NULL&&strchr(host,'.')==NULL)return 0;
     /*RFC 2459 says there MUST be at least one, but we don't depend on it.*/
     nsan_names=sk_GENERAL_NAME_num(san_names);
     for(sni=0;sni<nsan_names;sni++){
@@ -1627,6 +1628,10 @@
   else{
     int last_cn_loc;
     int cn_loc;
+    /*Do the same FQDN check we did above.
+      We don't do this once in advance for both cases, because in the
+       subjectAltName case we might have an IPv6 address without a dot.*/
+    if(strchr(host,'.')==NULL)return 0;
     /*If there is no subjectAltName, match against commonName.
       RFC 6125 says that at least one significant CA is known to issue certs
        with multiple CNs, although it SHOULD NOT.