fe-secure.c 31.1 KB
Newer Older
B
Bruce Momjian 已提交
1 2
/*-------------------------------------------------------------------------
 *
3
 * fe-secure.c
B
Bruce Momjian 已提交
4 5 6 7 8
 *	  functions related to setting up a secure connection to the backend.
 *	  Secure connections are expected to provide confidentiality,
 *	  message integrity and endpoint authentication.
 *
 *
P
 
PostgreSQL Daemon 已提交
9
 * Portions Copyright (c) 1996-2005, PostgreSQL Global Development Group
B
Bruce Momjian 已提交
10 11 12 13
 * Portions Copyright (c) 1994, Regents of the University of California
 *
 *
 * IDENTIFICATION
14
 *	  $PostgreSQL: pgsql/src/interfaces/libpq/fe-secure.c,v 1.63 2005/01/06 00:59:47 tgl Exp $
B
Bruce Momjian 已提交
15
 *
B
Bruce Momjian 已提交
16
 * NOTES
17 18
 *	  [ Most of these notes are wrong/obsolete, but perhaps not all ]
 *
B
Bruce Momjian 已提交
19 20 21 22 23 24 25
 *	  The client *requires* a valid server certificate.  Since
 *	  SSH tunnels provide anonymous confidentiality, the presumption
 *	  is that sites that want endpoint authentication will use the
 *	  direct SSL support, while sites that are comfortable with
 *	  anonymous connections will use SSH tunnels.
 *
 *	  This code verifies the server certificate, to detect simple
B
Bruce Momjian 已提交
26
 *	  "man-in-the-middle" and "impersonation" attacks.	The
B
Bruce Momjian 已提交
27 28 29
 *	  server certificate, or better yet the CA certificate used
 *	  to sign the server certificate, should be present in the
 *	  "$HOME/.postgresql/root.crt" file.  If this file isn't
B
Bruce Momjian 已提交
30
 *	  readable, or the server certificate can't be validated,
31
 *	  pqsecure_open_client() will return an error code.
B
Bruce Momjian 已提交
32 33 34 35 36
 *
 *	  Additionally, the server certificate's "common name" must
 *	  resolve to the other end of the socket.  This makes it
 *	  substantially harder to pull off a "man-in-the-middle" or
 *	  "impersonation" attack even if the server's private key
B
Bruce Momjian 已提交
37
 *	  has been stolen.	This check limits acceptable network
B
Bruce Momjian 已提交
38 39 40 41 42
 *	  layers to Unix sockets (weird, but legal), TCPv4 and TCPv6.
 *
 *	  Unfortunately neither the current front- or back-end handle
 *	  failure gracefully, resulting in the backend hiccupping.
 *	  This points out problems in each (the frontend shouldn't even
43
 *	  try to do SSL if pqsecure_initialize() fails, and the backend
B
Bruce Momjian 已提交
44
 *	  shouldn't crash/recover if an SSH negotiation fails.  The
B
Bruce Momjian 已提交
45
 *	  backend definitely needs to be fixed, to prevent a "denial
B
Bruce Momjian 已提交
46
 *	  of service" attack, but I don't know enough about how the
B
Bruce Momjian 已提交
47 48 49
 *	  backend works (especially that pre-SSL negotiation) to identify
 *	  a fix.
 *
50 51 52 53
 *	  ...
 *
 *	  Unlike the server's static private key, the client's
 *	  static private key ($HOME/.postgresql/postgresql.key)
B
Bruce Momjian 已提交
54
 *	  should normally be stored encrypted.	However we still
55 56
 *	  support EPH since it's useful for other reasons.
 *
57 58 59 60 61 62 63 64 65
 *	  ...
 *
 *	  Client certificates are supported, if the server requests
 *	  or requires them.  Client certificates can be used for
 *	  authentication, to prevent sessions from being hijacked,
 *	  or to allow "road warriors" to access the database while
 *	  keeping it closed to everyone else.
 *
 *	  The user's certificate and private key are located in
B
Bruce Momjian 已提交
66
 *		$HOME/.postgresql/postgresql.crt
67
 *	  and
B
Bruce Momjian 已提交
68
 *		$HOME/.postgresql/postgresql.key
69 70
 *	  respectively.
 *
71 72 73 74 75 76
 *	  ...
 *
 *	  We don't provide informational callbacks here (like
 *	  info_cb() in be-secure.c), since there's mechanism to
 *	  display that information to the client.
 *
B
Bruce Momjian 已提交
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
 * OS DEPENDENCIES
 *	  The code currently assumes a POSIX password entry.  How should
 *	  Windows and Mac users be handled?
 *
 *-------------------------------------------------------------------------
 */

#include "postgres_fe.h"

#include <sys/types.h>
#include <signal.h>
#include <fcntl.h>
#include <errno.h>
#include <ctype.h>
#include <string.h>

#include "libpq-fe.h"
#include "libpq-int.h"
#include "fe-auth.h"
#include "pqsignal.h"

#ifdef WIN32
#include "win32.h"
#else
#include <sys/socket.h>
#include <unistd.h>
#include <netdb.h>
#include <netinet/in.h>
#ifdef HAVE_NETINET_TCP_H
#include <netinet/tcp.h>
#endif
#include <arpa/inet.h>
#endif
110
#include <sys/stat.h>
B
Bruce Momjian 已提交
111

112 113 114 115
#ifdef ENABLE_THREAD_SAFETY
#include <pthread.h>
#endif

B
Bruce Momjian 已提交
116 117 118 119 120 121
#ifndef HAVE_STRDUP
#include "strdup.h"
#endif

#ifdef USE_SSL
#include <openssl/ssl.h>
122
#include <openssl/dh.h>
B
Bruce Momjian 已提交
123
#endif   /* USE_SSL */
B
Bruce Momjian 已提交
124 125 126


#ifdef USE_SSL
B
Bruce Momjian 已提交
127
static int	verify_cb(int ok, X509_STORE_CTX *ctx);
B
Bruce Momjian 已提交
128

B
Bruce Momjian 已提交
129
#ifdef NOT_USED
B
Bruce Momjian 已提交
130
static int	verify_peer(PGconn *);
B
Bruce Momjian 已提交
131
#endif
B
Bruce Momjian 已提交
132 133 134 135
static DH  *load_dh_file(int keylength);
static DH  *load_dh_buffer(const char *, size_t);
static DH  *tmp_dh_cb(SSL *s, int is_export, int keylength);
static int	client_cert_cb(SSL *, X509 **, EVP_PKEY **);
136
static int	init_ssl_system(PGconn *conn);
B
Bruce Momjian 已提交
137
static int	initialize_SSL(PGconn *);
B
Bruce Momjian 已提交
138
static void destroy_SSL(void);
139
static PostgresPollingStatusType open_client_SSL(PGconn *);
B
Bruce Momjian 已提交
140
static void close_SSL(PGconn *);
141 142
static char *SSLerrmessage(void);
static void SSLerrfree(char *buf);
B
Bruce Momjian 已提交
143 144 145
#endif

#ifdef USE_SSL
146
static bool pq_initssllib = true;
147

B
Bruce Momjian 已提交
148 149 150
static SSL_CTX *SSL_context = NULL;
#endif

151
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
152
/*						 Hardcoded values						*/
153 154 155 156 157 158 159
/* ------------------------------------------------------------ */

/*
 *	Hardcoded DH parameters, used in empheral DH keying.
 *	As discussed above, EDH protects the confidentiality of
 *	sessions even if the static private key is compromised,
 *	so we are *highly* motivated to ensure that we can use
B
Bruce Momjian 已提交
160
 *	EDH even if the user... or an attacker... deletes the
161 162 163 164 165
 *	$HOME/.postgresql/dh*.pem files.
 *
 *	It's not critical that users have EPH keys, but it doesn't
 *	hurt and if it's missing someone will demand it, so....
 */
166 167
#ifdef USE_SSL

168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204
static const char file_dh512[] =
"-----BEGIN DH PARAMETERS-----\n\
MEYCQQD1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWak\n\
XUGfnHy9iUsiGSa6q6Jew1XpKgVfAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh1024[] =
"-----BEGIN DH PARAMETERS-----\n\
MIGHAoGBAPSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsY\n\
jY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6\n\
ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XpL3jHAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh2048[] =
"-----BEGIN DH PARAMETERS-----\n\
MIIBCAKCAQEA9kJXtwh/CBdyorrWqULzBej5UxE5T7bxbrlLOCDaAadWoxTpj0BV\n\
89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/cdlJPPT2N286Z4VeSWc39uK50\n\
T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaClcjrUGvC/RgBYK+X0iP1YTknb\n\
zSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdX\n\
Q6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZyAcpesqVDNmWn6vQClCbAkbT\n\
CD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwIBAg==\n\
-----END DH PARAMETERS-----\n";

static const char file_dh4096[] =
"-----BEGIN DH PARAMETERS-----\n\
MIICCAKCAgEA+hRyUsFN4VpJ1O8JLcCo/VWr19k3BCgJ4uk+d+KhehjdRqNDNyOQ\n\
l/MOyQNQfWXPeGKmOmIig6Ev/nm6Nf9Z2B1h3R4hExf+zTiHnvVPeRBhjdQi81rt\n\
Xeoh6TNrSBIKIHfUJWBh3va0TxxjQIs6IZOLeVNRLMqzeylWqMf49HsIXqbcokUS\n\
Vt1BkvLdW48j8PPv5DsKRN3tloTxqDJGo9tKvj1Fuk74A+Xda1kNhB7KFlqMyN98\n\
VETEJ6c7KpfOo30mnK30wqw3S8OtaIR/maYX72tGOno2ehFDkq3pnPtEbD2CScxc\n\
alJC+EL7RPk5c/tgeTvCngvc1KZn92Y//EI7G9tPZtylj2b56sHtMftIoYJ9+ODM\n\
sccD5Piz/rejE3Ome8EOOceUSCYAhXn8b3qvxVI1ddd1pED6FHRhFvLrZxFvBEM9\n\
ERRMp5QqOaHJkM+Dxv8Cj6MqrCbfC4u+ZErxodzuusgDgvZiLF22uxMZbobFWyte\n\
OvOzKGtwcTqO/1wV5gKkzu1ZVswVUQd5Gg8lJicwqRWyyNRczDDoG9jVDxmogKTH\n\
AaqLulO7R8Ifa1SwF2DteSGVtgWEN8gDpN3RBmmPTDngyF2DHb5qmpnznwtFKdTL\n\
KWbuHn491xNO25CQWMtem80uKw+pTnisBRF/454n1Jnhub144YRBoN8CAQI=\n\
-----END DH PARAMETERS-----\n";
205 206
#endif

B
Bruce Momjian 已提交
207
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
208
/*			 Procedures common to all secure sessions			*/
B
Bruce Momjian 已提交
209 210
/* ------------------------------------------------------------ */

211 212 213 214 215 216 217 218 219 220 221 222 223

/*
 * Exported (but as yet undocumented) function to allow application to
 * tell us it's already initialized OpenSSL.
 */
void
PQinitSSL(int do_init)
{
#ifdef USE_SSL
	pq_initssllib = do_init;
#endif
}

B
Bruce Momjian 已提交
224 225 226 227
/*
 *	Initialize global context
 */
int
B
Bruce Momjian 已提交
228
pqsecure_initialize(PGconn *conn)
B
Bruce Momjian 已提交
229
{
B
Bruce Momjian 已提交
230
	int			r = 0;
B
Bruce Momjian 已提交
231 232 233 234 235 236 237 238 239 240 241 242

#ifdef USE_SSL
	r = initialize_SSL(conn);
#endif

	return r;
}

/*
 *	Destroy global context
 */
void
B
Bruce Momjian 已提交
243
pqsecure_destroy(void)
B
Bruce Momjian 已提交
244 245 246 247 248 249 250 251 252
{
#ifdef USE_SSL
	destroy_SSL();
#endif
}

/*
 *	Attempt to negotiate secure session.
 */
253
PostgresPollingStatusType
B
Bruce Momjian 已提交
254
pqsecure_open_client(PGconn *conn)
B
Bruce Momjian 已提交
255 256
{
#ifdef USE_SSL
257 258 259 260 261 262 263
	/* First time through? */
	if (conn->ssl == NULL)
	{
		if (!(conn->ssl = SSL_new(SSL_context)) ||
			!SSL_set_app_data(conn->ssl, conn) ||
			!SSL_set_fd(conn->ssl, conn->sock))
		{
B
Bruce Momjian 已提交
264 265
			char	   *err = SSLerrmessage();

266 267
			printfPQExpBuffer(&conn->errorMessage,
			   libpq_gettext("could not establish SSL connection: %s\n"),
268 269
							  err);
			SSLerrfree(err);
270 271 272
			close_SSL(conn);
			return PGRES_POLLING_FAILED;
		}
273 274 275 276 277
		/*
		 * Initialize errorMessage to empty.  This allows open_client_SSL()
		 * to detect whether client_cert_cb() has stored a message.
		 */
		resetPQExpBuffer(&conn->errorMessage);
278 279 280 281 282 283
	}
	/* Begin or continue the actual handshake */
	return open_client_SSL(conn);
#else
	/* shouldn't get here */
	return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
284 285 286 287 288 289 290
#endif
}

/*
 *	Close secure session.
 */
void
B
Bruce Momjian 已提交
291
pqsecure_close(PGconn *conn)
B
Bruce Momjian 已提交
292 293 294 295 296 297 298 299 300 301 302
{
#ifdef USE_SSL
	if (conn->ssl)
		close_SSL(conn);
#endif
}

/*
 *	Read data from a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
303
pqsecure_read(PGconn *conn, void *ptr, size_t len)
B
Bruce Momjian 已提交
304
{
B
Bruce Momjian 已提交
305
	ssize_t		n;
B
Bruce Momjian 已提交
306 307 308 309

#ifdef USE_SSL
	if (conn->ssl)
	{
310 311
		int			err;

B
Bruce Momjian 已提交
312
rloop:
B
Bruce Momjian 已提交
313
		n = SSL_read(conn->ssl, ptr, len);
314 315
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
316
		{
B
Bruce Momjian 已提交
317 318 319
			case SSL_ERROR_NONE:
				break;
			case SSL_ERROR_WANT_READ:
320 321
				n = 0;
				break;
322
			case SSL_ERROR_WANT_WRITE:
B
Bruce Momjian 已提交
323

324
				/*
B
Bruce Momjian 已提交
325 326 327 328 329
				 * Returning 0 here would cause caller to wait for
				 * read-ready, which is not correct since what SSL wants
				 * is wait for write-ready.  The former could get us stuck
				 * in an infinite wait, so don't risk it; busy-loop
				 * instead.
330
				 */
331
				goto rloop;
B
Bruce Momjian 已提交
332
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
333 334 335 336 337
				{
					char		sebuf[256];

					if (n == -1)
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
338
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
339 340
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
341
					{
B
Bruce Momjian 已提交
342 343
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
344

345
						SOCK_ERRNO_SET(ECONNRESET);
346 347
						n = -1;
					}
B
Bruce Momjian 已提交
348 349
					break;
				}
B
Bruce Momjian 已提交
350
			case SSL_ERROR_SSL:
351
				{
B
Bruce Momjian 已提交
352 353
					char	   *err = SSLerrmessage();

354
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
355
								  libpq_gettext("SSL error: %s\n"), err);
356 357
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
358 359
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
360
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
361 362
				n = -1;
				break;
363 364
			default:
				printfPQExpBuffer(&conn->errorMessage,
365 366
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
367
				n = -1;
368
				break;
B
Bruce Momjian 已提交
369 370 371 372
		}
	}
	else
#endif
B
Bruce Momjian 已提交
373
		n = recv(conn->sock, ptr, len, 0);
B
Bruce Momjian 已提交
374 375 376 377 378 379 380 381

	return n;
}

/*
 *	Write data to a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
382
pqsecure_write(PGconn *conn, const void *ptr, size_t len)
B
Bruce Momjian 已提交
383
{
B
Bruce Momjian 已提交
384
	ssize_t		n;
385
	
386
#ifdef ENABLE_THREAD_SAFETY
387 388
	sigset_t	osigmask;
	bool		sigpipe_pending;
389
	bool		got_epipe = false;
390
	
391 392
	if (pq_block_sigpipe(&osigmask, &sigpipe_pending) < 0)
		return -1;
393
#else
B
Bruce Momjian 已提交
394
#ifndef WIN32
B
Bruce Momjian 已提交
395
	pqsigfunc	oldsighandler = pqsignal(SIGPIPE, SIG_IGN);
B
Bruce Momjian 已提交
396
#endif
397
#endif
B
Bruce Momjian 已提交
398 399 400 401

#ifdef USE_SSL
	if (conn->ssl)
	{
402 403
		int			err;

B
Bruce Momjian 已提交
404
		n = SSL_write(conn->ssl, ptr, len);
405 406
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
407
		{
B
Bruce Momjian 已提交
408 409
			case SSL_ERROR_NONE:
				break;
410
			case SSL_ERROR_WANT_READ:
B
Bruce Momjian 已提交
411

412 413 414 415 416 417 418
				/*
				 * Returning 0 here causes caller to wait for write-ready,
				 * which is not really the right thing, but it's the best
				 * we can do.
				 */
				n = 0;
				break;
B
Bruce Momjian 已提交
419
			case SSL_ERROR_WANT_WRITE:
420 421
				n = 0;
				break;
B
Bruce Momjian 已提交
422
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
423 424
				{
					char		sebuf[256];
425

B
Bruce Momjian 已提交
426
					if (n == -1)
427
					{
428
#ifdef ENABLE_THREAD_SAFETY
429 430
						if (SOCK_ERRNO == EPIPE)
							got_epipe = true;
431
#endif
B
Bruce Momjian 已提交
432
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
433
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
434
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
435
					}
B
Bruce Momjian 已提交
436
					else
437
					{
B
Bruce Momjian 已提交
438 439
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
440
						SOCK_ERRNO_SET(ECONNRESET);
441 442
						n = -1;
					}
B
Bruce Momjian 已提交
443 444
					break;
				}
B
Bruce Momjian 已提交
445
			case SSL_ERROR_SSL:
446
				{
B
Bruce Momjian 已提交
447 448
					char	   *err = SSLerrmessage();

449
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
450
								  libpq_gettext("SSL error: %s\n"), err);
451 452
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
453 454
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
455
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
456 457
				n = -1;
				break;
458 459
			default:
				printfPQExpBuffer(&conn->errorMessage,
460 461
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
462
				n = -1;
463
				break;
B
Bruce Momjian 已提交
464 465 466 467
		}
	}
	else
#endif
468
	{
B
Bruce Momjian 已提交
469
		n = send(conn->sock, ptr, len, 0);
470 471 472 473 474
#ifdef ENABLE_THREAD_SAFETY
		if (n < 0 && SOCK_ERRNO == EPIPE)
			got_epipe = true;
#endif
	}
B
Bruce Momjian 已提交
475

476
#ifdef ENABLE_THREAD_SAFETY
477
	pq_reset_sigpipe(&osigmask, sigpipe_pending, got_epipe);
478
#else
B
Bruce Momjian 已提交
479 480
#ifndef WIN32
	pqsignal(SIGPIPE, oldsighandler);
481
#endif
B
Bruce Momjian 已提交
482 483 484 485 486 487
#endif

	return n;
}

/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
488
/*						  SSL specific code						*/
B
Bruce Momjian 已提交
489 490
/* ------------------------------------------------------------ */
#ifdef USE_SSL
491

B
Bruce Momjian 已提交
492 493 494 495 496 497 498 499 500 501 502 503
/*
 *	Certificate verification callback
 *
 *	This callback allows us to log intermediate problems during
 *	verification, but there doesn't seem to be a clean way to get
 *	our PGconn * structure.  So we can't log anything!
 *
 *	This callback also allows us to override the default acceptance
 *	criteria (e.g., accepting self-signed or expired certs), but
 *	for now we accept the default checks.
 */
static int
B
Bruce Momjian 已提交
504
verify_cb(int ok, X509_STORE_CTX *ctx)
B
Bruce Momjian 已提交
505 506 507 508
{
	return ok;
}

B
Bruce Momjian 已提交
509
#ifdef NOT_USED
B
Bruce Momjian 已提交
510 511 512 513
/*
 *	Verify that common name resolves to peer.
 */
static int
B
Bruce Momjian 已提交
514
verify_peer(PGconn *conn)
B
Bruce Momjian 已提交
515 516 517 518
{
	struct hostent *h = NULL;
	struct sockaddr addr;
	struct sockaddr_in *sin;
B
Bruce Momjian 已提交
519 520
	socklen_t	len;
	char	  **s;
B
Bruce Momjian 已提交
521 522 523 524 525 526
	unsigned long l;

	/* get the address on the other side of the socket */
	len = sizeof(addr);
	if (getpeername(conn->sock, &addr, &len) == -1)
	{
B
Bruce Momjian 已提交
527 528
		char		sebuf[256];

B
Bruce Momjian 已提交
529
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
530
						  libpq_gettext("error querying socket: %s\n"),
B
Bruce Momjian 已提交
531
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
B
Bruce Momjian 已提交
532 533 534 535 536 537 538
		return -1;
	}

	/* weird, but legal case */
	if (addr.sa_family == AF_UNIX)
		return 0;

539 540
	{
		struct hostent hpstr;
541
		char		buf[BUFSIZ];
B
Bruce Momjian 已提交
542
		int			herrno = 0;
B
Bruce Momjian 已提交
543

544
		/*
B
Bruce Momjian 已提交
545 546 547 548
		 * Currently, pqGethostbyname() is used only on platforms that
		 * don't have getaddrinfo().  If you enable this function, you
		 * should convert the pqGethostbyname() function call to use
		 * getaddrinfo().
549
		 */
550
		pqGethostbyname(conn->peer_cn, &hpstr, buf, sizeof(buf),
B
Bruce Momjian 已提交
551
						&h, &herrno);
552
	}
B
Bruce Momjian 已提交
553

B
Bruce Momjian 已提交
554
	/* what do we know about the peer's common name? */
555
	if (h == NULL)
B
Bruce Momjian 已提交
556 557
	{
		printfPQExpBuffer(&conn->errorMessage,
558
		libpq_gettext("could not get information about host \"%s\": %s\n"),
B
Bruce Momjian 已提交
559
						  conn->peer_cn, hstrerror(h_errno));
B
Bruce Momjian 已提交
560 561 562 563 564 565
		return -1;
	}

	/* does the address match? */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
566 567 568 569 570 571 572 573
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			for (s = h->h_addr_list; *s != NULL; s++)
			{
				if (!memcmp(&sin->sin_addr.s_addr, *s, h->h_length))
					return 0;
			}
			break;
B
Bruce Momjian 已提交
574

B
Bruce Momjian 已提交
575 576
		default:
			printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
577
							  libpq_gettext("unsupported protocol\n"));
B
Bruce Momjian 已提交
578
			return -1;
B
Bruce Momjian 已提交
579 580
	}

B
Bruce Momjian 已提交
581 582 583 584
	/*
	 * the prior test should be definitive, but in practice it sometimes
	 * fails.  So we also check the aliases.
	 */
B
Bruce Momjian 已提交
585 586
	for (s = h->h_aliases; *s != NULL; s++)
	{
587
		if (pg_strcasecmp(conn->peer_cn, *s) == 0)
B
Bruce Momjian 已提交
588 589 590 591 592 593
			return 0;
	}

	/* generate protocol-aware error message */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
594 595 596 597 598
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			l = ntohl(sin->sin_addr.s_addr);
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
599
											"server common name \"%s\" does not resolve to %ld.%ld.%ld.%ld\n"),
B
Bruce Momjian 已提交
600 601 602 603 604 605
					 conn->peer_cn, (l >> 24) % 0x100, (l >> 16) % 0x100,
							  (l >> 8) % 0x100, l % 0x100);
			break;
		default:
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
B
Bruce Momjian 已提交
606
											"server common name \"%s\" does not resolve to peer address\n"),
B
Bruce Momjian 已提交
607
							  conn->peer_cn);
B
Bruce Momjian 已提交
608 609 610 611
	}

	return -1;
}
612
#endif /* NOT_USED */
B
Bruce Momjian 已提交
613

614 615 616 617
/*
 *	Load precomputed DH parameters.
 *
 *	To prevent "downgrade" attacks, we perform a number of checks
B
Bruce Momjian 已提交
618
 *	to verify that the DBA-generated DH parameters file contains
619 620
 *	what we expect it to contain.
 */
B
Bruce Momjian 已提交
621 622
static DH  *
load_dh_file(int keylength)
623
{
624
	char		homedir[MAXPGPATH];
625
	char		fnbuf[MAXPGPATH];
626 627
	FILE	   *fp;
	DH		   *dh;
B
Bruce Momjian 已提交
628
	int			codes;
629

630
	if (!pqGetHomeDirectory(homedir, sizeof(homedir)))
B
Bruce Momjian 已提交
631
		return NULL;
632 633

	/* attempt to open file.  It's not an error if it doesn't exist. */
634
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/dh%d.pem",
635
			 homedir, keylength);
636

637 638 639 640 641 642 643 644 645
	if ((fp = fopen(fnbuf, "r")) == NULL)
		return NULL;

/*	flock(fileno(fp), LOCK_SH); */
	dh = PEM_read_DHparams(fp, NULL, NULL, NULL);
/*	flock(fileno(fp), LOCK_UN); */
	fclose(fp);

	/* is the prime the correct size? */
B
Bruce Momjian 已提交
646
	if (dh != NULL && 8 * DH_size(dh) < keylength)
647 648 649 650 651 652 653 654 655
		dh = NULL;

	/* make sure the DH parameters are usable */
	if (dh != NULL)
	{
		if (DH_check(dh, &codes))
			return NULL;
		if (codes & DH_CHECK_P_NOT_PRIME)
			return NULL;
B
Bruce Momjian 已提交
656
		if ((codes & DH_NOT_SUITABLE_GENERATOR) &&
657 658 659 660 661 662 663 664 665 666 667 668 669
			(codes & DH_CHECK_P_NOT_SAFE_PRIME))
			return NULL;
	}

	return dh;
}

/*
 *	Load hardcoded DH parameters.
 *
 *	To prevent problems if the DH parameters files don't even
 *	exist, we can load DH parameters hardcoded into this file.
 */
B
Bruce Momjian 已提交
670 671
static DH  *
load_dh_buffer(const char *buffer, size_t len)
672
{
B
Bruce Momjian 已提交
673 674
	BIO		   *bio;
	DH		   *dh = NULL;
675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697

	bio = BIO_new_mem_buf((char *) buffer, len);
	if (bio == NULL)
		return NULL;
	dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
	BIO_free(bio);

	return dh;
}

/*
 *	Generate an empheral DH key.  Because this can take a long
 *	time to compute, we can use precomputed parameters of the
 *	common key sizes.
 *
 *	Since few sites will bother to precompute these parameter
 *	files, we also provide a fallback to the parameters provided
 *	by the OpenSSL project.
 *
 *	These values can be static (once loaded or computed) since
 *	the OpenSSL library can efficiently generate random keys from
 *	the information provided.
 */
B
Bruce Momjian 已提交
698 699
static DH  *
tmp_dh_cb(SSL *s, int is_export, int keylength)
700
{
B
Bruce Momjian 已提交
701 702 703 704 705 706
	DH		   *r = NULL;
	static DH  *dh = NULL;
	static DH  *dh512 = NULL;
	static DH  *dh1024 = NULL;
	static DH  *dh2048 = NULL;
	static DH  *dh4096 = NULL;
707 708 709

	switch (keylength)
	{
B
Bruce Momjian 已提交
710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745
		case 512:
			if (dh512 == NULL)
				dh512 = load_dh_file(keylength);
			if (dh512 == NULL)
				dh512 = load_dh_buffer(file_dh512, sizeof file_dh512);
			r = dh512;
			break;

		case 1024:
			if (dh1024 == NULL)
				dh1024 = load_dh_file(keylength);
			if (dh1024 == NULL)
				dh1024 = load_dh_buffer(file_dh1024, sizeof file_dh1024);
			r = dh1024;
			break;

		case 2048:
			if (dh2048 == NULL)
				dh2048 = load_dh_file(keylength);
			if (dh2048 == NULL)
				dh2048 = load_dh_buffer(file_dh2048, sizeof file_dh2048);
			r = dh2048;
			break;

		case 4096:
			if (dh4096 == NULL)
				dh4096 = load_dh_file(keylength);
			if (dh4096 == NULL)
				dh4096 = load_dh_buffer(file_dh4096, sizeof file_dh4096);
			r = dh4096;
			break;

		default:
			if (dh == NULL)
				dh = load_dh_file(keylength);
			r = dh;
746 747 748
	}

	/* this may take a long time, but it may be necessary... */
B
Bruce Momjian 已提交
749
	if (r == NULL || 8 * DH_size(r) < keylength)
750
		r = DH_generate_parameters(keylength, DH_GENERATOR_2, NULL, NULL);
B
Bruce Momjian 已提交
751

752 753 754
	return r;
}

755 756 757 758 759
/*
 *	Callback used by SSL to load client cert and key.
 *	This callback is only called when the server wants a
 *	client cert.
 *
760
 *	Must return 1 on success, 0 on no data or error.
761 762
 */
static int
B
Bruce Momjian 已提交
763
client_cert_cb(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
764
{
765
	char		homedir[MAXPGPATH];
B
Bruce Momjian 已提交
766 767
	struct stat buf,
				buf2;
768
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
769 770 771
	FILE	   *fp;
	PGconn	   *conn = (PGconn *) SSL_get_app_data(ssl);
	int			(*cb) () = NULL;	/* how to read user password */
B
Bruce Momjian 已提交
772
	char		sebuf[256];
773

774
	if (!pqGetHomeDirectory(homedir, sizeof(homedir)))
775
	{
B
Bruce Momjian 已提交
776
		printfPQExpBuffer(&conn->errorMessage,
777
					  libpq_gettext("could not get user information\n"));
778
		return 0;
779 780 781
	}

	/* read the user certificate */
782
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/postgresql.crt",
783
			 homedir);
784 785
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
786
		printfPQExpBuffer(&conn->errorMessage,
787
				  libpq_gettext("could not open certificate file \"%s\": %s\n"),
788
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
789
		return 0;
790 791 792
	}
	if (PEM_read_X509(fp, x509, NULL, NULL) == NULL)
	{
B
Bruce Momjian 已提交
793 794
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
795
		printfPQExpBuffer(&conn->errorMessage,
796
				  libpq_gettext("could not read certificate file \"%s\": %s\n"),
797 798
						  fnbuf, err);
		SSLerrfree(err);
799
		fclose(fp);
800
		return 0;
801 802 803 804
	}
	fclose(fp);

	/* read the user key */
805
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/postgresql.key",
806
			 homedir);
807 808
	if (stat(fnbuf, &buf) == -1)
	{
B
Bruce Momjian 已提交
809
		printfPQExpBuffer(&conn->errorMessage,
810
		libpq_gettext("certificate present, but not private key file \"%s\"\n"),
B
Bruce Momjian 已提交
811
						  fnbuf);
812 813 814 815 816
		return 0;
	}
	if (!S_ISREG(buf.st_mode) || (buf.st_mode & 0077) ||
		buf.st_uid != getuid())
	{
B
Bruce Momjian 已提交
817
		printfPQExpBuffer(&conn->errorMessage,
818 819 820
		libpq_gettext("private key file \"%s\" has wrong permissions\n"),
						  fnbuf);
		return 0;
821 822 823
	}
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
824
		printfPQExpBuffer(&conn->errorMessage,
825
			 libpq_gettext("could not open private key file \"%s\": %s\n"),
826
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
827
		return 0;
828 829 830 831
	}
	if (fstat(fileno(fp), &buf2) == -1 ||
		buf.st_dev != buf2.st_dev || buf.st_ino != buf2.st_ino)
	{
B
Bruce Momjian 已提交
832
		printfPQExpBuffer(&conn->errorMessage,
833 834
						  libpq_gettext("private key file \"%s\" changed during execution\n"), fnbuf);
		return 0;
835 836 837
	}
	if (PEM_read_PrivateKey(fp, pkey, cb, NULL) == NULL)
	{
B
Bruce Momjian 已提交
838 839
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
840
		printfPQExpBuffer(&conn->errorMessage,
841
				  libpq_gettext("could not read private key file \"%s\": %s\n"),
842 843
						  fnbuf, err);
		SSLerrfree(err);
844
		fclose(fp);
845
		return 0;
846 847 848
	}
	fclose(fp);

849 850 851
	/* verify that the cert and key go together */
	if (!X509_check_private_key(*x509, *pkey))
	{
B
Bruce Momjian 已提交
852 853
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
854
		printfPQExpBuffer(&conn->errorMessage,
855
			libpq_gettext("certificate does not match private key file \"%s\": %s\n"),
856 857
						  fnbuf, err);
		SSLerrfree(err);
858
		return 0;
859 860
	}

861 862 863
	return 1;
}

864 865 866 867 868
#ifdef ENABLE_THREAD_SAFETY

static unsigned long
pq_threadidcallback(void)
{
B
Bruce Momjian 已提交
869
	return (unsigned long) pthread_self();
870 871 872
}

static pthread_mutex_t *pq_lockarray;
873

874 875 876
static void
pq_lockingcallback(int mode, int n, const char *file, int line)
{
B
Bruce Momjian 已提交
877
	if (mode & CRYPTO_LOCK)
878
		pthread_mutex_lock(&pq_lockarray[n]);
B
Bruce Momjian 已提交
879
	else
880 881
		pthread_mutex_unlock(&pq_lockarray[n]);
}
882

B
Bruce Momjian 已提交
883
#endif   /* ENABLE_THREAD_SAFETY */
884 885 886 887 888

static int
init_ssl_system(PGconn *conn)
{
#ifdef ENABLE_THREAD_SAFETY
889
#ifndef WIN32
B
Bruce Momjian 已提交
890 891
	static pthread_mutex_t init_mutex = PTHREAD_MUTEX_INITIALIZER;

892
#else
893 894 895
	static pthread_mutex_t init_mutex = NULL;
	static long mutex_initlock = 0;

B
Bruce Momjian 已提交
896 897 898 899
	if (init_mutex == NULL)
	{
		while (InterlockedExchange(&mutex_initlock, 1) == 1)
			 /* loop, another thread own the lock */ ;
900 901
		if (init_mutex == NULL)
			pthread_mutex_init(&init_mutex, NULL);
B
Bruce Momjian 已提交
902
		InterlockedExchange(&mutex_initlock, 0);
903
	}
904
#endif
905
	pthread_mutex_lock(&init_mutex);
B
Bruce Momjian 已提交
906 907 908 909 910

	if (pq_initssllib && pq_lockarray == NULL)
	{
		int			i;

911 912
		CRYPTO_set_id_callback(pq_threadidcallback);

B
Bruce Momjian 已提交
913 914 915
		pq_lockarray = malloc(sizeof(pthread_mutex_t) * CRYPTO_num_locks());
		if (!pq_lockarray)
		{
916 917 918
			pthread_mutex_unlock(&init_mutex);
			return -1;
		}
B
Bruce Momjian 已提交
919
		for (i = 0; i < CRYPTO_num_locks(); i++)
920 921 922 923 924 925 926
			pthread_mutex_init(&pq_lockarray[i], NULL);

		CRYPTO_set_locking_callback(pq_lockingcallback);
	}
#endif
	if (!SSL_context)
	{
B
Bruce Momjian 已提交
927 928
		if (pq_initssllib)
		{
929 930 931 932 933 934
			SSL_library_init();
			SSL_load_error_strings();
		}
		SSL_context = SSL_CTX_new(TLSv1_method());
		if (!SSL_context)
		{
B
Bruce Momjian 已提交
935 936
			char	   *err = SSLerrmessage();

937 938 939 940 941 942 943 944 945 946 947 948 949 950 951
			printfPQExpBuffer(&conn->errorMessage,
					 libpq_gettext("could not create SSL context: %s\n"),
							  err);
			SSLerrfree(err);
#ifdef ENABLE_THREAD_SAFETY
			pthread_mutex_unlock(&init_mutex);
#endif
			return -1;
		}
	}
#ifdef ENABLE_THREAD_SAFETY
	pthread_mutex_unlock(&init_mutex);
#endif
	return 0;
}
B
Bruce Momjian 已提交
952

B
Bruce Momjian 已提交
953 954 955 956
/*
 *	Initialize global SSL context.
 */
static int
B
Bruce Momjian 已提交
957
initialize_SSL(PGconn *conn)
B
Bruce Momjian 已提交
958 959
{
	struct stat buf;
960
	char		homedir[MAXPGPATH];
961
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
962

B
Bruce Momjian 已提交
963
	if (init_ssl_system(conn))
964
		return -1;
B
Bruce Momjian 已提交
965

966
	/* Set up to verify server cert, if root.crt is present */
967
	if (pqGetHomeDirectory(homedir, sizeof(homedir)))
B
Bruce Momjian 已提交
968
	{
969
		snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/root.crt", homedir);
970
		if (stat(fnbuf, &buf) == 0)
B
Bruce Momjian 已提交
971
		{
972 973 974
			if (!SSL_CTX_load_verify_locations(SSL_context, fnbuf, NULL))
			{
				char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
975

976 977 978 979 980 981
				printfPQExpBuffer(&conn->errorMessage,
								  libpq_gettext("could not read root certificate file \"%s\": %s\n"),
								  fnbuf, err);
				SSLerrfree(err);
				return -1;
			}
B
Bruce Momjian 已提交
982

983
			SSL_CTX_set_verify(SSL_context, SSL_VERIFY_PEER, verify_cb);
B
Bruce Momjian 已提交
984 985 986
		}
	}

987 988 989 990
	/* set up empheral DH keys */
	SSL_CTX_set_tmp_dh_callback(SSL_context, tmp_dh_cb);
	SSL_CTX_set_options(SSL_context, SSL_OP_SINGLE_DH_USE);

991 992 993
	/* set up mechanism to provide client certificate, if available */
	SSL_CTX_set_client_cert_cb(SSL_context, client_cert_cb);

B
Bruce Momjian 已提交
994 995 996 997 998 999 1000
	return 0;
}

/*
 *	Destroy global SSL context.
 */
static void
B
Bruce Momjian 已提交
1001
destroy_SSL(void)
B
Bruce Momjian 已提交
1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012
{
	if (SSL_context)
	{
		SSL_CTX_free(SSL_context);
		SSL_context = NULL;
	}
}

/*
 *	Attempt to negotiate SSL connection.
 */
1013
static PostgresPollingStatusType
B
Bruce Momjian 已提交
1014
open_client_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1015
{
B
Bruce Momjian 已提交
1016
	int			r;
B
Bruce Momjian 已提交
1017

1018 1019
	r = SSL_connect(conn->ssl);
	if (r <= 0)
B
Bruce Momjian 已提交
1020
	{
1021
		int err = SSL_get_error(conn->ssl, r);
1022

1023
		switch (err)
1024 1025 1026
		{
			case SSL_ERROR_WANT_READ:
				return PGRES_POLLING_READING;
B
Bruce Momjian 已提交
1027

1028 1029 1030 1031
			case SSL_ERROR_WANT_WRITE:
				return PGRES_POLLING_WRITING;

			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
1032 1033 1034 1035 1036
				{
					char		sebuf[256];

					if (r == -1)
						printfPQExpBuffer(&conn->errorMessage,
1037
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
1038 1039 1040 1041 1042 1043 1044
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1045
			case SSL_ERROR_SSL:
1046
				{
1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057
					/*
					 * If there are problems with the local certificate files,
					 * these will be detected by client_cert_cb() which is
					 * called from SSL_connect().  We want to return that
					 * error message and not the rather unhelpful error that
					 * OpenSSL itself returns.  So check to see if an error
					 * message was already stored.
					 */
					if (conn->errorMessage.len == 0)
					{
						char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
1058

1059 1060 1061 1062 1063
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL error: %s\n"),
										  err);
						SSLerrfree(err);
					}
1064 1065 1066
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1067 1068 1069

			default:
				printfPQExpBuffer(&conn->errorMessage,
1070 1071
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
1072 1073 1074
				close_SSL(conn);
				return PGRES_POLLING_FAILED;
		}
B
Bruce Momjian 已提交
1075 1076 1077
	}

	/* check the certificate chain of the server */
B
Bruce Momjian 已提交
1078

1079 1080
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1081

B
Bruce Momjian 已提交
1082 1083 1084 1085
	/*
	 * this eliminates simple man-in-the-middle attacks and simple
	 * impersonations
	 */
B
Bruce Momjian 已提交
1086 1087 1088 1089
	r = SSL_get_verify_result(conn->ssl);
	if (r != X509_V_OK)
	{
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1090 1091
			   libpq_gettext("certificate could not be validated: %s\n"),
						  X509_verify_cert_error_string(r));
B
Bruce Momjian 已提交
1092
		close_SSL(conn);
1093
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1094
	}
1095
#endif
B
Bruce Momjian 已提交
1096 1097 1098 1099 1100

	/* pull out server distinguished and common names */
	conn->peer = SSL_get_peer_certificate(conn->ssl);
	if (conn->peer == NULL)
	{
B
Bruce Momjian 已提交
1101 1102
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
1103
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1104
				libpq_gettext("certificate could not be obtained: %s\n"),
1105 1106
						  err);
		SSLerrfree(err);
B
Bruce Momjian 已提交
1107
		close_SSL(conn);
1108
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1109 1110 1111
	}

	X509_NAME_oneline(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1112 1113
					  conn->peer_dn, sizeof(conn->peer_dn));
	conn->peer_dn[sizeof(conn->peer_dn) - 1] = '\0';
B
Bruce Momjian 已提交
1114 1115

	X509_NAME_get_text_by_NID(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1116
							  NID_commonName, conn->peer_cn, SM_USER);
B
Bruce Momjian 已提交
1117 1118 1119
	conn->peer_cn[SM_USER] = '\0';

	/* verify that the common name resolves to peer */
B
Bruce Momjian 已提交
1120

1121 1122
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1123

B
Bruce Momjian 已提交
1124 1125 1126 1127 1128
	/*
	 * this is necessary to eliminate man-in-the-middle attacks and
	 * impersonations where the attacker somehow learned the server's
	 * private key
	 */
B
Bruce Momjian 已提交
1129 1130 1131
	if (verify_peer(conn) == -1)
	{
		close_SSL(conn);
1132
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1133
	}
1134
#endif
B
Bruce Momjian 已提交
1135

1136 1137
	/* SSL handshake is complete */
	return PGRES_POLLING_OK;
B
Bruce Momjian 已提交
1138 1139 1140 1141 1142 1143
}

/*
 *	Close SSL connection.
 */
static void
B
Bruce Momjian 已提交
1144
close_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1145 1146 1147 1148 1149 1150 1151
{
	if (conn->ssl)
	{
		SSL_shutdown(conn->ssl);
		SSL_free(conn->ssl);
		conn->ssl = NULL;
	}
1152 1153 1154 1155 1156 1157

	if (conn->peer)
	{
		X509_free(conn->peer);
		conn->peer = NULL;
	}
B
Bruce Momjian 已提交
1158 1159 1160 1161 1162 1163 1164 1165 1166
}

/*
 * Obtain reason string for last SSL error
 *
 * Some caution is needed here since ERR_reason_error_string will
 * return NULL if it doesn't recognize the error code.  We don't
 * want to return NULL ever.
 */
1167
static char ssl_nomem[] = "Out of memory allocating error description";
B
Bruce Momjian 已提交
1168 1169

#define SSL_ERR_LEN 128
1170 1171

static char *
B
Bruce Momjian 已提交
1172 1173
SSLerrmessage(void)
{
B
Bruce Momjian 已提交
1174 1175
	unsigned long errcode;
	const char *errreason;
B
Bruce Momjian 已提交
1176
	char	   *errbuf;
B
Bruce Momjian 已提交
1177

1178 1179 1180
	errbuf = malloc(SSL_ERR_LEN);
	if (!errbuf)
		return ssl_nomem;
B
Bruce Momjian 已提交
1181
	errcode = ERR_get_error();
B
Bruce Momjian 已提交
1182 1183
	if (errcode == 0)
	{
1184 1185 1186
		strcpy(errbuf, "No SSL error reported");
		return errbuf;
	}
B
Bruce Momjian 已提交
1187
	errreason = ERR_reason_error_string(errcode);
B
Bruce Momjian 已提交
1188 1189 1190 1191
	if (errreason != NULL)
	{
		strncpy(errbuf, errreason, SSL_ERR_LEN - 1);
		errbuf[SSL_ERR_LEN - 1] = '\0';
1192 1193 1194
		return errbuf;
	}
	snprintf(errbuf, SSL_ERR_LEN, "SSL error code %lu", errcode);
B
Bruce Momjian 已提交
1195 1196 1197
	return errbuf;
}

1198 1199 1200 1201 1202 1203
static void
SSLerrfree(char *buf)
{
	if (buf != ssl_nomem)
		free(buf);
}
B
Bruce Momjian 已提交
1204

B
Bruce Momjian 已提交
1205 1206 1207 1208 1209 1210 1211 1212 1213 1214
/*
 *	Return pointer to SSL object.
 */
SSL *
PQgetssl(PGconn *conn)
{
	if (!conn)
		return NULL;
	return conn->ssl;
}
1215 1216 1217

#else   /* !USE_SSL */

1218 1219 1220 1221 1222
void *
PQgetssl(PGconn *conn)
{
	return NULL;
}
1223

B
Bruce Momjian 已提交
1224
#endif   /* USE_SSL */
1225 1226

#ifdef ENABLE_THREAD_SAFETY
1227

1228
/*
1229 1230
 *	Block SIGPIPE for this thread.  This prevents send()/write() from exiting
 *	the application.
1231
 */
1232 1233
int
pq_block_sigpipe(sigset_t *osigset, bool *sigpipe_pending)
1234
{
1235 1236 1237 1238 1239 1240 1241
	sigset_t sigpipe_sigset;
	sigset_t sigset;
	
	sigemptyset(&sigpipe_sigset);
	sigaddset(&sigpipe_sigset, SIGPIPE);

	/* Block SIGPIPE and save previous mask for later reset */
1242 1243 1244
	SOCK_ERRNO_SET(pthread_sigmask(SIG_BLOCK, &sigpipe_sigset, osigset));
	if (SOCK_ERRNO)
		return -1;
1245 1246 1247

	/* We can have a pending SIGPIPE only if it was blocked before */
	if (sigismember(osigset, SIGPIPE))
1248
	{
1249 1250 1251 1252 1253 1254
		/* Is there a pending SIGPIPE? */
		if (sigpending(&sigset) != 0)
			return -1;
	
		if (sigismember(&sigset, SIGPIPE))
			*sigpipe_pending = true;
1255
		else
1256
			*sigpipe_pending = false;
1257
	}
1258 1259 1260
	else
		*sigpipe_pending = false;
	
1261
	return 0;
1262
}
1263
	
1264
/*
1265
 *	Discard any pending SIGPIPE and reset the signal mask.
1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280
 *
 * Note: we are effectively assuming here that the C library doesn't queue
 * up multiple SIGPIPE events.  If it did, then we'd accidentally leave
 * ours in the queue when an event was already pending and we got another.
 * As long as it doesn't queue multiple events, we're OK because the caller
 * can't tell the difference.
 *
 * The caller should say got_epipe = FALSE if it is certain that it
 * didn't get an EPIPE error; in that case we'll skip the clear operation
 * and things are definitely OK, queuing or no.  If it got one or might have
 * gotten one, pass got_epipe = TRUE.
 *
 * We do not want this to change errno, since if it did that could lose
 * the error code from a preceding send().  We essentially assume that if
 * we were able to do pq_block_sigpipe(), this can't fail.
1281
 */
1282 1283
void
pq_reset_sigpipe(sigset_t *osigset, bool sigpipe_pending, bool got_epipe)
1284
{
1285
	int	save_errno = SOCK_ERRNO;
1286 1287
	int	signo;
	sigset_t sigset;
B
Bruce Momjian 已提交
1288

1289
	/* Clear SIGPIPE only if none was pending */
1290
	if (got_epipe && !sigpipe_pending)
1291
	{
1292 1293
		if (sigpending(&sigset) == 0 &&
			sigismember(&sigset, SIGPIPE))
1294 1295 1296 1297 1298
		{
			sigset_t sigpipe_sigset;
			
			sigemptyset(&sigpipe_sigset);
			sigaddset(&sigpipe_sigset, SIGPIPE);
1299

1300 1301 1302 1303 1304
			sigwait(&sigpipe_sigset, &signo);
		}
	}
	
	/* Restore saved block mask */
1305 1306 1307
	pthread_sigmask(SIG_SETMASK, osigset, NULL);

	SOCK_ERRNO_SET(save_errno);
1308
}
1309 1310

#endif /* ENABLE_THREAD_SAFETY */