fe-secure.c 31.3 KB
Newer Older
B
Bruce Momjian 已提交
1 2
/*-------------------------------------------------------------------------
 *
3
 * fe-secure.c
B
Bruce Momjian 已提交
4 5 6 7 8
 *	  functions related to setting up a secure connection to the backend.
 *	  Secure connections are expected to provide confidentiality,
 *	  message integrity and endpoint authentication.
 *
 *
P
 
PostgreSQL Daemon 已提交
9
 * Portions Copyright (c) 1996-2005, PostgreSQL Global Development Group
B
Bruce Momjian 已提交
10 11 12 13
 * Portions Copyright (c) 1994, Regents of the University of California
 *
 *
 * IDENTIFICATION
14
 *	  $PostgreSQL: pgsql/src/interfaces/libpq/fe-secure.c,v 1.64 2005/01/06 18:29:10 tgl Exp $
B
Bruce Momjian 已提交
15
 *
B
Bruce Momjian 已提交
16
 * NOTES
17 18
 *	  [ Most of these notes are wrong/obsolete, but perhaps not all ]
 *
B
Bruce Momjian 已提交
19 20 21 22 23 24 25
 *	  The client *requires* a valid server certificate.  Since
 *	  SSH tunnels provide anonymous confidentiality, the presumption
 *	  is that sites that want endpoint authentication will use the
 *	  direct SSL support, while sites that are comfortable with
 *	  anonymous connections will use SSH tunnels.
 *
 *	  This code verifies the server certificate, to detect simple
B
Bruce Momjian 已提交
26
 *	  "man-in-the-middle" and "impersonation" attacks.	The
B
Bruce Momjian 已提交
27 28
 *	  server certificate, or better yet the CA certificate used
 *	  to sign the server certificate, should be present in the
29
 *	  "~/.postgresql/root.crt" file.  If this file isn't
B
Bruce Momjian 已提交
30
 *	  readable, or the server certificate can't be validated,
31
 *	  pqsecure_open_client() will return an error code.
B
Bruce Momjian 已提交
32 33 34 35 36
 *
 *	  Additionally, the server certificate's "common name" must
 *	  resolve to the other end of the socket.  This makes it
 *	  substantially harder to pull off a "man-in-the-middle" or
 *	  "impersonation" attack even if the server's private key
B
Bruce Momjian 已提交
37
 *	  has been stolen.	This check limits acceptable network
B
Bruce Momjian 已提交
38 39 40 41 42
 *	  layers to Unix sockets (weird, but legal), TCPv4 and TCPv6.
 *
 *	  Unfortunately neither the current front- or back-end handle
 *	  failure gracefully, resulting in the backend hiccupping.
 *	  This points out problems in each (the frontend shouldn't even
43
 *	  try to do SSL if pqsecure_initialize() fails, and the backend
B
Bruce Momjian 已提交
44
 *	  shouldn't crash/recover if an SSH negotiation fails.  The
B
Bruce Momjian 已提交
45
 *	  backend definitely needs to be fixed, to prevent a "denial
B
Bruce Momjian 已提交
46
 *	  of service" attack, but I don't know enough about how the
B
Bruce Momjian 已提交
47 48 49
 *	  backend works (especially that pre-SSL negotiation) to identify
 *	  a fix.
 *
50 51 52
 *	  ...
 *
 *	  Unlike the server's static private key, the client's
53
 *	  static private key (~/.postgresql/postgresql.key)
B
Bruce Momjian 已提交
54
 *	  should normally be stored encrypted.	However we still
55 56
 *	  support EPH since it's useful for other reasons.
 *
57 58 59 60 61 62 63 64 65
 *	  ...
 *
 *	  Client certificates are supported, if the server requests
 *	  or requires them.  Client certificates can be used for
 *	  authentication, to prevent sessions from being hijacked,
 *	  or to allow "road warriors" to access the database while
 *	  keeping it closed to everyone else.
 *
 *	  The user's certificate and private key are located in
66
 *		~/.postgresql/postgresql.crt
67
 *	  and
68
 *		~/.postgresql/postgresql.key
69 70
 *	  respectively.
 *
71 72 73 74 75 76
 *	  ...
 *
 *	  We don't provide informational callbacks here (like
 *	  info_cb() in be-secure.c), since there's mechanism to
 *	  display that information to the client.
 *
B
Bruce Momjian 已提交
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
 *-------------------------------------------------------------------------
 */

#include "postgres_fe.h"

#include <sys/types.h>
#include <signal.h>
#include <fcntl.h>
#include <errno.h>
#include <ctype.h>
#include <string.h>

#include "libpq-fe.h"
#include "libpq-int.h"
#include "fe-auth.h"
#include "pqsignal.h"

#ifdef WIN32
#include "win32.h"
#else
#include <sys/socket.h>
#include <unistd.h>
#include <netdb.h>
#include <netinet/in.h>
#ifdef HAVE_NETINET_TCP_H
#include <netinet/tcp.h>
#endif
#include <arpa/inet.h>
#endif
106
#include <sys/stat.h>
B
Bruce Momjian 已提交
107

108 109 110 111
#ifdef ENABLE_THREAD_SAFETY
#include <pthread.h>
#endif

B
Bruce Momjian 已提交
112 113 114 115 116 117
#ifndef HAVE_STRDUP
#include "strdup.h"
#endif

#ifdef USE_SSL
#include <openssl/ssl.h>
118
#include <openssl/dh.h>
B
Bruce Momjian 已提交
119
#endif   /* USE_SSL */
B
Bruce Momjian 已提交
120 121 122


#ifdef USE_SSL
123 124 125 126 127 128 129 130 131 132 133 134 135

#ifndef WIN32
#define USERCERTFILE	".postgresql/postgresql.crt"
#define USERKEYFILE		".postgresql/postgresql.key"
#define ROOTCERTFILE	".postgresql/root.crt"
#define DHFILEPATTERN	"%s/.postgresql/dh%d.pem"
#else
/* On Windows, the "home" directory is already PostgreSQL-specific */
#define USERCERTFILE	"postgresql.crt"
#define USERKEYFILE		"postgresql.key"
#define ROOTCERTFILE	"root.crt"
#define DHFILEPATTERN	"%s/dh%d.pem"
#endif
B
Bruce Momjian 已提交
136

B
Bruce Momjian 已提交
137
#ifdef NOT_USED
B
Bruce Momjian 已提交
138
static int	verify_peer(PGconn *);
B
Bruce Momjian 已提交
139
#endif
140
static int	verify_cb(int ok, X509_STORE_CTX *ctx);
B
Bruce Momjian 已提交
141 142 143 144
static DH  *load_dh_file(int keylength);
static DH  *load_dh_buffer(const char *, size_t);
static DH  *tmp_dh_cb(SSL *s, int is_export, int keylength);
static int	client_cert_cb(SSL *, X509 **, EVP_PKEY **);
145
static int	init_ssl_system(PGconn *conn);
B
Bruce Momjian 已提交
146
static int	initialize_SSL(PGconn *);
B
Bruce Momjian 已提交
147
static void destroy_SSL(void);
148
static PostgresPollingStatusType open_client_SSL(PGconn *);
B
Bruce Momjian 已提交
149
static void close_SSL(PGconn *);
150 151
static char *SSLerrmessage(void);
static void SSLerrfree(char *buf);
B
Bruce Momjian 已提交
152 153 154
#endif

#ifdef USE_SSL
155
static bool pq_initssllib = true;
156

B
Bruce Momjian 已提交
157 158 159
static SSL_CTX *SSL_context = NULL;
#endif

160
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
161
/*						 Hardcoded values						*/
162 163 164 165 166 167 168
/* ------------------------------------------------------------ */

/*
 *	Hardcoded DH parameters, used in empheral DH keying.
 *	As discussed above, EDH protects the confidentiality of
 *	sessions even if the static private key is compromised,
 *	so we are *highly* motivated to ensure that we can use
B
Bruce Momjian 已提交
169
 *	EDH even if the user... or an attacker... deletes the
170
 *	~/.postgresql/dh*.pem files.
171 172 173 174
 *
 *	It's not critical that users have EPH keys, but it doesn't
 *	hurt and if it's missing someone will demand it, so....
 */
175 176
#ifdef USE_SSL

177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213
static const char file_dh512[] =
"-----BEGIN DH PARAMETERS-----\n\
MEYCQQD1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWak\n\
XUGfnHy9iUsiGSa6q6Jew1XpKgVfAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh1024[] =
"-----BEGIN DH PARAMETERS-----\n\
MIGHAoGBAPSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsY\n\
jY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6\n\
ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XpL3jHAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh2048[] =
"-----BEGIN DH PARAMETERS-----\n\
MIIBCAKCAQEA9kJXtwh/CBdyorrWqULzBej5UxE5T7bxbrlLOCDaAadWoxTpj0BV\n\
89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/cdlJPPT2N286Z4VeSWc39uK50\n\
T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaClcjrUGvC/RgBYK+X0iP1YTknb\n\
zSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdX\n\
Q6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZyAcpesqVDNmWn6vQClCbAkbT\n\
CD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwIBAg==\n\
-----END DH PARAMETERS-----\n";

static const char file_dh4096[] =
"-----BEGIN DH PARAMETERS-----\n\
MIICCAKCAgEA+hRyUsFN4VpJ1O8JLcCo/VWr19k3BCgJ4uk+d+KhehjdRqNDNyOQ\n\
l/MOyQNQfWXPeGKmOmIig6Ev/nm6Nf9Z2B1h3R4hExf+zTiHnvVPeRBhjdQi81rt\n\
Xeoh6TNrSBIKIHfUJWBh3va0TxxjQIs6IZOLeVNRLMqzeylWqMf49HsIXqbcokUS\n\
Vt1BkvLdW48j8PPv5DsKRN3tloTxqDJGo9tKvj1Fuk74A+Xda1kNhB7KFlqMyN98\n\
VETEJ6c7KpfOo30mnK30wqw3S8OtaIR/maYX72tGOno2ehFDkq3pnPtEbD2CScxc\n\
alJC+EL7RPk5c/tgeTvCngvc1KZn92Y//EI7G9tPZtylj2b56sHtMftIoYJ9+ODM\n\
sccD5Piz/rejE3Ome8EOOceUSCYAhXn8b3qvxVI1ddd1pED6FHRhFvLrZxFvBEM9\n\
ERRMp5QqOaHJkM+Dxv8Cj6MqrCbfC4u+ZErxodzuusgDgvZiLF22uxMZbobFWyte\n\
OvOzKGtwcTqO/1wV5gKkzu1ZVswVUQd5Gg8lJicwqRWyyNRczDDoG9jVDxmogKTH\n\
AaqLulO7R8Ifa1SwF2DteSGVtgWEN8gDpN3RBmmPTDngyF2DHb5qmpnznwtFKdTL\n\
KWbuHn491xNO25CQWMtem80uKw+pTnisBRF/454n1Jnhub144YRBoN8CAQI=\n\
-----END DH PARAMETERS-----\n";
214 215
#endif

B
Bruce Momjian 已提交
216
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
217
/*			 Procedures common to all secure sessions			*/
B
Bruce Momjian 已提交
218 219
/* ------------------------------------------------------------ */

220 221 222 223 224 225 226 227 228 229 230 231 232

/*
 * Exported (but as yet undocumented) function to allow application to
 * tell us it's already initialized OpenSSL.
 */
void
PQinitSSL(int do_init)
{
#ifdef USE_SSL
	pq_initssllib = do_init;
#endif
}

B
Bruce Momjian 已提交
233 234 235 236
/*
 *	Initialize global context
 */
int
B
Bruce Momjian 已提交
237
pqsecure_initialize(PGconn *conn)
B
Bruce Momjian 已提交
238
{
B
Bruce Momjian 已提交
239
	int			r = 0;
B
Bruce Momjian 已提交
240 241 242 243 244 245 246 247 248 249 250 251

#ifdef USE_SSL
	r = initialize_SSL(conn);
#endif

	return r;
}

/*
 *	Destroy global context
 */
void
B
Bruce Momjian 已提交
252
pqsecure_destroy(void)
B
Bruce Momjian 已提交
253 254 255 256 257 258 259 260 261
{
#ifdef USE_SSL
	destroy_SSL();
#endif
}

/*
 *	Attempt to negotiate secure session.
 */
262
PostgresPollingStatusType
B
Bruce Momjian 已提交
263
pqsecure_open_client(PGconn *conn)
B
Bruce Momjian 已提交
264 265
{
#ifdef USE_SSL
266 267 268 269 270 271 272
	/* First time through? */
	if (conn->ssl == NULL)
	{
		if (!(conn->ssl = SSL_new(SSL_context)) ||
			!SSL_set_app_data(conn->ssl, conn) ||
			!SSL_set_fd(conn->ssl, conn->sock))
		{
B
Bruce Momjian 已提交
273 274
			char	   *err = SSLerrmessage();

275 276
			printfPQExpBuffer(&conn->errorMessage,
			   libpq_gettext("could not establish SSL connection: %s\n"),
277 278
							  err);
			SSLerrfree(err);
279 280 281
			close_SSL(conn);
			return PGRES_POLLING_FAILED;
		}
282 283 284 285 286
		/*
		 * Initialize errorMessage to empty.  This allows open_client_SSL()
		 * to detect whether client_cert_cb() has stored a message.
		 */
		resetPQExpBuffer(&conn->errorMessage);
287 288 289 290 291 292
	}
	/* Begin or continue the actual handshake */
	return open_client_SSL(conn);
#else
	/* shouldn't get here */
	return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
293 294 295 296 297 298 299
#endif
}

/*
 *	Close secure session.
 */
void
B
Bruce Momjian 已提交
300
pqsecure_close(PGconn *conn)
B
Bruce Momjian 已提交
301 302 303 304 305 306 307 308 309 310 311
{
#ifdef USE_SSL
	if (conn->ssl)
		close_SSL(conn);
#endif
}

/*
 *	Read data from a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
312
pqsecure_read(PGconn *conn, void *ptr, size_t len)
B
Bruce Momjian 已提交
313
{
B
Bruce Momjian 已提交
314
	ssize_t		n;
B
Bruce Momjian 已提交
315 316 317 318

#ifdef USE_SSL
	if (conn->ssl)
	{
319 320
		int			err;

B
Bruce Momjian 已提交
321
rloop:
B
Bruce Momjian 已提交
322
		n = SSL_read(conn->ssl, ptr, len);
323 324
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
325
		{
B
Bruce Momjian 已提交
326 327 328
			case SSL_ERROR_NONE:
				break;
			case SSL_ERROR_WANT_READ:
329 330
				n = 0;
				break;
331
			case SSL_ERROR_WANT_WRITE:
B
Bruce Momjian 已提交
332

333
				/*
B
Bruce Momjian 已提交
334 335 336 337 338
				 * Returning 0 here would cause caller to wait for
				 * read-ready, which is not correct since what SSL wants
				 * is wait for write-ready.  The former could get us stuck
				 * in an infinite wait, so don't risk it; busy-loop
				 * instead.
339
				 */
340
				goto rloop;
B
Bruce Momjian 已提交
341
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
342 343 344 345 346
				{
					char		sebuf[256];

					if (n == -1)
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
347
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
348 349
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
350
					{
B
Bruce Momjian 已提交
351 352
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
353

354
						SOCK_ERRNO_SET(ECONNRESET);
355 356
						n = -1;
					}
B
Bruce Momjian 已提交
357 358
					break;
				}
B
Bruce Momjian 已提交
359
			case SSL_ERROR_SSL:
360
				{
B
Bruce Momjian 已提交
361 362
					char	   *err = SSLerrmessage();

363
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
364
								  libpq_gettext("SSL error: %s\n"), err);
365 366
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
367 368
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
369
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
370 371
				n = -1;
				break;
372 373
			default:
				printfPQExpBuffer(&conn->errorMessage,
374 375
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
376
				n = -1;
377
				break;
B
Bruce Momjian 已提交
378 379 380 381
		}
	}
	else
#endif
B
Bruce Momjian 已提交
382
		n = recv(conn->sock, ptr, len, 0);
B
Bruce Momjian 已提交
383 384 385 386 387 388 389 390

	return n;
}

/*
 *	Write data to a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
391
pqsecure_write(PGconn *conn, const void *ptr, size_t len)
B
Bruce Momjian 已提交
392
{
B
Bruce Momjian 已提交
393
	ssize_t		n;
394
	
395
#ifdef ENABLE_THREAD_SAFETY
396 397
	sigset_t	osigmask;
	bool		sigpipe_pending;
398
	bool		got_epipe = false;
399
	
400 401
	if (pq_block_sigpipe(&osigmask, &sigpipe_pending) < 0)
		return -1;
402
#else
B
Bruce Momjian 已提交
403
#ifndef WIN32
B
Bruce Momjian 已提交
404
	pqsigfunc	oldsighandler = pqsignal(SIGPIPE, SIG_IGN);
B
Bruce Momjian 已提交
405
#endif
406
#endif
B
Bruce Momjian 已提交
407 408 409 410

#ifdef USE_SSL
	if (conn->ssl)
	{
411 412
		int			err;

B
Bruce Momjian 已提交
413
		n = SSL_write(conn->ssl, ptr, len);
414 415
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
416
		{
B
Bruce Momjian 已提交
417 418
			case SSL_ERROR_NONE:
				break;
419
			case SSL_ERROR_WANT_READ:
B
Bruce Momjian 已提交
420

421 422 423 424 425 426 427
				/*
				 * Returning 0 here causes caller to wait for write-ready,
				 * which is not really the right thing, but it's the best
				 * we can do.
				 */
				n = 0;
				break;
B
Bruce Momjian 已提交
428
			case SSL_ERROR_WANT_WRITE:
429 430
				n = 0;
				break;
B
Bruce Momjian 已提交
431
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
432 433
				{
					char		sebuf[256];
434

B
Bruce Momjian 已提交
435
					if (n == -1)
436
					{
437
#ifdef ENABLE_THREAD_SAFETY
438 439
						if (SOCK_ERRNO == EPIPE)
							got_epipe = true;
440
#endif
B
Bruce Momjian 已提交
441
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
442
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
443
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
444
					}
B
Bruce Momjian 已提交
445
					else
446
					{
B
Bruce Momjian 已提交
447 448
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
449
						SOCK_ERRNO_SET(ECONNRESET);
450 451
						n = -1;
					}
B
Bruce Momjian 已提交
452 453
					break;
				}
B
Bruce Momjian 已提交
454
			case SSL_ERROR_SSL:
455
				{
B
Bruce Momjian 已提交
456 457
					char	   *err = SSLerrmessage();

458
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
459
								  libpq_gettext("SSL error: %s\n"), err);
460 461
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
462 463
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
464
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
465 466
				n = -1;
				break;
467 468
			default:
				printfPQExpBuffer(&conn->errorMessage,
469 470
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
471
				n = -1;
472
				break;
B
Bruce Momjian 已提交
473 474 475 476
		}
	}
	else
#endif
477
	{
B
Bruce Momjian 已提交
478
		n = send(conn->sock, ptr, len, 0);
479 480 481 482 483
#ifdef ENABLE_THREAD_SAFETY
		if (n < 0 && SOCK_ERRNO == EPIPE)
			got_epipe = true;
#endif
	}
B
Bruce Momjian 已提交
484

485
#ifdef ENABLE_THREAD_SAFETY
486
	pq_reset_sigpipe(&osigmask, sigpipe_pending, got_epipe);
487
#else
B
Bruce Momjian 已提交
488 489
#ifndef WIN32
	pqsignal(SIGPIPE, oldsighandler);
490
#endif
B
Bruce Momjian 已提交
491 492 493 494 495 496
#endif

	return n;
}

/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
497
/*						  SSL specific code						*/
B
Bruce Momjian 已提交
498 499
/* ------------------------------------------------------------ */
#ifdef USE_SSL
500

B
Bruce Momjian 已提交
501 502 503 504 505 506 507 508 509 510 511 512
/*
 *	Certificate verification callback
 *
 *	This callback allows us to log intermediate problems during
 *	verification, but there doesn't seem to be a clean way to get
 *	our PGconn * structure.  So we can't log anything!
 *
 *	This callback also allows us to override the default acceptance
 *	criteria (e.g., accepting self-signed or expired certs), but
 *	for now we accept the default checks.
 */
static int
B
Bruce Momjian 已提交
513
verify_cb(int ok, X509_STORE_CTX *ctx)
B
Bruce Momjian 已提交
514 515 516 517
{
	return ok;
}

B
Bruce Momjian 已提交
518
#ifdef NOT_USED
B
Bruce Momjian 已提交
519 520 521 522
/*
 *	Verify that common name resolves to peer.
 */
static int
B
Bruce Momjian 已提交
523
verify_peer(PGconn *conn)
B
Bruce Momjian 已提交
524 525 526 527
{
	struct hostent *h = NULL;
	struct sockaddr addr;
	struct sockaddr_in *sin;
B
Bruce Momjian 已提交
528 529
	socklen_t	len;
	char	  **s;
B
Bruce Momjian 已提交
530 531 532 533 534 535
	unsigned long l;

	/* get the address on the other side of the socket */
	len = sizeof(addr);
	if (getpeername(conn->sock, &addr, &len) == -1)
	{
B
Bruce Momjian 已提交
536 537
		char		sebuf[256];

B
Bruce Momjian 已提交
538
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
539
						  libpq_gettext("error querying socket: %s\n"),
B
Bruce Momjian 已提交
540
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
B
Bruce Momjian 已提交
541 542 543 544 545 546 547
		return -1;
	}

	/* weird, but legal case */
	if (addr.sa_family == AF_UNIX)
		return 0;

548 549
	{
		struct hostent hpstr;
550
		char		buf[BUFSIZ];
B
Bruce Momjian 已提交
551
		int			herrno = 0;
B
Bruce Momjian 已提交
552

553
		/*
B
Bruce Momjian 已提交
554 555 556 557
		 * Currently, pqGethostbyname() is used only on platforms that
		 * don't have getaddrinfo().  If you enable this function, you
		 * should convert the pqGethostbyname() function call to use
		 * getaddrinfo().
558
		 */
559
		pqGethostbyname(conn->peer_cn, &hpstr, buf, sizeof(buf),
B
Bruce Momjian 已提交
560
						&h, &herrno);
561
	}
B
Bruce Momjian 已提交
562

B
Bruce Momjian 已提交
563
	/* what do we know about the peer's common name? */
564
	if (h == NULL)
B
Bruce Momjian 已提交
565 566
	{
		printfPQExpBuffer(&conn->errorMessage,
567
		libpq_gettext("could not get information about host \"%s\": %s\n"),
B
Bruce Momjian 已提交
568
						  conn->peer_cn, hstrerror(h_errno));
B
Bruce Momjian 已提交
569 570 571 572 573 574
		return -1;
	}

	/* does the address match? */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
575 576 577 578 579 580 581 582
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			for (s = h->h_addr_list; *s != NULL; s++)
			{
				if (!memcmp(&sin->sin_addr.s_addr, *s, h->h_length))
					return 0;
			}
			break;
B
Bruce Momjian 已提交
583

B
Bruce Momjian 已提交
584 585
		default:
			printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
586
							  libpq_gettext("unsupported protocol\n"));
B
Bruce Momjian 已提交
587
			return -1;
B
Bruce Momjian 已提交
588 589
	}

B
Bruce Momjian 已提交
590 591 592 593
	/*
	 * the prior test should be definitive, but in practice it sometimes
	 * fails.  So we also check the aliases.
	 */
B
Bruce Momjian 已提交
594 595
	for (s = h->h_aliases; *s != NULL; s++)
	{
596
		if (pg_strcasecmp(conn->peer_cn, *s) == 0)
B
Bruce Momjian 已提交
597 598 599 600 601 602
			return 0;
	}

	/* generate protocol-aware error message */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
603 604 605 606 607
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			l = ntohl(sin->sin_addr.s_addr);
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
608
											"server common name \"%s\" does not resolve to %ld.%ld.%ld.%ld\n"),
B
Bruce Momjian 已提交
609 610 611 612 613 614
					 conn->peer_cn, (l >> 24) % 0x100, (l >> 16) % 0x100,
							  (l >> 8) % 0x100, l % 0x100);
			break;
		default:
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
B
Bruce Momjian 已提交
615
											"server common name \"%s\" does not resolve to peer address\n"),
B
Bruce Momjian 已提交
616
							  conn->peer_cn);
B
Bruce Momjian 已提交
617 618 619 620
	}

	return -1;
}
621
#endif /* NOT_USED */
B
Bruce Momjian 已提交
622

623 624 625 626
/*
 *	Load precomputed DH parameters.
 *
 *	To prevent "downgrade" attacks, we perform a number of checks
B
Bruce Momjian 已提交
627
 *	to verify that the DBA-generated DH parameters file contains
628 629
 *	what we expect it to contain.
 */
B
Bruce Momjian 已提交
630 631
static DH  *
load_dh_file(int keylength)
632
{
633
	char		homedir[MAXPGPATH];
634
	char		fnbuf[MAXPGPATH];
635 636
	FILE	   *fp;
	DH		   *dh;
B
Bruce Momjian 已提交
637
	int			codes;
638

639
	if (!pqGetHomeDirectory(homedir, sizeof(homedir)))
B
Bruce Momjian 已提交
640
		return NULL;
641 642

	/* attempt to open file.  It's not an error if it doesn't exist. */
643
	snprintf(fnbuf, sizeof(fnbuf), DHFILEPATTERN, homedir, keylength);
644

645 646 647 648 649 650 651 652 653
	if ((fp = fopen(fnbuf, "r")) == NULL)
		return NULL;

/*	flock(fileno(fp), LOCK_SH); */
	dh = PEM_read_DHparams(fp, NULL, NULL, NULL);
/*	flock(fileno(fp), LOCK_UN); */
	fclose(fp);

	/* is the prime the correct size? */
B
Bruce Momjian 已提交
654
	if (dh != NULL && 8 * DH_size(dh) < keylength)
655 656 657 658 659 660 661 662 663
		dh = NULL;

	/* make sure the DH parameters are usable */
	if (dh != NULL)
	{
		if (DH_check(dh, &codes))
			return NULL;
		if (codes & DH_CHECK_P_NOT_PRIME)
			return NULL;
B
Bruce Momjian 已提交
664
		if ((codes & DH_NOT_SUITABLE_GENERATOR) &&
665 666 667 668 669 670 671 672 673 674 675 676 677
			(codes & DH_CHECK_P_NOT_SAFE_PRIME))
			return NULL;
	}

	return dh;
}

/*
 *	Load hardcoded DH parameters.
 *
 *	To prevent problems if the DH parameters files don't even
 *	exist, we can load DH parameters hardcoded into this file.
 */
B
Bruce Momjian 已提交
678 679
static DH  *
load_dh_buffer(const char *buffer, size_t len)
680
{
B
Bruce Momjian 已提交
681 682
	BIO		   *bio;
	DH		   *dh = NULL;
683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705

	bio = BIO_new_mem_buf((char *) buffer, len);
	if (bio == NULL)
		return NULL;
	dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
	BIO_free(bio);

	return dh;
}

/*
 *	Generate an empheral DH key.  Because this can take a long
 *	time to compute, we can use precomputed parameters of the
 *	common key sizes.
 *
 *	Since few sites will bother to precompute these parameter
 *	files, we also provide a fallback to the parameters provided
 *	by the OpenSSL project.
 *
 *	These values can be static (once loaded or computed) since
 *	the OpenSSL library can efficiently generate random keys from
 *	the information provided.
 */
B
Bruce Momjian 已提交
706 707
static DH  *
tmp_dh_cb(SSL *s, int is_export, int keylength)
708
{
B
Bruce Momjian 已提交
709 710 711 712 713 714
	DH		   *r = NULL;
	static DH  *dh = NULL;
	static DH  *dh512 = NULL;
	static DH  *dh1024 = NULL;
	static DH  *dh2048 = NULL;
	static DH  *dh4096 = NULL;
715 716 717

	switch (keylength)
	{
B
Bruce Momjian 已提交
718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753
		case 512:
			if (dh512 == NULL)
				dh512 = load_dh_file(keylength);
			if (dh512 == NULL)
				dh512 = load_dh_buffer(file_dh512, sizeof file_dh512);
			r = dh512;
			break;

		case 1024:
			if (dh1024 == NULL)
				dh1024 = load_dh_file(keylength);
			if (dh1024 == NULL)
				dh1024 = load_dh_buffer(file_dh1024, sizeof file_dh1024);
			r = dh1024;
			break;

		case 2048:
			if (dh2048 == NULL)
				dh2048 = load_dh_file(keylength);
			if (dh2048 == NULL)
				dh2048 = load_dh_buffer(file_dh2048, sizeof file_dh2048);
			r = dh2048;
			break;

		case 4096:
			if (dh4096 == NULL)
				dh4096 = load_dh_file(keylength);
			if (dh4096 == NULL)
				dh4096 = load_dh_buffer(file_dh4096, sizeof file_dh4096);
			r = dh4096;
			break;

		default:
			if (dh == NULL)
				dh = load_dh_file(keylength);
			r = dh;
754 755 756
	}

	/* this may take a long time, but it may be necessary... */
B
Bruce Momjian 已提交
757
	if (r == NULL || 8 * DH_size(r) < keylength)
758
		r = DH_generate_parameters(keylength, DH_GENERATOR_2, NULL, NULL);
B
Bruce Momjian 已提交
759

760 761 762
	return r;
}

763 764 765 766 767
/*
 *	Callback used by SSL to load client cert and key.
 *	This callback is only called when the server wants a
 *	client cert.
 *
768
 *	Must return 1 on success, 0 on no data or error.
769 770
 */
static int
B
Bruce Momjian 已提交
771
client_cert_cb(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
772
{
773
	char		homedir[MAXPGPATH];
B
Bruce Momjian 已提交
774 775
	struct stat buf,
				buf2;
776
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
777 778 779
	FILE	   *fp;
	PGconn	   *conn = (PGconn *) SSL_get_app_data(ssl);
	int			(*cb) () = NULL;	/* how to read user password */
B
Bruce Momjian 已提交
780
	char		sebuf[256];
781

782
	if (!pqGetHomeDirectory(homedir, sizeof(homedir)))
783
	{
B
Bruce Momjian 已提交
784
		printfPQExpBuffer(&conn->errorMessage,
785
					  libpq_gettext("could not get user information\n"));
786
		return 0;
787 788 789
	}

	/* read the user certificate */
790
	snprintf(fnbuf, sizeof(fnbuf), "%s/%s", homedir, USERCERTFILE);
791 792
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
793
		printfPQExpBuffer(&conn->errorMessage,
794
				  libpq_gettext("could not open certificate file \"%s\": %s\n"),
795
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
796
		return 0;
797 798 799
	}
	if (PEM_read_X509(fp, x509, NULL, NULL) == NULL)
	{
B
Bruce Momjian 已提交
800 801
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
802
		printfPQExpBuffer(&conn->errorMessage,
803
				  libpq_gettext("could not read certificate file \"%s\": %s\n"),
804 805
						  fnbuf, err);
		SSLerrfree(err);
806
		fclose(fp);
807
		return 0;
808 809 810 811
	}
	fclose(fp);

	/* read the user key */
812
	snprintf(fnbuf, sizeof(fnbuf), "%s/%s", homedir, USERKEYFILE);
813 814
	if (stat(fnbuf, &buf) == -1)
	{
B
Bruce Momjian 已提交
815
		printfPQExpBuffer(&conn->errorMessage,
816
		libpq_gettext("certificate present, but not private key file \"%s\"\n"),
B
Bruce Momjian 已提交
817
						  fnbuf);
818 819 820 821 822
		return 0;
	}
	if (!S_ISREG(buf.st_mode) || (buf.st_mode & 0077) ||
		buf.st_uid != getuid())
	{
B
Bruce Momjian 已提交
823
		printfPQExpBuffer(&conn->errorMessage,
824 825 826
		libpq_gettext("private key file \"%s\" has wrong permissions\n"),
						  fnbuf);
		return 0;
827 828 829
	}
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
830
		printfPQExpBuffer(&conn->errorMessage,
831
			 libpq_gettext("could not open private key file \"%s\": %s\n"),
832
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
833
		return 0;
834 835 836 837
	}
	if (fstat(fileno(fp), &buf2) == -1 ||
		buf.st_dev != buf2.st_dev || buf.st_ino != buf2.st_ino)
	{
B
Bruce Momjian 已提交
838
		printfPQExpBuffer(&conn->errorMessage,
839 840
						  libpq_gettext("private key file \"%s\" changed during execution\n"), fnbuf);
		return 0;
841 842 843
	}
	if (PEM_read_PrivateKey(fp, pkey, cb, NULL) == NULL)
	{
B
Bruce Momjian 已提交
844 845
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
846
		printfPQExpBuffer(&conn->errorMessage,
847
				  libpq_gettext("could not read private key file \"%s\": %s\n"),
848 849
						  fnbuf, err);
		SSLerrfree(err);
850
		fclose(fp);
851
		return 0;
852 853 854
	}
	fclose(fp);

855 856 857
	/* verify that the cert and key go together */
	if (!X509_check_private_key(*x509, *pkey))
	{
B
Bruce Momjian 已提交
858 859
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
860
		printfPQExpBuffer(&conn->errorMessage,
861
			libpq_gettext("certificate does not match private key file \"%s\": %s\n"),
862 863
						  fnbuf, err);
		SSLerrfree(err);
864
		return 0;
865 866
	}

867 868 869
	return 1;
}

870 871 872 873 874
#ifdef ENABLE_THREAD_SAFETY

static unsigned long
pq_threadidcallback(void)
{
B
Bruce Momjian 已提交
875
	return (unsigned long) pthread_self();
876 877 878
}

static pthread_mutex_t *pq_lockarray;
879

880 881 882
static void
pq_lockingcallback(int mode, int n, const char *file, int line)
{
B
Bruce Momjian 已提交
883
	if (mode & CRYPTO_LOCK)
884
		pthread_mutex_lock(&pq_lockarray[n]);
B
Bruce Momjian 已提交
885
	else
886 887
		pthread_mutex_unlock(&pq_lockarray[n]);
}
888

B
Bruce Momjian 已提交
889
#endif   /* ENABLE_THREAD_SAFETY */
890 891 892 893 894

static int
init_ssl_system(PGconn *conn)
{
#ifdef ENABLE_THREAD_SAFETY
895
#ifndef WIN32
B
Bruce Momjian 已提交
896 897
	static pthread_mutex_t init_mutex = PTHREAD_MUTEX_INITIALIZER;

898
#else
899 900 901
	static pthread_mutex_t init_mutex = NULL;
	static long mutex_initlock = 0;

B
Bruce Momjian 已提交
902 903 904 905
	if (init_mutex == NULL)
	{
		while (InterlockedExchange(&mutex_initlock, 1) == 1)
			 /* loop, another thread own the lock */ ;
906 907
		if (init_mutex == NULL)
			pthread_mutex_init(&init_mutex, NULL);
B
Bruce Momjian 已提交
908
		InterlockedExchange(&mutex_initlock, 0);
909
	}
910
#endif
911
	pthread_mutex_lock(&init_mutex);
B
Bruce Momjian 已提交
912 913 914 915 916

	if (pq_initssllib && pq_lockarray == NULL)
	{
		int			i;

917 918
		CRYPTO_set_id_callback(pq_threadidcallback);

B
Bruce Momjian 已提交
919 920 921
		pq_lockarray = malloc(sizeof(pthread_mutex_t) * CRYPTO_num_locks());
		if (!pq_lockarray)
		{
922 923 924
			pthread_mutex_unlock(&init_mutex);
			return -1;
		}
B
Bruce Momjian 已提交
925
		for (i = 0; i < CRYPTO_num_locks(); i++)
926 927 928 929 930 931 932
			pthread_mutex_init(&pq_lockarray[i], NULL);

		CRYPTO_set_locking_callback(pq_lockingcallback);
	}
#endif
	if (!SSL_context)
	{
B
Bruce Momjian 已提交
933 934
		if (pq_initssllib)
		{
935 936 937 938 939 940
			SSL_library_init();
			SSL_load_error_strings();
		}
		SSL_context = SSL_CTX_new(TLSv1_method());
		if (!SSL_context)
		{
B
Bruce Momjian 已提交
941 942
			char	   *err = SSLerrmessage();

943 944 945 946 947 948 949 950 951 952 953 954 955 956 957
			printfPQExpBuffer(&conn->errorMessage,
					 libpq_gettext("could not create SSL context: %s\n"),
							  err);
			SSLerrfree(err);
#ifdef ENABLE_THREAD_SAFETY
			pthread_mutex_unlock(&init_mutex);
#endif
			return -1;
		}
	}
#ifdef ENABLE_THREAD_SAFETY
	pthread_mutex_unlock(&init_mutex);
#endif
	return 0;
}
B
Bruce Momjian 已提交
958

B
Bruce Momjian 已提交
959 960 961 962
/*
 *	Initialize global SSL context.
 */
static int
B
Bruce Momjian 已提交
963
initialize_SSL(PGconn *conn)
B
Bruce Momjian 已提交
964 965
{
	struct stat buf;
966
	char		homedir[MAXPGPATH];
967
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
968

B
Bruce Momjian 已提交
969
	if (init_ssl_system(conn))
970
		return -1;
B
Bruce Momjian 已提交
971

972
	/* Set up to verify server cert, if root.crt is present */
973
	if (pqGetHomeDirectory(homedir, sizeof(homedir)))
B
Bruce Momjian 已提交
974
	{
975
		snprintf(fnbuf, sizeof(fnbuf), "%s/%s", homedir, ROOTCERTFILE);
976
		if (stat(fnbuf, &buf) == 0)
B
Bruce Momjian 已提交
977
		{
978 979 980
			if (!SSL_CTX_load_verify_locations(SSL_context, fnbuf, NULL))
			{
				char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
981

982 983 984 985 986 987
				printfPQExpBuffer(&conn->errorMessage,
								  libpq_gettext("could not read root certificate file \"%s\": %s\n"),
								  fnbuf, err);
				SSLerrfree(err);
				return -1;
			}
B
Bruce Momjian 已提交
988

989
			SSL_CTX_set_verify(SSL_context, SSL_VERIFY_PEER, verify_cb);
B
Bruce Momjian 已提交
990 991 992
		}
	}

993 994 995 996
	/* set up empheral DH keys */
	SSL_CTX_set_tmp_dh_callback(SSL_context, tmp_dh_cb);
	SSL_CTX_set_options(SSL_context, SSL_OP_SINGLE_DH_USE);

997 998 999
	/* set up mechanism to provide client certificate, if available */
	SSL_CTX_set_client_cert_cb(SSL_context, client_cert_cb);

B
Bruce Momjian 已提交
1000 1001 1002 1003 1004 1005 1006
	return 0;
}

/*
 *	Destroy global SSL context.
 */
static void
B
Bruce Momjian 已提交
1007
destroy_SSL(void)
B
Bruce Momjian 已提交
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018
{
	if (SSL_context)
	{
		SSL_CTX_free(SSL_context);
		SSL_context = NULL;
	}
}

/*
 *	Attempt to negotiate SSL connection.
 */
1019
static PostgresPollingStatusType
B
Bruce Momjian 已提交
1020
open_client_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1021
{
B
Bruce Momjian 已提交
1022
	int			r;
B
Bruce Momjian 已提交
1023

1024 1025
	r = SSL_connect(conn->ssl);
	if (r <= 0)
B
Bruce Momjian 已提交
1026
	{
1027
		int err = SSL_get_error(conn->ssl, r);
1028

1029
		switch (err)
1030 1031 1032
		{
			case SSL_ERROR_WANT_READ:
				return PGRES_POLLING_READING;
B
Bruce Momjian 已提交
1033

1034 1035 1036 1037
			case SSL_ERROR_WANT_WRITE:
				return PGRES_POLLING_WRITING;

			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
1038 1039 1040 1041 1042
				{
					char		sebuf[256];

					if (r == -1)
						printfPQExpBuffer(&conn->errorMessage,
1043
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
1044 1045 1046 1047 1048 1049 1050
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1051
			case SSL_ERROR_SSL:
1052
				{
1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063
					/*
					 * If there are problems with the local certificate files,
					 * these will be detected by client_cert_cb() which is
					 * called from SSL_connect().  We want to return that
					 * error message and not the rather unhelpful error that
					 * OpenSSL itself returns.  So check to see if an error
					 * message was already stored.
					 */
					if (conn->errorMessage.len == 0)
					{
						char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
1064

1065 1066 1067 1068 1069
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL error: %s\n"),
										  err);
						SSLerrfree(err);
					}
1070 1071 1072
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1073 1074 1075

			default:
				printfPQExpBuffer(&conn->errorMessage,
1076 1077
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
1078 1079 1080
				close_SSL(conn);
				return PGRES_POLLING_FAILED;
		}
B
Bruce Momjian 已提交
1081 1082 1083
	}

	/* check the certificate chain of the server */
B
Bruce Momjian 已提交
1084

1085 1086
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1087

B
Bruce Momjian 已提交
1088 1089 1090 1091
	/*
	 * this eliminates simple man-in-the-middle attacks and simple
	 * impersonations
	 */
B
Bruce Momjian 已提交
1092 1093 1094 1095
	r = SSL_get_verify_result(conn->ssl);
	if (r != X509_V_OK)
	{
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1096 1097
			   libpq_gettext("certificate could not be validated: %s\n"),
						  X509_verify_cert_error_string(r));
B
Bruce Momjian 已提交
1098
		close_SSL(conn);
1099
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1100
	}
1101
#endif
B
Bruce Momjian 已提交
1102 1103 1104 1105 1106

	/* pull out server distinguished and common names */
	conn->peer = SSL_get_peer_certificate(conn->ssl);
	if (conn->peer == NULL)
	{
B
Bruce Momjian 已提交
1107 1108
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
1109
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1110
				libpq_gettext("certificate could not be obtained: %s\n"),
1111 1112
						  err);
		SSLerrfree(err);
B
Bruce Momjian 已提交
1113
		close_SSL(conn);
1114
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1115 1116 1117
	}

	X509_NAME_oneline(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1118 1119
					  conn->peer_dn, sizeof(conn->peer_dn));
	conn->peer_dn[sizeof(conn->peer_dn) - 1] = '\0';
B
Bruce Momjian 已提交
1120 1121

	X509_NAME_get_text_by_NID(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1122
							  NID_commonName, conn->peer_cn, SM_USER);
B
Bruce Momjian 已提交
1123 1124 1125
	conn->peer_cn[SM_USER] = '\0';

	/* verify that the common name resolves to peer */
B
Bruce Momjian 已提交
1126

1127 1128
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1129

B
Bruce Momjian 已提交
1130 1131 1132 1133 1134
	/*
	 * this is necessary to eliminate man-in-the-middle attacks and
	 * impersonations where the attacker somehow learned the server's
	 * private key
	 */
B
Bruce Momjian 已提交
1135 1136 1137
	if (verify_peer(conn) == -1)
	{
		close_SSL(conn);
1138
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1139
	}
1140
#endif
B
Bruce Momjian 已提交
1141

1142 1143
	/* SSL handshake is complete */
	return PGRES_POLLING_OK;
B
Bruce Momjian 已提交
1144 1145 1146 1147 1148 1149
}

/*
 *	Close SSL connection.
 */
static void
B
Bruce Momjian 已提交
1150
close_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1151 1152 1153 1154 1155 1156 1157
{
	if (conn->ssl)
	{
		SSL_shutdown(conn->ssl);
		SSL_free(conn->ssl);
		conn->ssl = NULL;
	}
1158 1159 1160 1161 1162 1163

	if (conn->peer)
	{
		X509_free(conn->peer);
		conn->peer = NULL;
	}
B
Bruce Momjian 已提交
1164 1165 1166 1167 1168 1169 1170 1171 1172
}

/*
 * Obtain reason string for last SSL error
 *
 * Some caution is needed here since ERR_reason_error_string will
 * return NULL if it doesn't recognize the error code.  We don't
 * want to return NULL ever.
 */
1173
static char ssl_nomem[] = "Out of memory allocating error description";
B
Bruce Momjian 已提交
1174 1175

#define SSL_ERR_LEN 128
1176 1177

static char *
B
Bruce Momjian 已提交
1178 1179
SSLerrmessage(void)
{
B
Bruce Momjian 已提交
1180 1181
	unsigned long errcode;
	const char *errreason;
B
Bruce Momjian 已提交
1182
	char	   *errbuf;
B
Bruce Momjian 已提交
1183

1184 1185 1186
	errbuf = malloc(SSL_ERR_LEN);
	if (!errbuf)
		return ssl_nomem;
B
Bruce Momjian 已提交
1187
	errcode = ERR_get_error();
B
Bruce Momjian 已提交
1188 1189
	if (errcode == 0)
	{
1190 1191 1192
		strcpy(errbuf, "No SSL error reported");
		return errbuf;
	}
B
Bruce Momjian 已提交
1193
	errreason = ERR_reason_error_string(errcode);
B
Bruce Momjian 已提交
1194 1195 1196 1197
	if (errreason != NULL)
	{
		strncpy(errbuf, errreason, SSL_ERR_LEN - 1);
		errbuf[SSL_ERR_LEN - 1] = '\0';
1198 1199 1200
		return errbuf;
	}
	snprintf(errbuf, SSL_ERR_LEN, "SSL error code %lu", errcode);
B
Bruce Momjian 已提交
1201 1202 1203
	return errbuf;
}

1204 1205 1206 1207 1208 1209
static void
SSLerrfree(char *buf)
{
	if (buf != ssl_nomem)
		free(buf);
}
B
Bruce Momjian 已提交
1210

B
Bruce Momjian 已提交
1211 1212 1213 1214 1215 1216 1217 1218 1219 1220
/*
 *	Return pointer to SSL object.
 */
SSL *
PQgetssl(PGconn *conn)
{
	if (!conn)
		return NULL;
	return conn->ssl;
}
1221 1222 1223

#else   /* !USE_SSL */

1224 1225 1226 1227 1228
void *
PQgetssl(PGconn *conn)
{
	return NULL;
}
1229

B
Bruce Momjian 已提交
1230
#endif   /* USE_SSL */
1231 1232

#ifdef ENABLE_THREAD_SAFETY
1233

1234
/*
1235 1236
 *	Block SIGPIPE for this thread.  This prevents send()/write() from exiting
 *	the application.
1237
 */
1238 1239
int
pq_block_sigpipe(sigset_t *osigset, bool *sigpipe_pending)
1240
{
1241 1242 1243 1244 1245 1246 1247
	sigset_t sigpipe_sigset;
	sigset_t sigset;
	
	sigemptyset(&sigpipe_sigset);
	sigaddset(&sigpipe_sigset, SIGPIPE);

	/* Block SIGPIPE and save previous mask for later reset */
1248 1249 1250
	SOCK_ERRNO_SET(pthread_sigmask(SIG_BLOCK, &sigpipe_sigset, osigset));
	if (SOCK_ERRNO)
		return -1;
1251 1252 1253

	/* We can have a pending SIGPIPE only if it was blocked before */
	if (sigismember(osigset, SIGPIPE))
1254
	{
1255 1256 1257 1258 1259 1260
		/* Is there a pending SIGPIPE? */
		if (sigpending(&sigset) != 0)
			return -1;
	
		if (sigismember(&sigset, SIGPIPE))
			*sigpipe_pending = true;
1261
		else
1262
			*sigpipe_pending = false;
1263
	}
1264 1265 1266
	else
		*sigpipe_pending = false;
	
1267
	return 0;
1268
}
1269
	
1270
/*
1271
 *	Discard any pending SIGPIPE and reset the signal mask.
1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286
 *
 * Note: we are effectively assuming here that the C library doesn't queue
 * up multiple SIGPIPE events.  If it did, then we'd accidentally leave
 * ours in the queue when an event was already pending and we got another.
 * As long as it doesn't queue multiple events, we're OK because the caller
 * can't tell the difference.
 *
 * The caller should say got_epipe = FALSE if it is certain that it
 * didn't get an EPIPE error; in that case we'll skip the clear operation
 * and things are definitely OK, queuing or no.  If it got one or might have
 * gotten one, pass got_epipe = TRUE.
 *
 * We do not want this to change errno, since if it did that could lose
 * the error code from a preceding send().  We essentially assume that if
 * we were able to do pq_block_sigpipe(), this can't fail.
1287
 */
1288 1289
void
pq_reset_sigpipe(sigset_t *osigset, bool sigpipe_pending, bool got_epipe)
1290
{
1291
	int	save_errno = SOCK_ERRNO;
1292 1293
	int	signo;
	sigset_t sigset;
B
Bruce Momjian 已提交
1294

1295
	/* Clear SIGPIPE only if none was pending */
1296
	if (got_epipe && !sigpipe_pending)
1297
	{
1298 1299
		if (sigpending(&sigset) == 0 &&
			sigismember(&sigset, SIGPIPE))
1300 1301 1302 1303 1304
		{
			sigset_t sigpipe_sigset;
			
			sigemptyset(&sigpipe_sigset);
			sigaddset(&sigpipe_sigset, SIGPIPE);
1305

1306 1307 1308 1309 1310
			sigwait(&sigpipe_sigset, &signo);
		}
	}
	
	/* Restore saved block mask */
1311 1312 1313
	pthread_sigmask(SIG_SETMASK, osigset, NULL);

	SOCK_ERRNO_SET(save_errno);
1314
}
1315 1316

#endif /* ENABLE_THREAD_SAFETY */