1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
5 /* Copyright (c) University of Cambridge 1995 - 2018 */
6 /* See the file NOTICE for conditions of use and distribution. */
8 /* Portions Copyright (c) The OpenSSL Project 1999 */
10 /* This module provides the TLS (aka SSL) support for Exim using the OpenSSL
11 library. It is #included into the tls.c file when that library is used. The
12 code herein is based on a patch that was originally contributed by Steve
13 Haslam. It was adapted from stunnel, a GPL program by Michal Trojnara.
15 No cryptographic code is included in Exim. All this module does is to call
16 functions from the OpenSSL library. */
21 #include <openssl/lhash.h>
22 #include <openssl/ssl.h>
23 #include <openssl/err.h>
24 #include <openssl/rand.h>
25 #ifndef OPENSSL_NO_ECDH
26 # include <openssl/ec.h>
29 # include <openssl/ocsp.h>
37 # define EXIM_OCSP_SKEW_SECONDS (300L)
38 # define EXIM_OCSP_MAX_AGE (-1L)
41 #if OPENSSL_VERSION_NUMBER >= 0x0090806fL && !defined(OPENSSL_NO_TLSEXT)
42 # define EXIM_HAVE_OPENSSL_TLSEXT
44 #if OPENSSL_VERSION_NUMBER >= 0x00908000L
45 # define EXIM_HAVE_RSA_GENKEY_EX
47 #if OPENSSL_VERSION_NUMBER >= 0x10100000L
48 # define EXIM_HAVE_OCSP_RESP_COUNT
50 # define EXIM_HAVE_EPHEM_RSA_KEX
51 # define EXIM_HAVE_RAND_PSEUDO
53 #if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
54 # define EXIM_HAVE_SHA256
58 * X509_check_host provides sane certificate hostname checking, but was added
59 * to OpenSSL late, after other projects forked off the code-base. So in
60 * addition to guarding against the base version number, beware that LibreSSL
61 * does not (at this time) support this function.
63 * If LibreSSL gains a different API, perhaps via libtls, then we'll probably
64 * opt to disentangle and ask a LibreSSL user to provide glue for a third
65 * crypto provider for libtls instead of continuing to tie the OpenSSL glue
66 * into even twistier knots. If LibreSSL gains the same API, we can just
67 * change this guard and punt the issue for a while longer.
69 #ifndef LIBRESSL_VERSION_NUMBER
70 # if OPENSSL_VERSION_NUMBER >= 0x010100000L
71 # define EXIM_HAVE_OPENSSL_CHECKHOST
72 # define EXIM_HAVE_OPENSSL_DH_BITS
73 # define EXIM_HAVE_OPENSSL_TLS_METHOD
75 # if OPENSSL_VERSION_NUMBER >= 0x010000000L \
76 && (OPENSSL_VERSION_NUMBER & 0x0000ff000L) >= 0x000002000L
77 # define EXIM_HAVE_OPENSSL_CHECKHOST
81 #if !defined(LIBRESSL_VERSION_NUMBER) \
82 || LIBRESSL_VERSION_NUMBER >= 0x20010000L
83 # if !defined(OPENSSL_NO_ECDH)
84 # if OPENSSL_VERSION_NUMBER >= 0x0090800fL
85 # define EXIM_HAVE_ECDH
87 # if OPENSSL_VERSION_NUMBER >= 0x10002000L
88 # define EXIM_HAVE_OPENSSL_EC_NIST2NID
93 #if !defined(EXIM_HAVE_OPENSSL_TLSEXT) && !defined(DISABLE_OCSP)
94 # warning "OpenSSL library version too old; define DISABLE_OCSP in Makefile"
98 #ifdef EXIM_HAVE_OPENSSL_CHECKHOST
99 # include <openssl/x509v3.h>
102 /*************************************************
103 * OpenSSL option parse *
104 *************************************************/
106 typedef struct exim_openssl_option {
109 } exim_openssl_option;
110 /* We could use a macro to expand, but we need the ifdef and not all the
111 options document which version they were introduced in. Policylet: include
112 all options unless explicitly for DTLS, let the administrator choose which
115 This list is current as of:
117 Plus SSL_OP_SAFARI_ECDHE_ECDSA_BUG from 2013-June patch/discussion on openssl-dev
118 Plus SSL_OP_NO_TLSv1_3 for 1.1.2-dev
120 static exim_openssl_option exim_openssl_options[] = {
121 /* KEEP SORTED ALPHABETICALLY! */
123 { US"all", SSL_OP_ALL },
125 #ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
126 { US"allow_unsafe_legacy_renegotiation", SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION },
128 #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
129 { US"cipher_server_preference", SSL_OP_CIPHER_SERVER_PREFERENCE },
131 #ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
132 { US"dont_insert_empty_fragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS },
134 #ifdef SSL_OP_EPHEMERAL_RSA
135 { US"ephemeral_rsa", SSL_OP_EPHEMERAL_RSA },
137 #ifdef SSL_OP_LEGACY_SERVER_CONNECT
138 { US"legacy_server_connect", SSL_OP_LEGACY_SERVER_CONNECT },
140 #ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
141 { US"microsoft_big_sslv3_buffer", SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER },
143 #ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
144 { US"microsoft_sess_id_bug", SSL_OP_MICROSOFT_SESS_ID_BUG },
146 #ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING
147 { US"msie_sslv2_rsa_padding", SSL_OP_MSIE_SSLV2_RSA_PADDING },
149 #ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
150 { US"netscape_challenge_bug", SSL_OP_NETSCAPE_CHALLENGE_BUG },
152 #ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
153 { US"netscape_reuse_cipher_change_bug", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
155 #ifdef SSL_OP_NO_COMPRESSION
156 { US"no_compression", SSL_OP_NO_COMPRESSION },
158 #ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
159 { US"no_session_resumption_on_renegotiation", SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION },
161 #ifdef SSL_OP_NO_SSLv2
162 { US"no_sslv2", SSL_OP_NO_SSLv2 },
164 #ifdef SSL_OP_NO_SSLv3
165 { US"no_sslv3", SSL_OP_NO_SSLv3 },
167 #ifdef SSL_OP_NO_TICKET
168 { US"no_ticket", SSL_OP_NO_TICKET },
170 #ifdef SSL_OP_NO_TLSv1
171 { US"no_tlsv1", SSL_OP_NO_TLSv1 },
173 #ifdef SSL_OP_NO_TLSv1_1
174 #if SSL_OP_NO_TLSv1_1 == 0x00000400L
175 /* Error in chosen value in 1.0.1a; see first item in CHANGES for 1.0.1b */
176 #warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring
178 { US"no_tlsv1_1", SSL_OP_NO_TLSv1_1 },
181 #ifdef SSL_OP_NO_TLSv1_2
182 { US"no_tlsv1_2", SSL_OP_NO_TLSv1_2 },
184 #ifdef SSL_OP_NO_TLSv1_3
185 { US"no_tlsv1_3", SSL_OP_NO_TLSv1_3 },
187 #ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG
188 { US"safari_ecdhe_ecdsa_bug", SSL_OP_SAFARI_ECDHE_ECDSA_BUG },
190 #ifdef SSL_OP_SINGLE_DH_USE
191 { US"single_dh_use", SSL_OP_SINGLE_DH_USE },
193 #ifdef SSL_OP_SINGLE_ECDH_USE
194 { US"single_ecdh_use", SSL_OP_SINGLE_ECDH_USE },
196 #ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG
197 { US"ssleay_080_client_dh_bug", SSL_OP_SSLEAY_080_CLIENT_DH_BUG },
199 #ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
200 { US"sslref2_reuse_cert_type_bug", SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG },
202 #ifdef SSL_OP_TLS_BLOCK_PADDING_BUG
203 { US"tls_block_padding_bug", SSL_OP_TLS_BLOCK_PADDING_BUG },
205 #ifdef SSL_OP_TLS_D5_BUG
206 { US"tls_d5_bug", SSL_OP_TLS_D5_BUG },
208 #ifdef SSL_OP_TLS_ROLLBACK_BUG
209 { US"tls_rollback_bug", SSL_OP_TLS_ROLLBACK_BUG },
214 static int exim_openssl_options_size = nelem(exim_openssl_options);
221 struct exim_openssl_option * o;
224 for (o = exim_openssl_options;
225 o < exim_openssl_options + nelem(exim_openssl_options); o++)
227 /* Trailing X is workaround for problem with _OPT_OPENSSL_NO_TLSV1
228 being a ".ifdef _OPT_OPENSSL_NO_TLSV1_3" match */
230 spf(buf, sizeof(buf), US"_OPT_OPENSSL_%T_X", o->name);
231 builtin_macro_create(buf);
236 /******************************************************************************/
238 /* Structure for collecting random data for seeding. */
240 typedef struct randstuff {
245 /* Local static variables */
247 static BOOL client_verify_callback_called = FALSE;
248 static BOOL server_verify_callback_called = FALSE;
249 static const uschar *sid_ctx = US"exim";
251 /* We have three different contexts to care about.
253 Simple case: client, `client_ctx`
254 As a client, we can be doing a callout or cut-through delivery while receiving
255 a message. So we have a client context, which should have options initialised
256 from the SMTP Transport. We may also concurrently want to make TLS connections
257 to utility daemons, so client-contexts are allocated and passed around in call
258 args rather than using a gobal.
261 There are two cases: with and without ServerNameIndication from the client.
262 Given TLS SNI, we can be using different keys, certs and various other
263 configuration settings, because they're re-expanded with $tls_sni set. This
264 allows vhosting with TLS. This SNI is sent in the handshake.
265 A client might not send SNI, so we need a fallback, and an initial setup too.
266 So as a server, we start out using `server_ctx`.
267 If SNI is sent by the client, then we as server, mid-negotiation, try to clone
268 `server_sni` from `server_ctx` and then initialise settings by re-expanding
275 } exim_openssl_client_tls_ctx;
277 static SSL_CTX *server_ctx = NULL;
278 static SSL *server_ssl = NULL;
280 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
281 static SSL_CTX *server_sni = NULL;
284 static char ssl_errstring[256];
286 static int ssl_session_timeout = 200;
287 static BOOL client_verify_optional = FALSE;
288 static BOOL server_verify_optional = FALSE;
290 static BOOL reexpand_tls_files_for_sni = FALSE;
293 typedef struct tls_ext_ctx_cb {
298 STACK_OF(X509) *verify_stack; /* chain for verifying the proof */
302 uschar *file_expanded;
303 OCSP_RESPONSE *response;
306 X509_STORE *verify_store; /* non-null if status requested */
307 BOOL verify_required;
312 /* these are cached from first expand */
313 uschar *server_cipher_list;
314 /* only passed down to tls_error: */
316 const uschar * verify_cert_hostnames;
317 #ifndef DISABLE_EVENT
318 uschar * event_action;
322 /* should figure out a cleanup of API to handle state preserved per
323 implementation, for various reasons, which can be void * in the APIs.
324 For now, we hack around it. */
325 tls_ext_ctx_cb *client_static_cbinfo = NULL;
326 tls_ext_ctx_cb *server_static_cbinfo = NULL;
329 setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
330 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr );
333 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
334 static int tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg);
337 static int tls_server_stapling_cb(SSL *s, void *arg);
341 /*************************************************
343 *************************************************/
345 /* Called from lots of places when errors occur before actually starting to do
346 the TLS handshake, that is, while the session is still in clear. Always returns
347 DEFER for a server and FAIL for a client so that most calls can use "return
348 tls_error(...)" to do this processing and then give an appropriate return. A
349 single function is used for both server and client, because it is called from
350 some shared functions.
353 prefix text to include in the logged error
354 host NULL if setting up a server;
355 the connected host if setting up a client
356 msg error message or NULL if we should ask OpenSSL
357 errstr pointer to output error message
359 Returns: OK/DEFER/FAIL
363 tls_error(uschar * prefix, const host_item * host, uschar * msg, uschar ** errstr)
367 ERR_error_string(ERR_get_error(), ssl_errstring);
368 msg = US ssl_errstring;
371 if (errstr) *errstr = string_sprintf("(%s): %s", prefix, msg);
372 return host ? FAIL : DEFER;
377 /*************************************************
378 * Callback to generate RSA key *
379 *************************************************/
383 s SSL connection (not used)
387 Returns: pointer to generated key
391 rsa_callback(SSL *s, int export, int keylength)
394 #ifdef EXIM_HAVE_RSA_GENKEY_EX
395 BIGNUM *bn = BN_new();
398 export = export; /* Shut picky compilers up */
399 DEBUG(D_tls) debug_printf("Generating %d bit RSA key...\n", keylength);
401 #ifdef EXIM_HAVE_RSA_GENKEY_EX
402 if ( !BN_set_word(bn, (unsigned long)RSA_F4)
403 || !(rsa_key = RSA_new())
404 || !RSA_generate_key_ex(rsa_key, keylength, bn, NULL)
407 if (!(rsa_key = RSA_generate_key(keylength, RSA_F4, NULL, NULL)))
411 ERR_error_string(ERR_get_error(), ssl_errstring);
412 log_write(0, LOG_MAIN|LOG_PANIC, "TLS error (RSA_generate_key): %s",
424 x509_store_dump_cert_s_names(X509_STORE * store)
426 STACK_OF(X509_OBJECT) * roots= store->objs;
428 static uschar name[256];
430 for(i= 0; i<sk_X509_OBJECT_num(roots); i++)
432 X509_OBJECT * tmp_obj= sk_X509_OBJECT_value(roots, i);
433 if(tmp_obj->type == X509_LU_X509)
435 X509 * current_cert= tmp_obj->data.x509;
436 X509_NAME_oneline(X509_get_subject_name(current_cert), CS name, sizeof(name));
437 name[sizeof(name)-1] = '\0';
438 debug_printf(" %s\n", name);
446 #ifndef DISABLE_EVENT
448 verify_event(tls_support * tlsp, X509 * cert, int depth, const uschar * dn,
449 BOOL *calledp, const BOOL *optionalp, const uschar * what)
455 ev = tlsp == &tls_out ? client_static_cbinfo->event_action : event_action;
458 DEBUG(D_tls) debug_printf("verify_event: %s %d\n", what, depth);
459 old_cert = tlsp->peercert;
460 tlsp->peercert = X509_dup(cert);
461 /* NB we do not bother setting peerdn */
462 if ((yield = event_raise(ev, US"tls:cert", string_sprintf("%d", depth))))
464 log_write(0, LOG_MAIN, "[%s] %s verify denied by event-action: "
465 "depth=%d cert=%s: %s",
466 tlsp == &tls_out ? deliver_host_address : sender_host_address,
467 what, depth, dn, yield);
471 if (old_cert) tlsp->peercert = old_cert; /* restore 1st failing cert */
472 return 1; /* reject (leaving peercert set) */
474 DEBUG(D_tls) debug_printf("Event-action verify failure overridden "
475 "(host in tls_try_verify_hosts)\n");
477 X509_free(tlsp->peercert);
478 tlsp->peercert = old_cert;
484 /*************************************************
485 * Callback for verification *
486 *************************************************/
488 /* The SSL library does certificate verification if set up to do so. This
489 callback has the current yes/no state is in "state". If verification succeeded,
490 we set the certificate-verified flag. If verification failed, what happens
491 depends on whether the client is required to present a verifiable certificate
494 If verification is optional, we change the state to yes, but still log the
495 verification error. For some reason (it really would help to have proper
496 documentation of OpenSSL), this callback function then gets called again, this
497 time with state = 1. We must take care not to set the private verified flag on
498 the second time through.
500 Note: this function is not called if the client fails to present a certificate
501 when asked. We get here only if a certificate has been received. Handling of
502 optional verification for this case is done when requesting SSL to verify, by
503 setting SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the non-optional case.
505 May be called multiple times for different issues with a certificate, even
506 for a given "depth" in the certificate chain.
509 preverify_ok current yes/no state as 1/0
510 x509ctx certificate information.
511 tlsp per-direction (client vs. server) support data
512 calledp has-been-called flag
513 optionalp verification-is-optional flag
515 Returns: 0 if verification should fail, otherwise 1
519 verify_callback(int preverify_ok, X509_STORE_CTX *x509ctx,
520 tls_support *tlsp, BOOL *calledp, BOOL *optionalp)
522 X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
523 int depth = X509_STORE_CTX_get_error_depth(x509ctx);
526 X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
527 dn[sizeof(dn)-1] = '\0';
529 if (preverify_ok == 0)
531 uschar * extra = verify_mode ? string_sprintf(" (during %c-verify for [%s])",
532 *verify_mode, sender_host_address)
534 log_write(0, LOG_MAIN, "[%s] SSL verify error%s: depth=%d error=%s cert=%s",
535 tlsp == &tls_out ? deliver_host_address : sender_host_address,
537 X509_verify_cert_error_string(X509_STORE_CTX_get_error(x509ctx)), dn);
542 tlsp->peercert = X509_dup(cert); /* record failing cert */
543 return 0; /* reject */
545 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
546 "tls_try_verify_hosts)\n");
551 DEBUG(D_tls) debug_printf("SSL verify ok: depth=%d SN=%s\n", depth, dn);
553 if (tlsp == &tls_out && client_static_cbinfo->u_ocsp.client.verify_store)
554 { /* client, wanting stapling */
555 /* Add the server cert's signing chain as the one
556 for the verification of the OCSP stapled information. */
558 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
561 sk_X509_push(client_static_cbinfo->verify_stack, cert);
564 #ifndef DISABLE_EVENT
565 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
566 return 0; /* reject, with peercert set */
571 const uschar * verify_cert_hostnames;
573 if ( tlsp == &tls_out
574 && ((verify_cert_hostnames = client_static_cbinfo->verify_cert_hostnames)))
575 /* client, wanting hostname check */
578 #ifdef EXIM_HAVE_OPENSSL_CHECKHOST
579 # ifndef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
580 # define X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 0
582 # ifndef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
583 # define X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS 0
586 const uschar * list = verify_cert_hostnames;
589 while ((name = string_nextinlist(&list, &sep, NULL, 0)))
590 if ((rc = X509_check_host(cert, CCS name, 0,
591 X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
592 | X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS,
597 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
598 tlsp == &tls_out ? deliver_host_address : sender_host_address);
605 if (!tls_is_name_for_cert(verify_cert_hostnames, cert))
608 uschar * extra = verify_mode
609 ? string_sprintf(" (during %c-verify for [%s])",
610 *verify_mode, sender_host_address)
612 log_write(0, LOG_MAIN,
613 "[%s] SSL verify error%s: certificate name mismatch: DN=\"%s\" H=\"%s\"",
614 tlsp == &tls_out ? deliver_host_address : sender_host_address,
615 extra, dn, verify_cert_hostnames);
620 tlsp->peercert = X509_dup(cert); /* record failing cert */
621 return 0; /* reject */
623 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
624 "tls_try_verify_hosts)\n");
628 #ifndef DISABLE_EVENT
629 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
630 return 0; /* reject, with peercert set */
633 DEBUG(D_tls) debug_printf("SSL%s verify ok: depth=0 SN=%s\n",
634 *calledp ? "" : " authenticated", dn);
635 if (!*calledp) tlsp->certificate_verified = TRUE;
639 return 1; /* accept, at least for this level */
643 verify_callback_client(int preverify_ok, X509_STORE_CTX *x509ctx)
645 return verify_callback(preverify_ok, x509ctx, &tls_out,
646 &client_verify_callback_called, &client_verify_optional);
650 verify_callback_server(int preverify_ok, X509_STORE_CTX *x509ctx)
652 return verify_callback(preverify_ok, x509ctx, &tls_in,
653 &server_verify_callback_called, &server_verify_optional);
659 /* This gets called *by* the dane library verify callback, which interposes
663 verify_callback_client_dane(int preverify_ok, X509_STORE_CTX * x509ctx)
665 X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
667 int depth = X509_STORE_CTX_get_error_depth(x509ctx);
668 #ifndef DISABLE_EVENT
669 BOOL dummy_called, optional = FALSE;
672 X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
673 dn[sizeof(dn)-1] = '\0';
675 DEBUG(D_tls) debug_printf("verify_callback_client_dane: %s depth %d %s\n",
676 preverify_ok ? "ok":"BAD", depth, dn);
678 #ifndef DISABLE_EVENT
679 if (verify_event(&tls_out, cert, depth, dn,
680 &dummy_called, &optional, US"DANE"))
681 return 0; /* reject, with peercert set */
684 if (preverify_ok == 1)
686 tls_out.dane_verified = tls_out.certificate_verified = TRUE;
688 if (client_static_cbinfo->u_ocsp.client.verify_store)
689 { /* client, wanting stapling */
690 /* Add the server cert's signing chain as the one
691 for the verification of the OCSP stapled information. */
693 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
696 sk_X509_push(client_static_cbinfo->verify_stack, cert);
702 int err = X509_STORE_CTX_get_error(x509ctx);
704 debug_printf(" - err %d '%s'\n", err, X509_verify_cert_error_string(err));
705 if (err == X509_V_ERR_APPLICATION_VERIFICATION)
711 #endif /*SUPPORT_DANE*/
714 /*************************************************
715 * Information callback *
716 *************************************************/
718 /* The SSL library functions call this from time to time to indicate what they
719 are doing. We copy the string to the debugging output when TLS debugging has
731 info_callback(SSL *s, int where, int ret)
735 DEBUG(D_tls) debug_printf("SSL info: %s\n", SSL_state_string_long(s));
740 /*************************************************
741 * Initialize for DH *
742 *************************************************/
744 /* If dhparam is set, expand it, and load up the parameters for DH encryption.
747 sctx The current SSL CTX (inbound or outbound)
748 dhparam DH parameter file or fixed parameter identity string
749 host connected host, if client; NULL if server
750 errstr error string pointer
752 Returns: TRUE if OK (nothing to set up, or setup worked)
756 init_dh(SSL_CTX *sctx, uschar *dhparam, const host_item *host, uschar ** errstr)
764 if (!expand_check(dhparam, US"tls_dhparam", &dhexpanded, errstr))
767 if (!dhexpanded || !*dhexpanded)
768 bio = BIO_new_mem_buf(CS std_dh_prime_default(), -1);
769 else if (dhexpanded[0] == '/')
771 if (!(bio = BIO_new_file(CS dhexpanded, "r")))
773 tls_error(string_sprintf("could not read dhparams file %s", dhexpanded),
774 host, US strerror(errno), errstr);
780 if (Ustrcmp(dhexpanded, "none") == 0)
782 DEBUG(D_tls) debug_printf("Requested no DH parameters.\n");
786 if (!(pem = std_dh_prime_named(dhexpanded)))
788 tls_error(string_sprintf("Unknown standard DH prime \"%s\"", dhexpanded),
789 host, US strerror(errno), errstr);
792 bio = BIO_new_mem_buf(CS pem, -1);
795 if (!(dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL)))
798 tls_error(string_sprintf("Could not read tls_dhparams \"%s\"", dhexpanded),
803 /* note: our default limit of 2236 is not a multiple of 8; the limit comes from
804 * an NSS limit, and the GnuTLS APIs handle bit-sizes fine, so we went with
805 * 2236. But older OpenSSL can only report in bytes (octets), not bits.
806 * If someone wants to dance at the edge, then they can raise the limit or use
807 * current libraries. */
808 #ifdef EXIM_HAVE_OPENSSL_DH_BITS
809 /* Added in commit 26c79d5641d; `git describe --contains` says OpenSSL_1_1_0-pre1~1022
810 * This predates OpenSSL_1_1_0 (before a, b, ...) so is in all 1.1.0 */
811 dh_bitsize = DH_bits(dh);
813 dh_bitsize = 8 * DH_size(dh);
816 /* Even if it is larger, we silently return success rather than cause things
817 * to fail out, so that a too-large DH will not knock out all TLS; it's a
818 * debatable choice. */
819 if (dh_bitsize > tls_dh_max_bits)
822 debug_printf("dhparams file %d bits, is > tls_dh_max_bits limit of %d\n",
823 dh_bitsize, tls_dh_max_bits);
827 SSL_CTX_set_tmp_dh(sctx, dh);
829 debug_printf("Diffie-Hellman initialized from %s with %d-bit prime\n",
830 dhexpanded ? dhexpanded : US"default", dh_bitsize);
842 /*************************************************
843 * Initialize for ECDH *
844 *************************************************/
846 /* Load parameters for ECDH encryption.
848 For now, we stick to NIST P-256 because: it's simple and easy to configure;
849 it avoids any patent issues that might bite redistributors; despite events in
850 the news and concerns over curve choices, we're not cryptographers, we're not
851 pretending to be, and this is "good enough" to be better than no support,
852 protecting against most adversaries. Given another year or two, there might
853 be sufficient clarity about a "right" way forward to let us make an informed
854 decision, instead of a knee-jerk reaction.
856 Longer-term, we should look at supporting both various named curves and
857 external files generated with "openssl ecparam", much as we do for init_dh().
858 We should also support "none" as a value, to explicitly avoid initialisation.
863 sctx The current SSL CTX (inbound or outbound)
864 host connected host, if client; NULL if server
865 errstr error string pointer
867 Returns: TRUE if OK (nothing to set up, or setup worked)
871 init_ecdh(SSL_CTX * sctx, host_item * host, uschar ** errstr)
873 #ifdef OPENSSL_NO_ECDH
882 if (host) /* No ECDH setup for clients, only for servers */
885 # ifndef EXIM_HAVE_ECDH
887 debug_printf("No OpenSSL API to define ECDH parameters, skipping\n");
891 if (!expand_check(tls_eccurve, US"tls_eccurve", &exp_curve, errstr))
893 if (!exp_curve || !*exp_curve)
896 /* "auto" needs to be handled carefully.
897 * OpenSSL < 1.0.2: we do not select anything, but fallback to prime256v1
898 * OpenSSL < 1.1.0: we have to call SSL_CTX_set_ecdh_auto
899 * (openssl/ssl.h defines SSL_CTRL_SET_ECDH_AUTO)
900 * OpenSSL >= 1.1.0: we do not set anything, the libray does autoselection
901 * https://github.com/openssl/openssl/commit/fe6ef2472db933f01b59cad82aa925736935984b
903 if (Ustrcmp(exp_curve, "auto") == 0)
905 #if OPENSSL_VERSION_NUMBER < 0x10002000L
906 DEBUG(D_tls) debug_printf(
907 "ECDH OpenSSL < 1.0.2: temp key parameter settings: overriding \"auto\" with \"prime256v1\"\n");
908 exp_curve = US"prime256v1";
910 # if defined SSL_CTRL_SET_ECDH_AUTO
911 DEBUG(D_tls) debug_printf(
912 "ECDH OpenSSL 1.0.2+ temp key parameter settings: autoselection\n");
913 SSL_CTX_set_ecdh_auto(sctx, 1);
916 DEBUG(D_tls) debug_printf(
917 "ECDH OpenSSL 1.1.0+ temp key parameter settings: default selection\n");
923 DEBUG(D_tls) debug_printf("ECDH: curve '%s'\n", exp_curve);
924 if ( (nid = OBJ_sn2nid (CCS exp_curve)) == NID_undef
925 # ifdef EXIM_HAVE_OPENSSL_EC_NIST2NID
926 && (nid = EC_curve_nist2nid(CCS exp_curve)) == NID_undef
930 tls_error(string_sprintf("Unknown curve name tls_eccurve '%s'", exp_curve),
935 if (!(ecdh = EC_KEY_new_by_curve_name(nid)))
937 tls_error(US"Unable to create ec curve", host, NULL, errstr);
941 /* The "tmp" in the name here refers to setting a temporary key
942 not to the stability of the interface. */
944 if ((rv = SSL_CTX_set_tmp_ecdh(sctx, ecdh) == 0))
945 tls_error(string_sprintf("Error enabling '%s' curve", exp_curve), host, NULL, errstr);
947 DEBUG(D_tls) debug_printf("ECDH: enabled '%s' curve\n", exp_curve);
952 # endif /*EXIM_HAVE_ECDH*/
953 #endif /*OPENSSL_NO_ECDH*/
960 /*************************************************
961 * Load OCSP information into state *
962 *************************************************/
963 /* Called to load the server OCSP response from the given file into memory, once
964 caller has determined this is needed. Checks validity. Debugs a message
967 ASSUMES: single response, for single cert.
970 sctx the SSL_CTX* to update
971 cbinfo various parts of session state
972 expanded the filename putatively holding an OCSP response
977 ocsp_load_response(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo, const uschar *expanded)
980 OCSP_RESPONSE * resp;
981 OCSP_BASICRESP * basic_response;
982 OCSP_SINGLERESP * single_response;
983 ASN1_GENERALIZEDTIME * rev, * thisupd, * nextupd;
985 unsigned long verify_flags;
986 int status, reason, i;
988 cbinfo->u_ocsp.server.file_expanded = string_copy(expanded);
989 if (cbinfo->u_ocsp.server.response)
991 OCSP_RESPONSE_free(cbinfo->u_ocsp.server.response);
992 cbinfo->u_ocsp.server.response = NULL;
995 if (!(bio = BIO_new_file(CS cbinfo->u_ocsp.server.file_expanded, "rb")))
997 DEBUG(D_tls) debug_printf("Failed to open OCSP response file \"%s\"\n",
998 cbinfo->u_ocsp.server.file_expanded);
1002 resp = d2i_OCSP_RESPONSE_bio(bio, NULL);
1006 DEBUG(D_tls) debug_printf("Error reading OCSP response.\n");
1010 if ((status = OCSP_response_status(resp)) != OCSP_RESPONSE_STATUS_SUCCESSFUL)
1012 DEBUG(D_tls) debug_printf("OCSP response not valid: %s (%d)\n",
1013 OCSP_response_status_str(status), status);
1017 if (!(basic_response = OCSP_response_get1_basic(resp)))
1020 debug_printf("OCSP response parse error: unable to extract basic response.\n");
1024 sk = cbinfo->verify_stack;
1025 verify_flags = OCSP_NOVERIFY; /* check sigs, but not purpose */
1027 /* May need to expose ability to adjust those flags?
1028 OCSP_NOSIGS OCSP_NOVERIFY OCSP_NOCHAIN OCSP_NOCHECKS OCSP_NOEXPLICIT
1029 OCSP_TRUSTOTHER OCSP_NOINTERN */
1031 /* This does a full verify on the OCSP proof before we load it for serving
1032 up; possibly overkill - just date-checks might be nice enough.
1034 OCSP_basic_verify takes a "store" arg, but does not
1035 use it for the chain verification, which is all we do
1036 when OCSP_NOVERIFY is set. The content from the wire
1037 "basic_response" and a cert-stack "sk" are all that is used.
1039 We have a stack, loaded in setup_certs() if tls_verify_certificates
1040 was a file (not a directory, or "system"). It is unfortunate we
1041 cannot used the connection context store, as that would neatly
1042 handle the "system" case too, but there seems to be no library
1043 function for getting a stack from a store.
1044 [ In OpenSSL 1.1 - ? X509_STORE_CTX_get0_chain(ctx) ? ]
1045 We do not free the stack since it could be needed a second time for
1048 Separately we might try to replace using OCSP_basic_verify() - which seems to not
1049 be a public interface into the OpenSSL library (there's no manual entry) -
1050 But what with? We also use OCSP_basic_verify in the client stapling callback.
1051 And there we NEED it; we must verify that status... unless the
1052 library does it for us anyway? */
1054 if ((i = OCSP_basic_verify(basic_response, sk, NULL, verify_flags)) < 0)
1058 ERR_error_string(ERR_get_error(), ssl_errstring);
1059 debug_printf("OCSP response verify failure: %s\n", US ssl_errstring);
1064 /* Here's the simplifying assumption: there's only one response, for the
1065 one certificate we use, and nothing for anything else in a chain. If this
1066 proves false, we need to extract a cert id from our issued cert
1067 (tls_certificate) and use that for OCSP_resp_find_status() (which finds the
1068 right cert in the stack and then calls OCSP_single_get0_status()).
1070 I'm hoping to avoid reworking a bunch more of how we handle state here. */
1072 if (!(single_response = OCSP_resp_get0(basic_response, 0)))
1075 debug_printf("Unable to get first response from OCSP basic response.\n");
1079 status = OCSP_single_get0_status(single_response, &reason, &rev, &thisupd, &nextupd);
1080 if (status != V_OCSP_CERTSTATUS_GOOD)
1082 DEBUG(D_tls) debug_printf("OCSP response bad cert status: %s (%d) %s (%d)\n",
1083 OCSP_cert_status_str(status), status,
1084 OCSP_crl_reason_str(reason), reason);
1088 if (!OCSP_check_validity(thisupd, nextupd, EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1090 DEBUG(D_tls) debug_printf("OCSP status invalid times.\n");
1095 cbinfo->u_ocsp.server.response = resp; /*XXX stack?*/
1099 if (f.running_in_test_harness)
1101 extern char ** environ;
1103 if (environ) for (p = USS environ; *p; p++)
1104 if (Ustrncmp(*p, "EXIM_TESTHARNESS_DISABLE_OCSPVALIDITYCHECK", 42) == 0)
1106 DEBUG(D_tls) debug_printf("Supplying known bad OCSP response\n");
1107 goto supply_response;
1112 #endif /*!DISABLE_OCSP*/
1117 /* Create and install a selfsigned certificate, for use in server mode */
1120 tls_install_selfsign(SSL_CTX * sctx, uschar ** errstr)
1128 where = US"allocating pkey";
1129 if (!(pkey = EVP_PKEY_new()))
1132 where = US"allocating cert";
1133 if (!(x509 = X509_new()))
1136 where = US"generating pkey";
1137 if (!(rsa = rsa_callback(NULL, 0, 1024)))
1140 where = US"assigning pkey";
1141 if (!EVP_PKEY_assign_RSA(pkey, rsa))
1144 X509_set_version(x509, 2); /* N+1 - version 3 */
1145 ASN1_INTEGER_set(X509_get_serialNumber(x509), 1);
1146 X509_gmtime_adj(X509_get_notBefore(x509), 0);
1147 X509_gmtime_adj(X509_get_notAfter(x509), (long)60 * 60); /* 1 hour */
1148 X509_set_pubkey(x509, pkey);
1150 name = X509_get_subject_name(x509);
1151 X509_NAME_add_entry_by_txt(name, "C",
1152 MBSTRING_ASC, CUS "UK", -1, -1, 0);
1153 X509_NAME_add_entry_by_txt(name, "O",
1154 MBSTRING_ASC, CUS "Exim Developers", -1, -1, 0);
1155 X509_NAME_add_entry_by_txt(name, "CN",
1156 MBSTRING_ASC, CUS smtp_active_hostname, -1, -1, 0);
1157 X509_set_issuer_name(x509, name);
1159 where = US"signing cert";
1160 if (!X509_sign(x509, pkey, EVP_md5()))
1163 where = US"installing selfsign cert";
1164 if (!SSL_CTX_use_certificate(sctx, x509))
1167 where = US"installing selfsign key";
1168 if (!SSL_CTX_use_PrivateKey(sctx, pkey))
1174 (void) tls_error(where, NULL, NULL, errstr);
1175 if (x509) X509_free(x509);
1176 if (pkey) EVP_PKEY_free(pkey);
1184 tls_add_certfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1187 DEBUG(D_tls) debug_printf("tls_certificate file %s\n", file);
1188 if (!SSL_CTX_use_certificate_chain_file(sctx, CS file))
1189 return tls_error(string_sprintf(
1190 "SSL_CTX_use_certificate_chain_file file=%s", file),
1191 cbinfo->host, NULL, errstr);
1196 tls_add_pkeyfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1199 DEBUG(D_tls) debug_printf("tls_privatekey file %s\n", file);
1200 if (!SSL_CTX_use_PrivateKey_file(sctx, CS file, SSL_FILETYPE_PEM))
1201 return tls_error(string_sprintf(
1202 "SSL_CTX_use_PrivateKey_file file=%s", file), cbinfo->host, NULL, errstr);
1207 /*************************************************
1208 * Expand key and cert file specs *
1209 *************************************************/
1211 /* Called once during tls_init and possibly again during TLS setup, for a
1212 new context, if Server Name Indication was used and tls_sni was seen in
1213 the certificate string.
1216 sctx the SSL_CTX* to update
1217 cbinfo various parts of session state
1218 errstr error string pointer
1220 Returns: OK/DEFER/FAIL
1224 tls_expand_session_files(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo,
1229 if (!cbinfo->certificate)
1231 if (!cbinfo->is_server) /* client */
1234 if (tls_install_selfsign(sctx, errstr) != OK)
1241 if (Ustrstr(cbinfo->certificate, US"tls_sni") ||
1242 Ustrstr(cbinfo->certificate, US"tls_in_sni") ||
1243 Ustrstr(cbinfo->certificate, US"tls_out_sni")
1245 reexpand_tls_files_for_sni = TRUE;
1247 if (!expand_check(cbinfo->certificate, US"tls_certificate", &expanded, errstr))
1251 if (cbinfo->is_server)
1253 const uschar * file_list = expanded;
1257 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1258 if ((err = tls_add_certfile(sctx, cbinfo, file, errstr)))
1261 else /* would there ever be a need for multiple client certs? */
1262 if ((err = tls_add_certfile(sctx, cbinfo, expanded, errstr)))
1265 if (cbinfo->privatekey != NULL &&
1266 !expand_check(cbinfo->privatekey, US"tls_privatekey", &expanded, errstr))
1269 /* If expansion was forced to fail, key_expanded will be NULL. If the result
1270 of the expansion is an empty string, ignore it also, and assume the private
1271 key is in the same file as the certificate. */
1273 if (expanded && *expanded)
1274 if (cbinfo->is_server)
1276 const uschar * file_list = expanded;
1280 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1281 if ((err = tls_add_pkeyfile(sctx, cbinfo, file, errstr)))
1284 else /* would there ever be a need for multiple client certs? */
1285 if ((err = tls_add_pkeyfile(sctx, cbinfo, expanded, errstr)))
1289 #ifndef DISABLE_OCSP
1290 if (cbinfo->is_server && cbinfo->u_ocsp.server.file)
1293 if (!expand_check(cbinfo->u_ocsp.server.file, US"tls_ocsp_file", &expanded, errstr))
1296 if (expanded && *expanded)
1298 DEBUG(D_tls) debug_printf("tls_ocsp_file %s\n", expanded);
1299 if ( cbinfo->u_ocsp.server.file_expanded
1300 && (Ustrcmp(expanded, cbinfo->u_ocsp.server.file_expanded) == 0))
1302 DEBUG(D_tls) debug_printf(" - value unchanged, using existing values\n");
1305 ocsp_load_response(sctx, cbinfo, expanded);
1316 /*************************************************
1317 * Callback to handle SNI *
1318 *************************************************/
1320 /* Called when acting as server during the TLS session setup if a Server Name
1321 Indication extension was sent by the client.
1323 API documentation is OpenSSL s_server.c implementation.
1326 s SSL* of the current session
1327 ad unknown (part of OpenSSL API) (unused)
1328 arg Callback of "our" registered data
1330 Returns: SSL_TLSEXT_ERR_{OK,ALERT_WARNING,ALERT_FATAL,NOACK}
1333 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
1335 tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg)
1337 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
1338 tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
1340 int old_pool = store_pool;
1341 uschar * dummy_errstr;
1344 return SSL_TLSEXT_ERR_OK;
1346 DEBUG(D_tls) debug_printf("Received TLS SNI \"%s\"%s\n", servername,
1347 reexpand_tls_files_for_sni ? "" : " (unused for certificate selection)");
1349 /* Make the extension value available for expansion */
1350 store_pool = POOL_PERM;
1351 tls_in.sni = string_copy(US servername);
1352 store_pool = old_pool;
1354 if (!reexpand_tls_files_for_sni)
1355 return SSL_TLSEXT_ERR_OK;
1357 /* Can't find an SSL_CTX_clone() or equivalent, so we do it manually;
1358 not confident that memcpy wouldn't break some internal reference counting.
1359 Especially since there's a references struct member, which would be off. */
1361 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1362 if (!(server_sni = SSL_CTX_new(TLS_server_method())))
1364 if (!(server_sni = SSL_CTX_new(SSLv23_server_method())))
1367 ERR_error_string(ERR_get_error(), ssl_errstring);
1368 DEBUG(D_tls) debug_printf("SSL_CTX_new() failed: %s\n", ssl_errstring);
1369 return SSL_TLSEXT_ERR_NOACK;
1372 /* Not sure how many of these are actually needed, since SSL object
1373 already exists. Might even need this selfsame callback, for reneg? */
1375 SSL_CTX_set_info_callback(server_sni, SSL_CTX_get_info_callback(server_ctx));
1376 SSL_CTX_set_mode(server_sni, SSL_CTX_get_mode(server_ctx));
1377 SSL_CTX_set_options(server_sni, SSL_CTX_get_options(server_ctx));
1378 SSL_CTX_set_timeout(server_sni, SSL_CTX_get_timeout(server_ctx));
1379 SSL_CTX_set_tlsext_servername_callback(server_sni, tls_servername_cb);
1380 SSL_CTX_set_tlsext_servername_arg(server_sni, cbinfo);
1382 if ( !init_dh(server_sni, cbinfo->dhparam, NULL, &dummy_errstr)
1383 || !init_ecdh(server_sni, NULL, &dummy_errstr)
1385 return SSL_TLSEXT_ERR_NOACK;
1387 if ( cbinfo->server_cipher_list
1388 && !SSL_CTX_set_cipher_list(server_sni, CS cbinfo->server_cipher_list))
1389 return SSL_TLSEXT_ERR_NOACK;
1391 #ifndef DISABLE_OCSP
1392 if (cbinfo->u_ocsp.server.file)
1394 SSL_CTX_set_tlsext_status_cb(server_sni, tls_server_stapling_cb);
1395 SSL_CTX_set_tlsext_status_arg(server_sni, cbinfo);
1399 if ((rc = setup_certs(server_sni, tls_verify_certificates, tls_crl, NULL, FALSE,
1400 verify_callback_server, &dummy_errstr)) != OK)
1401 return SSL_TLSEXT_ERR_NOACK;
1403 /* do this after setup_certs, because this can require the certs for verifying
1404 OCSP information. */
1405 if ((rc = tls_expand_session_files(server_sni, cbinfo, &dummy_errstr)) != OK)
1406 return SSL_TLSEXT_ERR_NOACK;
1408 DEBUG(D_tls) debug_printf("Switching SSL context.\n");
1409 SSL_set_SSL_CTX(s, server_sni);
1411 return SSL_TLSEXT_ERR_OK;
1413 #endif /* EXIM_HAVE_OPENSSL_TLSEXT */
1418 #ifndef DISABLE_OCSP
1420 /*************************************************
1421 * Callback to handle OCSP Stapling *
1422 *************************************************/
1424 /* Called when acting as server during the TLS session setup if the client
1425 requests OCSP information with a Certificate Status Request.
1427 Documentation via openssl s_server.c and the Apache patch from the OpenSSL
1433 tls_server_stapling_cb(SSL *s, void *arg)
1435 const tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
1436 uschar *response_der; /*XXX blob */
1437 int response_der_len;
1439 /*XXX stack: use SSL_get_certificate() to see which cert; from that work
1440 out which ocsp blob to send. Unfortunately, SSL_get_certificate is known
1441 buggy in current OpenSSL; it returns the last cert loaded always rather than
1442 the one actually presented. So we can't support a stack of OCSP proofs at
1446 debug_printf("Received TLS status request (OCSP stapling); %s response\n",
1447 cbinfo->u_ocsp.server.response ? "have" : "lack");
1449 tls_in.ocsp = OCSP_NOT_RESP;
1450 if (!cbinfo->u_ocsp.server.response)
1451 return SSL_TLSEXT_ERR_NOACK;
1453 response_der = NULL;
1454 response_der_len = i2d_OCSP_RESPONSE(cbinfo->u_ocsp.server.response, /*XXX stack*/
1456 if (response_der_len <= 0)
1457 return SSL_TLSEXT_ERR_NOACK;
1459 SSL_set_tlsext_status_ocsp_resp(server_ssl, response_der, response_der_len);
1460 tls_in.ocsp = OCSP_VFIED;
1461 return SSL_TLSEXT_ERR_OK;
1466 time_print(BIO * bp, const char * str, ASN1_GENERALIZEDTIME * time)
1468 BIO_printf(bp, "\t%s: ", str);
1469 ASN1_GENERALIZEDTIME_print(bp, time);
1474 tls_client_stapling_cb(SSL *s, void *arg)
1476 tls_ext_ctx_cb * cbinfo = arg;
1477 const unsigned char * p;
1479 OCSP_RESPONSE * rsp;
1480 OCSP_BASICRESP * bs;
1483 DEBUG(D_tls) debug_printf("Received TLS status response (OCSP stapling):");
1484 len = SSL_get_tlsext_status_ocsp_resp(s, &p);
1487 /* Expect this when we requested ocsp but got none */
1488 if (cbinfo->u_ocsp.client.verify_required && LOGGING(tls_cipher))
1489 log_write(0, LOG_MAIN, "Received TLS status callback, null content");
1491 DEBUG(D_tls) debug_printf(" null\n");
1492 return cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1495 if(!(rsp = d2i_OCSP_RESPONSE(NULL, &p, len)))
1497 tls_out.ocsp = OCSP_FAILED;
1498 if (LOGGING(tls_cipher))
1499 log_write(0, LOG_MAIN, "Received TLS cert status response, parse error");
1501 DEBUG(D_tls) debug_printf(" parse error\n");
1505 if(!(bs = OCSP_response_get1_basic(rsp)))
1507 tls_out.ocsp = OCSP_FAILED;
1508 if (LOGGING(tls_cipher))
1509 log_write(0, LOG_MAIN, "Received TLS cert status response, error parsing response");
1511 DEBUG(D_tls) debug_printf(" error parsing response\n");
1512 OCSP_RESPONSE_free(rsp);
1516 /* We'd check the nonce here if we'd put one in the request. */
1517 /* However that would defeat cacheability on the server so we don't. */
1519 /* This section of code reworked from OpenSSL apps source;
1520 The OpenSSL Project retains copyright:
1521 Copyright (c) 1999 The OpenSSL Project. All rights reserved.
1526 ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
1528 DEBUG(D_tls) bp = BIO_new_fp(debug_file, BIO_NOCLOSE);
1530 /*OCSP_RESPONSE_print(bp, rsp, 0); extreme debug: stapling content */
1532 /* Use the chain that verified the server cert to verify the stapled info */
1533 /* DEBUG(D_tls) x509_store_dump_cert_s_names(cbinfo->u_ocsp.client.verify_store); */
1535 if ((i = OCSP_basic_verify(bs, cbinfo->verify_stack,
1536 cbinfo->u_ocsp.client.verify_store, 0)) <= 0)
1538 tls_out.ocsp = OCSP_FAILED;
1539 if (LOGGING(tls_cipher)) log_write(0, LOG_MAIN,
1540 "Received TLS cert status response, itself unverifiable: %s",
1541 ERR_reason_error_string(ERR_peek_error()));
1542 BIO_printf(bp, "OCSP response verify failure\n");
1543 ERR_print_errors(bp);
1544 OCSP_RESPONSE_print(bp, rsp, 0);
1548 BIO_printf(bp, "OCSP response well-formed and signed OK\n");
1550 /*XXX So we have a good stapled OCSP status. How do we know
1551 it is for the cert of interest? OpenSSL 1.1.0 has a routine
1552 OCSP_resp_find_status() which matches on a cert id, which presumably
1553 we should use. Making an id needs OCSP_cert_id_new(), which takes
1554 issuerName, issuerKey, serialNumber. Are they all in the cert?
1556 For now, carry on blindly accepting the resp. */
1559 OCSP_SINGLERESP * single;
1561 #ifdef EXIM_HAVE_OCSP_RESP_COUNT
1562 if (OCSP_resp_count(bs) != 1)
1564 STACK_OF(OCSP_SINGLERESP) * sresp = bs->tbsResponseData->responses;
1565 if (sk_OCSP_SINGLERESP_num(sresp) != 1)
1568 tls_out.ocsp = OCSP_FAILED;
1569 log_write(0, LOG_MAIN, "OCSP stapling "
1570 "with multiple responses not handled");
1573 single = OCSP_resp_get0(bs, 0);
1574 status = OCSP_single_get0_status(single, &reason, &rev,
1575 &thisupd, &nextupd);
1578 DEBUG(D_tls) time_print(bp, "This OCSP Update", thisupd);
1579 DEBUG(D_tls) if(nextupd) time_print(bp, "Next OCSP Update", nextupd);
1580 if (!OCSP_check_validity(thisupd, nextupd,
1581 EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1583 tls_out.ocsp = OCSP_FAILED;
1584 DEBUG(D_tls) ERR_print_errors(bp);
1585 log_write(0, LOG_MAIN, "Server OSCP dates invalid");
1589 DEBUG(D_tls) BIO_printf(bp, "Certificate status: %s\n",
1590 OCSP_cert_status_str(status));
1593 case V_OCSP_CERTSTATUS_GOOD:
1594 tls_out.ocsp = OCSP_VFIED;
1597 case V_OCSP_CERTSTATUS_REVOKED:
1598 tls_out.ocsp = OCSP_FAILED;
1599 log_write(0, LOG_MAIN, "Server certificate revoked%s%s",
1600 reason != -1 ? "; reason: " : "",
1601 reason != -1 ? OCSP_crl_reason_str(reason) : "");
1602 DEBUG(D_tls) time_print(bp, "Revocation Time", rev);
1605 tls_out.ocsp = OCSP_FAILED;
1606 log_write(0, LOG_MAIN,
1607 "Server certificate status unknown, in OCSP stapling");
1612 i = cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1617 OCSP_RESPONSE_free(rsp);
1620 #endif /*!DISABLE_OCSP*/
1623 /*************************************************
1624 * Initialize for TLS *
1625 *************************************************/
1627 /* Called from both server and client code, to do preliminary initialization
1628 of the library. We allocate and return a context structure.
1631 ctxp returned SSL context
1632 host connected host, if client; NULL if server
1633 dhparam DH parameter file
1634 certificate certificate file
1635 privatekey private key
1636 ocsp_file file of stapling info (server); flag for require ocsp (client)
1637 addr address if client; NULL if server (for some randomness)
1638 cbp place to put allocated callback context
1639 errstr error string pointer
1641 Returns: OK/DEFER/FAIL
1645 tls_init(SSL_CTX **ctxp, host_item *host, uschar *dhparam, uschar *certificate,
1647 #ifndef DISABLE_OCSP
1648 uschar *ocsp_file, /*XXX stack, in server*/
1650 address_item *addr, tls_ext_ctx_cb ** cbp, uschar ** errstr)
1655 tls_ext_ctx_cb * cbinfo;
1657 cbinfo = store_malloc(sizeof(tls_ext_ctx_cb));
1658 cbinfo->certificate = certificate;
1659 cbinfo->privatekey = privatekey;
1660 cbinfo->is_server = host==NULL;
1661 #ifndef DISABLE_OCSP
1662 cbinfo->verify_stack = NULL;
1665 cbinfo->u_ocsp.server.file = ocsp_file;
1666 cbinfo->u_ocsp.server.file_expanded = NULL;
1667 cbinfo->u_ocsp.server.response = NULL;
1670 cbinfo->u_ocsp.client.verify_store = NULL;
1672 cbinfo->dhparam = dhparam;
1673 cbinfo->server_cipher_list = NULL;
1674 cbinfo->host = host;
1675 #ifndef DISABLE_EVENT
1676 cbinfo->event_action = NULL;
1679 SSL_load_error_strings(); /* basic set up */
1680 OpenSSL_add_ssl_algorithms();
1682 #ifdef EXIM_HAVE_SHA256
1683 /* SHA256 is becoming ever more popular. This makes sure it gets added to the
1684 list of available digests. */
1685 EVP_add_digest(EVP_sha256());
1688 /* Create a context.
1689 The OpenSSL docs in 1.0.1b have not been updated to clarify TLS variant
1690 negotiation in the different methods; as far as I can tell, the only
1691 *_{server,client}_method which allows negotiation is SSLv23, which exists even
1692 when OpenSSL is built without SSLv2 support.
1693 By disabling with openssl_options, we can let admins re-enable with the
1696 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1697 if (!(ctx = SSL_CTX_new(host ? TLS_client_method() : TLS_server_method())))
1699 if (!(ctx = SSL_CTX_new(host ? SSLv23_client_method() : SSLv23_server_method())))
1701 return tls_error(US"SSL_CTX_new", host, NULL, errstr);
1703 /* It turns out that we need to seed the random number generator this early in
1704 order to get the full complement of ciphers to work. It took me roughly a day
1705 of work to discover this by experiment.
1707 On systems that have /dev/urandom, SSL may automatically seed itself from
1708 there. Otherwise, we have to make something up as best we can. Double check
1714 gettimeofday(&r.tv, NULL);
1717 RAND_seed(US (&r), sizeof(r));
1718 RAND_seed(US big_buffer, big_buffer_size);
1719 if (addr != NULL) RAND_seed(US addr, sizeof(addr));
1722 return tls_error(US"RAND_status", host,
1723 US"unable to seed random number generator", errstr);
1726 /* Set up the information callback, which outputs if debugging is at a suitable
1729 DEBUG(D_tls) SSL_CTX_set_info_callback(ctx, (void (*)())info_callback);
1731 /* Automatically re-try reads/writes after renegotiation. */
1732 (void) SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
1734 /* Apply administrator-supplied work-arounds.
1735 Historically we applied just one requested option,
1736 SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS, but when bug 994 requested a second, we
1737 moved to an administrator-controlled list of options to specify and
1738 grandfathered in the first one as the default value for "openssl_options".
1740 No OpenSSL version number checks: the options we accept depend upon the
1741 availability of the option value macros from OpenSSL. */
1743 if (!tls_openssl_options_parse(openssl_options, &init_options))
1744 return tls_error(US"openssl_options parsing failed", host, NULL, errstr);
1748 DEBUG(D_tls) debug_printf("setting SSL CTX options: %#lx\n", init_options);
1749 if (!(SSL_CTX_set_options(ctx, init_options)))
1750 return tls_error(string_sprintf(
1751 "SSL_CTX_set_option(%#lx)", init_options), host, NULL, errstr);
1754 DEBUG(D_tls) debug_printf("no SSL CTX options to set\n");
1756 /* We'd like to disable session cache unconditionally, but foolish Outlook
1757 Express clients then give up the first TLS connection and make a second one
1758 (which works). Only when there is an IMAP service on the same machine.
1759 Presumably OE is trying to use the cache for A on B. Leave it enabled for
1760 now, until we work out a decent way of presenting control to the config. It
1761 will never be used because we use a new context every time. */
1763 (void) SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
1766 /* Initialize with DH parameters if supplied */
1767 /* Initialize ECDH temp key parameter selection */
1769 if ( !init_dh(ctx, dhparam, host, errstr)
1770 || !init_ecdh(ctx, host, errstr)
1774 /* Set up certificate and key (and perhaps OCSP info) */
1776 if ((rc = tls_expand_session_files(ctx, cbinfo, errstr)) != OK)
1779 /* If we need to handle SNI or OCSP, do so */
1781 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
1782 # ifndef DISABLE_OCSP
1783 if (!(cbinfo->verify_stack = sk_X509_new_null()))
1785 DEBUG(D_tls) debug_printf("failed to create stack for stapling verify\n");
1790 if (!host) /* server */
1792 # ifndef DISABLE_OCSP
1793 /* We check u_ocsp.server.file, not server.response, because we care about if
1794 the option exists, not what the current expansion might be, as SNI might
1795 change the certificate and OCSP file in use between now and the time the
1796 callback is invoked. */
1797 if (cbinfo->u_ocsp.server.file)
1799 SSL_CTX_set_tlsext_status_cb(ctx, tls_server_stapling_cb);
1800 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
1803 /* We always do this, so that $tls_sni is available even if not used in
1805 SSL_CTX_set_tlsext_servername_callback(ctx, tls_servername_cb);
1806 SSL_CTX_set_tlsext_servername_arg(ctx, cbinfo);
1808 # ifndef DISABLE_OCSP
1810 if(ocsp_file) /* wanting stapling */
1812 if (!(cbinfo->u_ocsp.client.verify_store = X509_STORE_new()))
1814 DEBUG(D_tls) debug_printf("failed to create store for stapling verify\n");
1817 SSL_CTX_set_tlsext_status_cb(ctx, tls_client_stapling_cb);
1818 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
1823 cbinfo->verify_cert_hostnames = NULL;
1825 #ifdef EXIM_HAVE_EPHEM_RSA_KEX
1826 /* Set up the RSA callback */
1827 SSL_CTX_set_tmp_rsa_callback(ctx, rsa_callback);
1830 /* Finally, set the timeout, and we are done */
1832 SSL_CTX_set_timeout(ctx, ssl_session_timeout);
1833 DEBUG(D_tls) debug_printf("Initialized TLS\n");
1844 /*************************************************
1845 * Get name of cipher in use *
1846 *************************************************/
1849 Argument: pointer to an SSL structure for the connection
1850 buffer to use for answer
1852 pointer to number of bits for cipher
1857 construct_cipher_name(SSL *ssl, uschar *cipherbuf, int bsize, int *bits)
1859 /* With OpenSSL 1.0.0a, 'c' needs to be const but the documentation doesn't
1860 yet reflect that. It should be a safe change anyway, even 0.9.8 versions have
1861 the accessor functions use const in the prototype. */
1863 const uschar * ver = CUS SSL_get_version(ssl);
1864 const SSL_CIPHER * c = (const SSL_CIPHER *) SSL_get_current_cipher(ssl);
1866 SSL_CIPHER_get_bits(c, bits);
1868 string_format(cipherbuf, bsize, "%s:%s:%u", ver,
1869 SSL_CIPHER_get_name(c), *bits);
1871 DEBUG(D_tls) debug_printf("Cipher: %s\n", cipherbuf);
1876 peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned bsize)
1878 /*XXX we might consider a list-of-certs variable for the cert chain.
1879 SSL_get_peer_cert_chain(SSL*). We'd need a new variable type and support
1880 in list-handling functions, also consider the difference between the entire
1881 chain and the elements sent by the peer. */
1883 /* Will have already noted peercert on a verify fail; possibly not the leaf */
1884 if (!tlsp->peercert)
1885 tlsp->peercert = SSL_get_peer_certificate(ssl);
1886 /* Beware anonymous ciphers which lead to server_cert being NULL */
1889 X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, bsize);
1890 peerdn[bsize-1] = '\0';
1891 tlsp->peerdn = peerdn; /*XXX a static buffer... */
1894 tlsp->peerdn = NULL;
1901 /*************************************************
1902 * Set up for verifying certificates *
1903 *************************************************/
1905 #ifndef DISABLE_OCSP
1906 /* Load certs from file, return TRUE on success */
1909 chain_from_pem_file(const uschar * file, STACK_OF(X509) * verify_stack)
1914 while (sk_X509_num(verify_stack) > 0)
1915 X509_free(sk_X509_pop(verify_stack));
1917 if (!(bp = BIO_new_file(CS file, "r"))) return FALSE;
1918 while ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)))
1919 sk_X509_push(verify_stack, x);
1927 /* Called by both client and server startup; on the server possibly
1928 repeated after a Server Name Indication.
1931 sctx SSL_CTX* to initialise
1932 certs certs file or NULL
1933 crl CRL file or NULL
1934 host NULL in a server; the remote host in a client
1935 optional TRUE if called from a server for a host in tls_try_verify_hosts;
1936 otherwise passed as FALSE
1937 cert_vfy_cb Callback function for certificate verification
1938 errstr error string pointer
1940 Returns: OK/DEFER/FAIL
1944 setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
1945 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr)
1947 uschar *expcerts, *expcrl;
1949 if (!expand_check(certs, US"tls_verify_certificates", &expcerts, errstr))
1951 DEBUG(D_tls) debug_printf("tls_verify_certificates: %s\n", expcerts);
1953 if (expcerts && *expcerts)
1955 /* Tell the library to use its compiled-in location for the system default
1956 CA bundle. Then add the ones specified in the config, if any. */
1958 if (!SSL_CTX_set_default_verify_paths(sctx))
1959 return tls_error(US"SSL_CTX_set_default_verify_paths", host, NULL, errstr);
1961 if (Ustrcmp(expcerts, "system") != 0)
1963 struct stat statbuf;
1965 if (Ustat(expcerts, &statbuf) < 0)
1967 log_write(0, LOG_MAIN|LOG_PANIC,
1968 "failed to stat %s for certificates", expcerts);
1974 if ((statbuf.st_mode & S_IFMT) == S_IFDIR)
1975 { file = NULL; dir = expcerts; }
1978 file = expcerts; dir = NULL;
1979 #ifndef DISABLE_OCSP
1980 /* In the server if we will be offering an OCSP proof, load chain from
1981 file for verifying the OCSP proof at load time. */
1984 && statbuf.st_size > 0
1985 && server_static_cbinfo->u_ocsp.server.file
1986 && !chain_from_pem_file(file, server_static_cbinfo->verify_stack)
1989 log_write(0, LOG_MAIN|LOG_PANIC,
1990 "failed to load cert chain from %s", file);
1996 /* If a certificate file is empty, the next function fails with an
1997 unhelpful error message. If we skip it, we get the correct behaviour (no
1998 certificates are recognized, but the error message is still misleading (it
1999 says no certificate was supplied). But this is better. */
2001 if ( (!file || statbuf.st_size > 0)
2002 && !SSL_CTX_load_verify_locations(sctx, CS file, CS dir))
2003 return tls_error(US"SSL_CTX_load_verify_locations", host, NULL, errstr);
2005 /* Load the list of CAs for which we will accept certs, for sending
2006 to the client. This is only for the one-file tls_verify_certificates
2008 If a list isn't loaded into the server, but
2009 some verify locations are set, the server end appears to make
2010 a wildcard request for client certs.
2011 Meanwhile, the client library as default behaviour *ignores* the list
2012 we send over the wire - see man SSL_CTX_set_client_cert_cb.
2013 Because of this, and that the dir variant is likely only used for
2014 the public-CA bundle (not for a private CA), not worth fixing.
2018 STACK_OF(X509_NAME) * names = SSL_load_client_CA_file(CS file);
2020 SSL_CTX_set_client_CA_list(sctx, names);
2021 DEBUG(D_tls) debug_printf("Added %d certificate authorities.\n",
2022 sk_X509_NAME_num(names));
2027 /* Handle a certificate revocation list. */
2029 #if OPENSSL_VERSION_NUMBER > 0x00907000L
2031 /* This bit of code is now the version supplied by Lars Mainka. (I have
2032 merely reformatted it into the Exim code style.)
2034 "From here I changed the code to add support for multiple crl's
2035 in pem format in one file or to support hashed directory entries in
2036 pem format instead of a file. This method now uses the library function
2037 X509_STORE_load_locations to add the CRL location to the SSL context.
2038 OpenSSL will then handle the verify against CA certs and CRLs by
2039 itself in the verify callback." */
2041 if (!expand_check(crl, US"tls_crl", &expcrl, errstr)) return DEFER;
2042 if (expcrl && *expcrl)
2044 struct stat statbufcrl;
2045 if (Ustat(expcrl, &statbufcrl) < 0)
2047 log_write(0, LOG_MAIN|LOG_PANIC,
2048 "failed to stat %s for certificates revocation lists", expcrl);
2053 /* is it a file or directory? */
2055 X509_STORE *cvstore = SSL_CTX_get_cert_store(sctx);
2056 if ((statbufcrl.st_mode & S_IFMT) == S_IFDIR)
2060 DEBUG(D_tls) debug_printf("SSL CRL value is a directory %s\n", dir);
2066 DEBUG(D_tls) debug_printf("SSL CRL value is a file %s\n", file);
2068 if (X509_STORE_load_locations(cvstore, CS file, CS dir) == 0)
2069 return tls_error(US"X509_STORE_load_locations", host, NULL, errstr);
2071 /* setting the flags to check against the complete crl chain */
2073 X509_STORE_set_flags(cvstore,
2074 X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
2078 #endif /* OPENSSL_VERSION_NUMBER > 0x00907000L */
2080 /* If verification is optional, don't fail if no certificate */
2082 SSL_CTX_set_verify(sctx,
2083 SSL_VERIFY_PEER | (optional? 0 : SSL_VERIFY_FAIL_IF_NO_PEER_CERT),
2092 /*************************************************
2093 * Start a TLS session in a server *
2094 *************************************************/
2096 /* This is called when Exim is running as a server, after having received
2097 the STARTTLS command. It must respond to that command, and then negotiate
2101 require_ciphers allowed ciphers
2102 errstr pointer to error message
2104 Returns: OK on success
2105 DEFER for errors before the start of the negotiation
2106 FAIL for errors during the negotiation; the server can't
2111 tls_server_start(const uschar * require_ciphers, uschar ** errstr)
2114 uschar * expciphers;
2115 tls_ext_ctx_cb * cbinfo;
2116 static uschar peerdn[256];
2117 static uschar cipherbuf[256];
2119 /* Check for previous activation */
2121 if (tls_in.active.sock >= 0)
2123 tls_error(US"STARTTLS received after TLS started", NULL, US"", errstr);
2124 smtp_printf("554 Already in TLS\r\n", FALSE);
2128 /* Initialize the SSL library. If it fails, it will already have logged
2131 rc = tls_init(&server_ctx, NULL, tls_dhparam, tls_certificate, tls_privatekey,
2132 #ifndef DISABLE_OCSP
2133 tls_ocsp_file, /*XXX stack*/
2135 NULL, &server_static_cbinfo, errstr);
2136 if (rc != OK) return rc;
2137 cbinfo = server_static_cbinfo;
2139 if (!expand_check(require_ciphers, US"tls_require_ciphers", &expciphers, errstr))
2142 /* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2143 were historically separated by underscores. So that I can use either form in my
2144 tests, and also for general convenience, we turn underscores into hyphens here.
2146 XXX SSL_CTX_set_cipher_list() is replaced by SSL_CTX_set_ciphersuites()
2147 for TLS 1.3 . Since we do not call it at present we get the default list:
2148 TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
2153 uschar * s = expciphers;
2154 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
2155 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
2156 if (!SSL_CTX_set_cipher_list(server_ctx, CS expciphers))
2157 return tls_error(US"SSL_CTX_set_cipher_list", NULL, NULL, errstr);
2158 cbinfo->server_cipher_list = expciphers;
2161 /* If this is a host for which certificate verification is mandatory or
2162 optional, set up appropriately. */
2164 tls_in.certificate_verified = FALSE;
2166 tls_in.dane_verified = FALSE;
2168 server_verify_callback_called = FALSE;
2170 if (verify_check_host(&tls_verify_hosts) == OK)
2172 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
2173 FALSE, verify_callback_server, errstr);
2174 if (rc != OK) return rc;
2175 server_verify_optional = FALSE;
2177 else if (verify_check_host(&tls_try_verify_hosts) == OK)
2179 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
2180 TRUE, verify_callback_server, errstr);
2181 if (rc != OK) return rc;
2182 server_verify_optional = TRUE;
2185 /* Prepare for new connection */
2187 if (!(server_ssl = SSL_new(server_ctx)))
2188 return tls_error(US"SSL_new", NULL, NULL, errstr);
2190 /* Warning: we used to SSL_clear(ssl) here, it was removed.
2192 * With the SSL_clear(), we get strange interoperability bugs with
2193 * OpenSSL 1.0.1b and TLS1.1/1.2. It looks as though this may be a bug in
2194 * OpenSSL itself, as a clear should not lead to inability to follow protocols.
2196 * The SSL_clear() call is to let an existing SSL* be reused, typically after
2197 * session shutdown. In this case, we have a brand new object and there's no
2198 * obvious reason to immediately clear it. I'm guessing that this was
2199 * originally added because of incomplete initialisation which the clear fixed,
2200 * in some historic release.
2203 /* Set context and tell client to go ahead, except in the case of TLS startup
2204 on connection, where outputting anything now upsets the clients and tends to
2205 make them disconnect. We need to have an explicit fflush() here, to force out
2206 the response. Other smtp_printf() calls do not need it, because in non-TLS
2207 mode, the fflush() happens when smtp_getc() is called. */
2209 SSL_set_session_id_context(server_ssl, sid_ctx, Ustrlen(sid_ctx));
2210 if (!tls_in.on_connect)
2212 smtp_printf("220 TLS go ahead\r\n", FALSE);
2216 /* Now negotiate the TLS session. We put our own timer on it, since it seems
2217 that the OpenSSL library doesn't. */
2219 SSL_set_wfd(server_ssl, fileno(smtp_out));
2220 SSL_set_rfd(server_ssl, fileno(smtp_in));
2221 SSL_set_accept_state(server_ssl);
2223 DEBUG(D_tls) debug_printf("Calling SSL_accept\n");
2225 sigalrm_seen = FALSE;
2226 if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
2227 rc = SSL_accept(server_ssl);
2232 (void) tls_error(US"SSL_accept", NULL, sigalrm_seen ? US"timed out" : NULL, errstr);
2236 DEBUG(D_tls) debug_printf("SSL_accept was successful\n");
2238 /* TLS has been set up. Adjust the input functions to read via TLS,
2239 and initialize things. */
2241 peer_cert(server_ssl, &tls_in, peerdn, sizeof(peerdn));
2243 construct_cipher_name(server_ssl, cipherbuf, sizeof(cipherbuf), &tls_in.bits);
2244 tls_in.cipher = cipherbuf;
2249 if (SSL_get_shared_ciphers(server_ssl, CS buf, sizeof(buf)) != NULL)
2250 debug_printf("Shared ciphers: %s\n", buf);
2253 /* Record the certificate we presented */
2255 X509 * crt = SSL_get_certificate(server_ssl);
2256 tls_in.ourcert = crt ? X509_dup(crt) : NULL;
2259 /* Only used by the server-side tls (tls_in), including tls_getc.
2260 Client-side (tls_out) reads (seem to?) go via
2261 smtp_read_response()/ip_recv().
2262 Hence no need to duplicate for _in and _out.
2264 if (!ssl_xfer_buffer) ssl_xfer_buffer = store_malloc(ssl_xfer_buffer_size);
2265 ssl_xfer_buffer_lwm = ssl_xfer_buffer_hwm = 0;
2266 ssl_xfer_eof = ssl_xfer_error = FALSE;
2268 receive_getc = tls_getc;
2269 receive_getbuf = tls_getbuf;
2270 receive_get_cache = tls_get_cache;
2271 receive_ungetc = tls_ungetc;
2272 receive_feof = tls_feof;
2273 receive_ferror = tls_ferror;
2274 receive_smtp_buffered = tls_smtp_buffered;
2276 tls_in.active.sock = fileno(smtp_out);
2277 tls_in.active.tls_ctx = NULL; /* not using explicit ctx for server-side */
2285 tls_client_basic_ctx_init(SSL_CTX * ctx,
2286 host_item * host, smtp_transport_options_block * ob, tls_ext_ctx_cb * cbinfo,
2290 /* stick to the old behaviour for compatibility if tls_verify_certificates is
2291 set but both tls_verify_hosts and tls_try_verify_hosts is not set. Check only
2292 the specified host patterns if one of them is defined */
2294 if ( ( !ob->tls_verify_hosts
2295 && (!ob->tls_try_verify_hosts || !*ob->tls_try_verify_hosts)
2297 || verify_check_given_host(CUSS &ob->tls_verify_hosts, host) == OK
2299 client_verify_optional = FALSE;
2300 else if (verify_check_given_host(CUSS &ob->tls_try_verify_hosts, host) == OK)
2301 client_verify_optional = TRUE;
2305 if ((rc = setup_certs(ctx, ob->tls_verify_certificates,
2306 ob->tls_crl, host, client_verify_optional, verify_callback_client,
2310 if (verify_check_given_host(CUSS &ob->tls_verify_cert_hostnames, host) == OK)
2312 cbinfo->verify_cert_hostnames =
2314 string_domain_utf8_to_alabel(host->name, NULL);
2318 DEBUG(D_tls) debug_printf("Cert hostname to check: \"%s\"\n",
2319 cbinfo->verify_cert_hostnames);
2327 dane_tlsa_load(SSL * ssl, host_item * host, dns_answer * dnsa, uschar ** errstr)
2331 const char * hostnames[2] = { CS host->name, NULL };
2334 if (DANESSL_init(ssl, NULL, hostnames) != 1)
2335 return tls_error(US"hostnames load", host, NULL, errstr);
2337 for (rr = dns_next_rr(dnsa, &dnss, RESET_ANSWERS);
2339 rr = dns_next_rr(dnsa, &dnss, RESET_NEXT)
2340 ) if (rr->type == T_TLSA)
2342 const uschar * p = rr->data;
2343 uint8_t usage, selector, mtype;
2344 const char * mdname;
2348 /* Only DANE-TA(2) and DANE-EE(3) are supported */
2349 if (usage != 2 && usage != 3) continue;
2356 default: continue; /* Only match-types 0, 1, 2 are supported */
2357 case 0: mdname = NULL; break;
2358 case 1: mdname = "sha256"; break;
2359 case 2: mdname = "sha512"; break;
2363 switch (DANESSL_add_tlsa(ssl, usage, selector, mdname, p, rr->size - 3))
2366 return tls_error(US"tlsa load", host, NULL, errstr);
2367 case 0: /* action not taken */
2371 tls_out.tlsa_usage |= 1<<usage;
2377 log_write(0, LOG_MAIN, "DANE error: No usable TLSA records");
2380 #endif /*SUPPORT_DANE*/
2384 /*************************************************
2385 * Start a TLS session in a client *
2386 *************************************************/
2388 /* Called from the smtp transport after STARTTLS has been accepted.
2391 fd the fd of the connection
2392 host connected host (for messages and option-tests)
2393 addr the first address (for some randomness; can be NULL)
2394 tb transport (always smtp)
2395 tlsa_dnsa tlsa lookup, if DANE, else null
2396 tlsp record details of channel configuration here; must be non-NULL
2397 errstr error string pointer
2399 Returns: Pointer to TLS session context, or NULL on error
2403 tls_client_start(int fd, host_item *host, address_item *addr,
2404 transport_instance * tb,
2406 dns_answer * tlsa_dnsa,
2408 tls_support * tlsp, uschar ** errstr)
2410 smtp_transport_options_block * ob = tb
2411 ? (smtp_transport_options_block *)tb->options_block
2412 : &smtp_transport_option_defaults;
2413 exim_openssl_client_tls_ctx * exim_client_ctx;
2414 static uschar peerdn[256];
2415 uschar * expciphers;
2417 static uschar cipherbuf[256];
2419 #ifndef DISABLE_OCSP
2420 BOOL request_ocsp = FALSE;
2421 BOOL require_ocsp = FALSE;
2425 store_pool = POOL_PERM;
2426 exim_client_ctx = store_get(sizeof(exim_openssl_client_tls_ctx));
2430 tlsp->tlsa_usage = 0;
2433 #ifndef DISABLE_OCSP
2435 # ifdef SUPPORT_DANE
2437 && ob->hosts_request_ocsp[0] == '*'
2438 && ob->hosts_request_ocsp[1] == '\0'
2441 /* Unchanged from default. Use a safer one under DANE */
2442 request_ocsp = TRUE;
2443 ob->hosts_request_ocsp = US"${if or { {= {0}{$tls_out_tlsa_usage}} "
2444 " {= {4}{$tls_out_tlsa_usage}} } "
2450 verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK))
2451 request_ocsp = TRUE;
2453 # ifdef SUPPORT_DANE
2457 verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
2461 rc = tls_init(&exim_client_ctx->ctx, host, NULL,
2462 ob->tls_certificate, ob->tls_privatekey,
2463 #ifndef DISABLE_OCSP
2464 (void *)(long)request_ocsp,
2466 addr, &client_static_cbinfo, errstr);
2467 if (rc != OK) return NULL;
2469 tlsp->certificate_verified = FALSE;
2470 client_verify_callback_called = FALSE;
2476 /* We fall back to tls_require_ciphers if unset, empty or forced failure, but
2477 other failures should be treated as problems. */
2478 if (ob->dane_require_tls_ciphers &&
2479 !expand_check(ob->dane_require_tls_ciphers, US"dane_require_tls_ciphers",
2480 &expciphers, errstr))
2482 if (expciphers && *expciphers == '\0')
2487 !expand_check(ob->tls_require_ciphers, US"tls_require_ciphers",
2488 &expciphers, errstr))
2491 /* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2492 are separated by underscores. So that I can use either form in my tests, and
2493 also for general convenience, we turn underscores into hyphens here. */
2497 uschar *s = expciphers;
2498 while (*s) { if (*s == '_') *s = '-'; s++; }
2499 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
2500 if (!SSL_CTX_set_cipher_list(exim_client_ctx->ctx, CS expciphers))
2502 tls_error(US"SSL_CTX_set_cipher_list", host, NULL, errstr);
2510 SSL_CTX_set_verify(exim_client_ctx->ctx,
2511 SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2512 verify_callback_client_dane);
2514 if (!DANESSL_library_init())
2516 tls_error(US"library init", host, NULL, errstr);
2519 if (DANESSL_CTX_init(exim_client_ctx->ctx) <= 0)
2521 tls_error(US"context init", host, NULL, errstr);
2529 if (tls_client_basic_ctx_init(exim_client_ctx->ctx, host, ob,
2530 client_static_cbinfo, errstr) != OK)
2533 if (!(exim_client_ctx->ssl = SSL_new(exim_client_ctx->ctx)))
2535 tls_error(US"SSL_new", host, NULL, errstr);
2538 SSL_set_session_id_context(exim_client_ctx->ssl, sid_ctx, Ustrlen(sid_ctx));
2539 SSL_set_fd(exim_client_ctx->ssl, fd);
2540 SSL_set_connect_state(exim_client_ctx->ssl);
2544 if (!expand_check(ob->tls_sni, US"tls_sni", &tlsp->sni, errstr))
2548 DEBUG(D_tls) debug_printf("Setting TLS SNI forced to fail, not sending\n");
2550 else if (!Ustrlen(tlsp->sni))
2554 #ifdef EXIM_HAVE_OPENSSL_TLSEXT
2555 DEBUG(D_tls) debug_printf("Setting TLS SNI \"%s\"\n", tlsp->sni);
2556 SSL_set_tlsext_host_name(exim_client_ctx->ssl, tlsp->sni);
2558 log_write(0, LOG_MAIN, "SNI unusable with this OpenSSL library version; ignoring \"%s\"\n",
2566 if (dane_tlsa_load(exim_client_ctx->ssl, host, tlsa_dnsa, errstr) != OK)
2570 #ifndef DISABLE_OCSP
2571 /* Request certificate status at connection-time. If the server
2572 does OCSP stapling we will get the callback (set in tls_init()) */
2573 # ifdef SUPPORT_DANE
2577 if ( ((s = ob->hosts_require_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2578 || ((s = ob->hosts_request_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2580 { /* Re-eval now $tls_out_tlsa_usage is populated. If
2581 this means we avoid the OCSP request, we wasted the setup
2582 cost in tls_init(). */
2583 require_ocsp = verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK;
2584 request_ocsp = require_ocsp
2585 || verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
2592 SSL_set_tlsext_status_type(exim_client_ctx->ssl, TLSEXT_STATUSTYPE_ocsp);
2593 client_static_cbinfo->u_ocsp.client.verify_required = require_ocsp;
2594 tlsp->ocsp = OCSP_NOT_RESP;
2598 #ifndef DISABLE_EVENT
2599 client_static_cbinfo->event_action = tb ? tb->event_action : NULL;
2602 /* There doesn't seem to be a built-in timeout on connection. */
2604 DEBUG(D_tls) debug_printf("Calling SSL_connect\n");
2605 sigalrm_seen = FALSE;
2606 alarm(ob->command_timeout);
2607 rc = SSL_connect(exim_client_ctx->ssl);
2612 DANESSL_cleanup(exim_client_ctx->ssl);
2617 tls_error(US"SSL_connect", host, sigalrm_seen ? US"timed out" : NULL, errstr);
2621 DEBUG(D_tls) debug_printf("SSL_connect succeeded\n");
2623 peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn));
2625 construct_cipher_name(exim_client_ctx->ssl, cipherbuf, sizeof(cipherbuf), &tlsp->bits);
2626 tlsp->cipher = cipherbuf;
2628 /* Record the certificate we presented */
2630 X509 * crt = SSL_get_certificate(exim_client_ctx->ssl);
2631 tlsp->ourcert = crt ? X509_dup(crt) : NULL;
2634 tlsp->active.sock = fd;
2635 tlsp->active.tls_ctx = exim_client_ctx;
2636 return exim_client_ctx;
2644 tls_refill(unsigned lim)
2649 DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", server_ssl,
2650 ssl_xfer_buffer, ssl_xfer_buffer_size);
2652 if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
2653 inbytes = SSL_read(server_ssl, CS ssl_xfer_buffer,
2654 MIN(ssl_xfer_buffer_size, lim));
2655 error = SSL_get_error(server_ssl, inbytes);
2656 if (smtp_receive_timeout > 0) alarm(0);
2658 if (had_command_timeout) /* set by signal handler */
2659 smtp_command_timeout_exit(); /* does not return */
2660 if (had_command_sigterm)
2661 smtp_command_sigterm_exit();
2662 if (had_data_timeout)
2663 smtp_data_timeout_exit();
2664 if (had_data_sigint)
2665 smtp_data_sigint_exit();
2667 /* SSL_ERROR_ZERO_RETURN appears to mean that the SSL session has been
2668 closed down, not that the socket itself has been closed down. Revert to
2669 non-SSL handling. */
2673 case SSL_ERROR_NONE:
2676 case SSL_ERROR_ZERO_RETURN:
2677 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2679 receive_getc = smtp_getc;
2680 receive_getbuf = smtp_getbuf;
2681 receive_get_cache = smtp_get_cache;
2682 receive_ungetc = smtp_ungetc;
2683 receive_feof = smtp_feof;
2684 receive_ferror = smtp_ferror;
2685 receive_smtp_buffered = smtp_buffered;
2687 if (SSL_get_shutdown(server_ssl) == SSL_RECEIVED_SHUTDOWN)
2688 SSL_shutdown(server_ssl);
2690 #ifndef DISABLE_OCSP
2691 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2692 server_static_cbinfo->verify_stack = NULL;
2694 SSL_free(server_ssl);
2695 SSL_CTX_free(server_ctx);
2698 tls_in.active.sock = -1;
2699 tls_in.active.tls_ctx = NULL;
2701 tls_in.cipher = NULL;
2702 tls_in.peerdn = NULL;
2707 /* Handle genuine errors */
2709 ERR_error_string(ERR_get_error(), ssl_errstring);
2710 log_write(0, LOG_MAIN, "TLS error (SSL_read): %s", ssl_errstring);
2711 ssl_xfer_error = TRUE;
2715 DEBUG(D_tls) debug_printf("Got SSL error %d\n", error);
2716 DEBUG(D_tls) if (error == SSL_ERROR_SYSCALL)
2717 debug_printf(" - syscall %s\n", strerror(errno));
2718 ssl_xfer_error = TRUE;
2722 #ifndef DISABLE_DKIM
2723 dkim_exim_verify_feed(ssl_xfer_buffer, inbytes);
2725 ssl_xfer_buffer_hwm = inbytes;
2726 ssl_xfer_buffer_lwm = 0;
2731 /*************************************************
2732 * TLS version of getc *
2733 *************************************************/
2735 /* This gets the next byte from the TLS input buffer. If the buffer is empty,
2736 it refills the buffer via the SSL reading function.
2738 Arguments: lim Maximum amount to read/buffer
2739 Returns: the next character or EOF
2741 Only used by the server-side TLS.
2745 tls_getc(unsigned lim)
2747 if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2748 if (!tls_refill(lim))
2749 return ssl_xfer_error ? EOF : smtp_getc(lim);
2751 /* Something in the buffer; return next uschar */
2753 return ssl_xfer_buffer[ssl_xfer_buffer_lwm++];
2757 tls_getbuf(unsigned * len)
2762 if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2763 if (!tls_refill(*len))
2765 if (!ssl_xfer_error) return smtp_getbuf(len);
2770 if ((size = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm) > *len)
2772 buf = &ssl_xfer_buffer[ssl_xfer_buffer_lwm];
2773 ssl_xfer_buffer_lwm += size;
2782 #ifndef DISABLE_DKIM
2783 int n = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm;
2785 dkim_exim_verify_feed(ssl_xfer_buffer+ssl_xfer_buffer_lwm, n);
2791 tls_could_read(void)
2793 return ssl_xfer_buffer_lwm < ssl_xfer_buffer_hwm || SSL_pending(server_ssl) > 0;
2797 /*************************************************
2798 * Read bytes from TLS channel *
2799 *************************************************/
2803 ct_ctx client context pointer, or NULL for the one global server context
2807 Returns: the number of bytes read
2808 -1 after a failed read, including EOF
2810 Only used by the client-side TLS.
2814 tls_read(void * ct_ctx, uschar *buff, size_t len)
2816 SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
2820 DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", ssl,
2821 buff, (unsigned int)len);
2823 inbytes = SSL_read(ssl, CS buff, len);
2824 error = SSL_get_error(ssl, inbytes);
2826 if (error == SSL_ERROR_ZERO_RETURN)
2828 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2831 else if (error != SSL_ERROR_NONE)
2841 /*************************************************
2842 * Write bytes down TLS channel *
2843 *************************************************/
2847 ct_ctx client context pointer, or NULL for the one global server context
2850 more further data expected soon
2852 Returns: the number of bytes after a successful write,
2853 -1 after a failed write
2855 Used by both server-side and client-side TLS.
2859 tls_write(void * ct_ctx, const uschar *buff, size_t len, BOOL more)
2861 int outbytes, error, left;
2862 SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
2863 static gstring * corked = NULL;
2865 DEBUG(D_tls) debug_printf("%s(%p, %lu%s)\n", __FUNCTION__,
2866 buff, (unsigned long)len, more ? ", more" : "");
2868 /* Lacking a CORK or MSG_MORE facility (such as GnuTLS has) we copy data when
2869 "more" is notified. This hack is only ok if small amounts are involved AND only
2870 one stream does it, in one context (i.e. no store reset). Currently it is used
2871 for the responses to the received SMTP MAIL , RCPT, DATA sequence, only. */
2873 if (!ct_ctx && (more || corked))
2875 corked = string_catn(corked, buff, len);
2878 buff = CUS corked->s;
2883 for (left = len; left > 0;)
2885 DEBUG(D_tls) debug_printf("SSL_write(%p, %p, %d)\n", ssl, buff, left);
2886 outbytes = SSL_write(ssl, CS buff, left);
2887 error = SSL_get_error(ssl, outbytes);
2888 DEBUG(D_tls) debug_printf("outbytes=%d error=%d\n", outbytes, error);
2892 ERR_error_string(ERR_get_error(), ssl_errstring);
2893 log_write(0, LOG_MAIN, "TLS error (SSL_write): %s", ssl_errstring);
2896 case SSL_ERROR_NONE:
2901 case SSL_ERROR_ZERO_RETURN:
2902 log_write(0, LOG_MAIN, "SSL channel closed on write");
2905 case SSL_ERROR_SYSCALL:
2906 log_write(0, LOG_MAIN, "SSL_write: (from %s) syscall: %s",
2907 sender_fullhost ? sender_fullhost : US"<unknown>",
2912 log_write(0, LOG_MAIN, "SSL_write error %d", error);
2921 /*************************************************
2922 * Close down a TLS session *
2923 *************************************************/
2925 /* This is also called from within a delivery subprocess forked from the
2926 daemon, to shut down the TLS library, without actually doing a shutdown (which
2927 would tamper with the SSL session in the parent process).
2930 ct_ctx client TLS context pointer, or NULL for the one global server context
2931 shutdown 1 if TLS close-alert is to be sent,
2932 2 if also response to be waited for
2936 Used by both server-side and client-side TLS.
2940 tls_close(void * ct_ctx, int shutdown)
2942 exim_openssl_client_tls_ctx * o_ctx = ct_ctx;
2943 SSL_CTX **ctxp = o_ctx ? &o_ctx->ctx : &server_ctx;
2944 SSL **sslp = o_ctx ? &o_ctx->ssl : &server_ssl;
2945 int *fdp = o_ctx ? &tls_out.active.sock : &tls_in.active.sock;
2947 if (*fdp < 0) return; /* TLS was not active */
2952 DEBUG(D_tls) debug_printf("tls_close(): shutting down TLS%s\n",
2953 shutdown > 1 ? " (with response-wait)" : "");
2955 if ( (rc = SSL_shutdown(*sslp)) == 0 /* send "close notify" alert */
2959 rc = SSL_shutdown(*sslp); /* wait for response */
2963 if (rc < 0) DEBUG(D_tls)
2965 ERR_error_string(ERR_get_error(), ssl_errstring);
2966 debug_printf("SSL_shutdown: %s\n", ssl_errstring);
2970 #ifndef DISABLE_OCSP
2971 if (!o_ctx) /* server side */
2973 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2974 server_static_cbinfo->verify_stack = NULL;
2978 SSL_CTX_free(*ctxp);
2988 /*************************************************
2989 * Let tls_require_ciphers be checked at startup *
2990 *************************************************/
2992 /* The tls_require_ciphers option, if set, must be something which the
2995 Returns: NULL on success, or error message
2999 tls_validate_require_cipher(void)
3002 uschar *s, *expciphers, *err;
3004 /* this duplicates from tls_init(), we need a better "init just global
3005 state, for no specific purpose" singleton function of our own */
3007 SSL_load_error_strings();
3008 OpenSSL_add_ssl_algorithms();
3009 #if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
3010 /* SHA256 is becoming ever more popular. This makes sure it gets added to the
3011 list of available digests. */
3012 EVP_add_digest(EVP_sha256());
3015 if (!(tls_require_ciphers && *tls_require_ciphers))
3018 if (!expand_check(tls_require_ciphers, US"tls_require_ciphers", &expciphers,
3020 return US"failed to expand tls_require_ciphers";
3022 if (!(expciphers && *expciphers))
3025 /* normalisation ripped from above */
3027 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
3031 #ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
3032 if (!(ctx = SSL_CTX_new(TLS_server_method())))
3034 if (!(ctx = SSL_CTX_new(SSLv23_server_method())))
3037 ERR_error_string(ERR_get_error(), ssl_errstring);
3038 return string_sprintf("SSL_CTX_new() failed: %s", ssl_errstring);
3042 debug_printf("tls_require_ciphers expands to \"%s\"\n", expciphers);
3044 if (!SSL_CTX_set_cipher_list(ctx, CS expciphers))
3046 ERR_error_string(ERR_get_error(), ssl_errstring);
3047 err = string_sprintf("SSL_CTX_set_cipher_list(%s) failed: %s",
3048 expciphers, ssl_errstring);
3059 /*************************************************
3060 * Report the library versions. *
3061 *************************************************/
3063 /* There have historically been some issues with binary compatibility in
3064 OpenSSL libraries; if Exim (like many other applications) is built against
3065 one version of OpenSSL but the run-time linker picks up another version,
3066 it can result in serious failures, including crashing with a SIGSEGV. So
3067 report the version found by the compiler and the run-time version.
3069 Note: some OS vendors backport security fixes without changing the version
3070 number/string, and the version date remains unchanged. The _build_ date
3071 will change, so we can more usefully assist with version diagnosis by also
3072 reporting the build date.
3074 Arguments: a FILE* to print the results to
3079 tls_version_report(FILE *f)
3081 fprintf(f, "Library version: OpenSSL: Compile: %s\n"
3084 OPENSSL_VERSION_TEXT,
3085 SSLeay_version(SSLEAY_VERSION),
3086 SSLeay_version(SSLEAY_BUILT_ON));
3087 /* third line is 38 characters for the %s and the line is 73 chars long;
3088 the OpenSSL output includes a "built on: " prefix already. */
3094 /*************************************************
3095 * Random number generation *
3096 *************************************************/
3098 /* Pseudo-random number generation. The result is not expected to be
3099 cryptographically strong but not so weak that someone will shoot themselves
3100 in the foot using it as a nonce in input in some email header scheme or
3101 whatever weirdness they'll twist this into. The result should handle fork()
3102 and avoid repeating sequences. OpenSSL handles that for us.
3106 Returns a random number in range [0, max-1]
3110 vaguely_random_number(int max)
3114 static pid_t pidlast = 0;
3117 uschar smallbuf[sizeof(r)];
3123 if (pidnow != pidlast)
3125 /* Although OpenSSL documents that "OpenSSL makes sure that the PRNG state
3126 is unique for each thread", this doesn't apparently apply across processes,
3127 so our own warning from vaguely_random_number_fallback() applies here too.
3128 Fix per PostgreSQL. */
3134 /* OpenSSL auto-seeds from /dev/random, etc, but this a double-check. */
3138 gettimeofday(&r.tv, NULL);
3141 RAND_seed(US (&r), sizeof(r));
3143 /* We're after pseudo-random, not random; if we still don't have enough data
3144 in the internal PRNG then our options are limited. We could sleep and hope
3145 for entropy to come along (prayer technique) but if the system is so depleted
3146 in the first place then something is likely to just keep taking it. Instead,
3147 we'll just take whatever little bit of pseudo-random we can still manage to
3150 needed_len = sizeof(r);
3151 /* Don't take 8 times more entropy than needed if int is 8 octets and we were
3152 asked for a number less than 10. */
3153 for (r = max, i = 0; r; ++i)
3159 #ifdef EXIM_HAVE_RAND_PSEUDO
3160 /* We do not care if crypto-strong */
3161 i = RAND_pseudo_bytes(smallbuf, needed_len);
3163 i = RAND_bytes(smallbuf, needed_len);
3169 debug_printf("OpenSSL RAND_pseudo_bytes() not supported by RAND method, using fallback.\n");
3170 return vaguely_random_number_fallback(max);
3174 for (p = smallbuf; needed_len; --needed_len, ++p)
3180 /* We don't particularly care about weighted results; if someone wants
3181 smooth distribution and cares enough then they should submit a patch then. */
3188 /*************************************************
3189 * OpenSSL option parse *
3190 *************************************************/
3192 /* Parse one option for tls_openssl_options_parse below
3195 name one option name
3196 value place to store a value for it
3197 Returns success or failure in parsing
3203 tls_openssl_one_option_parse(uschar *name, long *value)
3206 int last = exim_openssl_options_size;
3207 while (last > first)
3209 int middle = (first + last)/2;
3210 int c = Ustrcmp(name, exim_openssl_options[middle].name);
3213 *value = exim_openssl_options[middle].value;
3227 /*************************************************
3228 * OpenSSL option parsing logic *
3229 *************************************************/
3231 /* OpenSSL has a number of compatibility options which an administrator might
3232 reasonably wish to set. Interpret a list similarly to decode_bits(), so that
3233 we look like log_selector.
3236 option_spec the administrator-supplied string of options
3237 results ptr to long storage for the options bitmap
3238 Returns success or failure
3242 tls_openssl_options_parse(uschar *option_spec, long *results)
3247 BOOL adding, item_parsed;
3249 result = SSL_OP_NO_TICKET;
3250 /* Prior to 4.80 we or'd in SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; removed
3251 * from default because it increases BEAST susceptibility. */
3252 #ifdef SSL_OP_NO_SSLv2
3253 result |= SSL_OP_NO_SSLv2;
3255 #ifdef SSL_OP_SINGLE_DH_USE
3256 result |= SSL_OP_SINGLE_DH_USE;
3265 for (s=option_spec; *s != '\0'; /**/)
3267 while (isspace(*s)) ++s;
3270 if (*s != '+' && *s != '-')
3272 DEBUG(D_tls) debug_printf("malformed openssl option setting: "
3273 "+ or - expected but found \"%s\"\n", s);
3276 adding = *s++ == '+';
3277 for (end = s; (*end != '\0') && !isspace(*end); ++end) /**/ ;
3280 item_parsed = tls_openssl_one_option_parse(s, &item);
3284 DEBUG(D_tls) debug_printf("openssl option setting unrecognised: \"%s\"\n", s);
3287 DEBUG(D_tls) debug_printf("openssl option, %s from %lx: %lx (%s)\n",
3288 adding ? "adding" : "removing", result, item, s);
3300 #endif /*!MACRO_PREDEF*/
3303 /* End of tls-openssl.c */