aboutsummaryrefslogtreecommitdiffstats
path: root/doc/apps/s_client.pod
diff options
context:
space:
mode:
authorViktor Dukhovni <openssl-users@dukhovni.org>2016-02-07 19:07:57 -0500
committerViktor Dukhovni <openssl-users@dukhovni.org>2016-02-08 14:46:09 -0500
commitc0a445a9f279d8c4a519b58e52a50112f2341070 (patch)
treec2db9e0cde2805aaf92689ee583c5fc7ce5efaa4 /doc/apps/s_client.pod
parent2d9a9d8aac9c365cd36c072b72cba2525e63c454 (diff)
downloadopenssl-c0a445a9f279d8c4a519b58e52a50112f2341070.tar.gz
Suppress DANE TLSA reflection when verification fails
As documented both SSL_get0_dane_authority() and SSL_get0_dane_tlsa() are expected to return a negative match depth and nothing else when verification fails. However, this only happened when verification failed during chain construction. Errors in verification of the constructed chain did not have the intended effect on these functions. This commit updates the functions to check for verify_result == X509_V_OK, and no longer erases any accumulated match information when chain construction fails. Sophisticated developers can, with care, use SSL_set_verify_result(ssl, X509_V_OK) to "peek" at TLSA info even when verification fail. They must of course first check and save the real error, and restore the original error as quickly as possible. Hiding by default seems to be the safer interface. Introduced X509_V_ERR_DANE_NO_MATCH code to signal failure to find matching TLSA records. Previously reported via X509_V_ERR_CERT_UNTRUSTED. This also changes the "-brief" output from s_client to include verification results and TLSA match information. Mentioned session resumption in code example in SSL_CTX_dane_enable(3). Also mentioned that depths returned are relative to the verified chain which is now available via SSL_get0_verified_chain(3). Added a few more test-cases to danetest, that exercise the new code. Resolved thread safety issue in use of static buffer in X509_verify_cert_error_string(). Fixed long-stating issue in apps/s_cb.c which always sets verify_error to either X509_V_OK or "chain to long", code elsewhere (e.g. s_time.c), seems to expect the actual error. [ The new chain construction code is expected to correctly generate "chain too long" errors, so at some point we need to drop the work-arounds, once SSL_set_verify_depth() is also fixed to propagate the depth to X509_STORE_CTX reliably. ] Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'doc/apps/s_client.pod')
-rw-r--r--doc/apps/s_client.pod9
1 files changed, 4 insertions, 5 deletions
diff --git a/doc/apps/s_client.pod b/doc/apps/s_client.pod
index 1cd04dd169..394c6494d7 100644
--- a/doc/apps/s_client.pod
+++ b/doc/apps/s_client.pod
@@ -202,18 +202,17 @@ fields that specify the usage, selector, matching type and associated
data, with the last of these encoded in hexadecimal. Optional
whitespace is ignored in the associated data field. For example:
- $ openssl s_client -starttls smtp -connect smtp.example.com:25 \
+ $ openssl s_client -brief -starttls smtp \
+ -connect smtp.example.com:25 \
-dane_tlsa_domain smtp.example.com \
-dane_tlsa_rrdata "2 1 1
B111DD8A1C2091A89BD4FD60C57F0716CCE50FEEFF8137CDBEE0326E 02CF362B" \
-dane_tlsa_rrdata "2 1 1
60B87575447DCBA2A36B7D11AC09FB24A9DB406FEE12D2CC90180517 616E8A18"
- CONNECTED(00000003)
...
- DANE TLSA 2 1 1 matched TA certificate at depth 1
+ Verification: OK
Verified peername: smtp.example.com
- ...
- Verify return code: 0 (ok)
+ DANE TLSA 2 1 1 ...ee12d2cc90180517616e8a18 matched TA certificate at depth 1
...
=item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>,