fe-secure.c 31.4 KB
Newer Older
B
Bruce Momjian 已提交
1 2
/*-------------------------------------------------------------------------
 *
3
 * fe-secure.c
B
Bruce Momjian 已提交
4 5 6 7 8
 *	  functions related to setting up a secure connection to the backend.
 *	  Secure connections are expected to provide confidentiality,
 *	  message integrity and endpoint authentication.
 *
 *
P
 
PostgreSQL Daemon 已提交
9
 * Portions Copyright (c) 1996-2005, PostgreSQL Global Development Group
B
Bruce Momjian 已提交
10 11 12 13
 * Portions Copyright (c) 1994, Regents of the University of California
 *
 *
 * IDENTIFICATION
P
 
PostgreSQL Daemon 已提交
14
 *	  $PostgreSQL: pgsql/src/interfaces/libpq/fe-secure.c,v 1.61 2004/12/31 22:03:50 pgsql Exp $
B
Bruce Momjian 已提交
15
 *
B
Bruce Momjian 已提交
16
 * NOTES
17 18
 *	  [ Most of these notes are wrong/obsolete, but perhaps not all ]
 *
B
Bruce Momjian 已提交
19 20 21 22 23 24 25
 *	  The client *requires* a valid server certificate.  Since
 *	  SSH tunnels provide anonymous confidentiality, the presumption
 *	  is that sites that want endpoint authentication will use the
 *	  direct SSL support, while sites that are comfortable with
 *	  anonymous connections will use SSH tunnels.
 *
 *	  This code verifies the server certificate, to detect simple
B
Bruce Momjian 已提交
26
 *	  "man-in-the-middle" and "impersonation" attacks.	The
B
Bruce Momjian 已提交
27 28 29
 *	  server certificate, or better yet the CA certificate used
 *	  to sign the server certificate, should be present in the
 *	  "$HOME/.postgresql/root.crt" file.  If this file isn't
B
Bruce Momjian 已提交
30
 *	  readable, or the server certificate can't be validated,
31
 *	  pqsecure_open_client() will return an error code.
B
Bruce Momjian 已提交
32 33 34 35 36
 *
 *	  Additionally, the server certificate's "common name" must
 *	  resolve to the other end of the socket.  This makes it
 *	  substantially harder to pull off a "man-in-the-middle" or
 *	  "impersonation" attack even if the server's private key
B
Bruce Momjian 已提交
37
 *	  has been stolen.	This check limits acceptable network
B
Bruce Momjian 已提交
38 39 40 41 42
 *	  layers to Unix sockets (weird, but legal), TCPv4 and TCPv6.
 *
 *	  Unfortunately neither the current front- or back-end handle
 *	  failure gracefully, resulting in the backend hiccupping.
 *	  This points out problems in each (the frontend shouldn't even
43
 *	  try to do SSL if pqsecure_initialize() fails, and the backend
B
Bruce Momjian 已提交
44
 *	  shouldn't crash/recover if an SSH negotiation fails.  The
B
Bruce Momjian 已提交
45
 *	  backend definitely needs to be fixed, to prevent a "denial
B
Bruce Momjian 已提交
46
 *	  of service" attack, but I don't know enough about how the
B
Bruce Momjian 已提交
47 48 49
 *	  backend works (especially that pre-SSL negotiation) to identify
 *	  a fix.
 *
50 51 52 53
 *	  ...
 *
 *	  Unlike the server's static private key, the client's
 *	  static private key ($HOME/.postgresql/postgresql.key)
B
Bruce Momjian 已提交
54
 *	  should normally be stored encrypted.	However we still
55 56
 *	  support EPH since it's useful for other reasons.
 *
57 58 59 60 61 62 63 64 65
 *	  ...
 *
 *	  Client certificates are supported, if the server requests
 *	  or requires them.  Client certificates can be used for
 *	  authentication, to prevent sessions from being hijacked,
 *	  or to allow "road warriors" to access the database while
 *	  keeping it closed to everyone else.
 *
 *	  The user's certificate and private key are located in
B
Bruce Momjian 已提交
66
 *		$HOME/.postgresql/postgresql.crt
67
 *	  and
B
Bruce Momjian 已提交
68
 *		$HOME/.postgresql/postgresql.key
69 70
 *	  respectively.
 *
71 72 73 74 75 76
 *	  ...
 *
 *	  We don't provide informational callbacks here (like
 *	  info_cb() in be-secure.c), since there's mechanism to
 *	  display that information to the client.
 *
B
Bruce Momjian 已提交
77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110
 * OS DEPENDENCIES
 *	  The code currently assumes a POSIX password entry.  How should
 *	  Windows and Mac users be handled?
 *
 *-------------------------------------------------------------------------
 */

#include "postgres_fe.h"

#include <sys/types.h>
#include <signal.h>
#include <fcntl.h>
#include <errno.h>
#include <ctype.h>
#include <string.h>

#include "libpq-fe.h"
#include "libpq-int.h"
#include "fe-auth.h"
#include "pqsignal.h"

#ifdef WIN32
#include "win32.h"
#else
#include <sys/socket.h>
#include <unistd.h>
#include <netdb.h>
#include <netinet/in.h>
#ifdef HAVE_NETINET_TCP_H
#include <netinet/tcp.h>
#endif
#include <arpa/inet.h>
#endif

111 112 113 114
#ifdef ENABLE_THREAD_SAFETY
#include <pthread.h>
#endif

B
Bruce Momjian 已提交
115 116 117 118
#ifndef HAVE_STRDUP
#include "strdup.h"
#endif

119
#ifndef WIN32
B
Bruce Momjian 已提交
120
#include <pwd.h>
121
#endif
B
Bruce Momjian 已提交
122 123 124 125
#include <sys/stat.h>

#ifdef USE_SSL
#include <openssl/ssl.h>
126
#include <openssl/dh.h>
B
Bruce Momjian 已提交
127
#endif   /* USE_SSL */
B
Bruce Momjian 已提交
128 129 130


#ifdef USE_SSL
B
Bruce Momjian 已提交
131
static int	verify_cb(int ok, X509_STORE_CTX *ctx);
B
Bruce Momjian 已提交
132

B
Bruce Momjian 已提交
133
#ifdef NOT_USED
B
Bruce Momjian 已提交
134
static int	verify_peer(PGconn *);
B
Bruce Momjian 已提交
135
#endif
B
Bruce Momjian 已提交
136 137 138 139
static DH  *load_dh_file(int keylength);
static DH  *load_dh_buffer(const char *, size_t);
static DH  *tmp_dh_cb(SSL *s, int is_export, int keylength);
static int	client_cert_cb(SSL *, X509 **, EVP_PKEY **);
140
static int	init_ssl_system(PGconn *conn);
B
Bruce Momjian 已提交
141
static int	initialize_SSL(PGconn *);
B
Bruce Momjian 已提交
142
static void destroy_SSL(void);
143
static PostgresPollingStatusType open_client_SSL(PGconn *);
B
Bruce Momjian 已提交
144
static void close_SSL(PGconn *);
145 146
static char *SSLerrmessage(void);
static void SSLerrfree(char *buf);
B
Bruce Momjian 已提交
147 148 149
#endif

#ifdef USE_SSL
150
static bool pq_initssllib = true;
151

B
Bruce Momjian 已提交
152 153 154
static SSL_CTX *SSL_context = NULL;
#endif

155
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
156
/*						 Hardcoded values						*/
157 158 159 160 161 162 163
/* ------------------------------------------------------------ */

/*
 *	Hardcoded DH parameters, used in empheral DH keying.
 *	As discussed above, EDH protects the confidentiality of
 *	sessions even if the static private key is compromised,
 *	so we are *highly* motivated to ensure that we can use
B
Bruce Momjian 已提交
164
 *	EDH even if the user... or an attacker... deletes the
165 166 167 168 169
 *	$HOME/.postgresql/dh*.pem files.
 *
 *	It's not critical that users have EPH keys, but it doesn't
 *	hurt and if it's missing someone will demand it, so....
 */
170 171
#ifdef USE_SSL

172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208
static const char file_dh512[] =
"-----BEGIN DH PARAMETERS-----\n\
MEYCQQD1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWak\n\
XUGfnHy9iUsiGSa6q6Jew1XpKgVfAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh1024[] =
"-----BEGIN DH PARAMETERS-----\n\
MIGHAoGBAPSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsY\n\
jY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6\n\
ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XpL3jHAgEC\n\
-----END DH PARAMETERS-----\n";

static const char file_dh2048[] =
"-----BEGIN DH PARAMETERS-----\n\
MIIBCAKCAQEA9kJXtwh/CBdyorrWqULzBej5UxE5T7bxbrlLOCDaAadWoxTpj0BV\n\
89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/cdlJPPT2N286Z4VeSWc39uK50\n\
T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaClcjrUGvC/RgBYK+X0iP1YTknb\n\
zSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdX\n\
Q6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZyAcpesqVDNmWn6vQClCbAkbT\n\
CD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwIBAg==\n\
-----END DH PARAMETERS-----\n";

static const char file_dh4096[] =
"-----BEGIN DH PARAMETERS-----\n\
MIICCAKCAgEA+hRyUsFN4VpJ1O8JLcCo/VWr19k3BCgJ4uk+d+KhehjdRqNDNyOQ\n\
l/MOyQNQfWXPeGKmOmIig6Ev/nm6Nf9Z2B1h3R4hExf+zTiHnvVPeRBhjdQi81rt\n\
Xeoh6TNrSBIKIHfUJWBh3va0TxxjQIs6IZOLeVNRLMqzeylWqMf49HsIXqbcokUS\n\
Vt1BkvLdW48j8PPv5DsKRN3tloTxqDJGo9tKvj1Fuk74A+Xda1kNhB7KFlqMyN98\n\
VETEJ6c7KpfOo30mnK30wqw3S8OtaIR/maYX72tGOno2ehFDkq3pnPtEbD2CScxc\n\
alJC+EL7RPk5c/tgeTvCngvc1KZn92Y//EI7G9tPZtylj2b56sHtMftIoYJ9+ODM\n\
sccD5Piz/rejE3Ome8EOOceUSCYAhXn8b3qvxVI1ddd1pED6FHRhFvLrZxFvBEM9\n\
ERRMp5QqOaHJkM+Dxv8Cj6MqrCbfC4u+ZErxodzuusgDgvZiLF22uxMZbobFWyte\n\
OvOzKGtwcTqO/1wV5gKkzu1ZVswVUQd5Gg8lJicwqRWyyNRczDDoG9jVDxmogKTH\n\
AaqLulO7R8Ifa1SwF2DteSGVtgWEN8gDpN3RBmmPTDngyF2DHb5qmpnznwtFKdTL\n\
KWbuHn491xNO25CQWMtem80uKw+pTnisBRF/454n1Jnhub144YRBoN8CAQI=\n\
-----END DH PARAMETERS-----\n";
209 210
#endif

B
Bruce Momjian 已提交
211
/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
212
/*			 Procedures common to all secure sessions			*/
B
Bruce Momjian 已提交
213 214
/* ------------------------------------------------------------ */

215 216 217 218 219 220 221 222 223 224 225 226 227

/*
 * Exported (but as yet undocumented) function to allow application to
 * tell us it's already initialized OpenSSL.
 */
void
PQinitSSL(int do_init)
{
#ifdef USE_SSL
	pq_initssllib = do_init;
#endif
}

B
Bruce Momjian 已提交
228 229 230 231
/*
 *	Initialize global context
 */
int
B
Bruce Momjian 已提交
232
pqsecure_initialize(PGconn *conn)
B
Bruce Momjian 已提交
233
{
B
Bruce Momjian 已提交
234
	int			r = 0;
B
Bruce Momjian 已提交
235 236 237 238 239 240 241 242 243 244 245 246

#ifdef USE_SSL
	r = initialize_SSL(conn);
#endif

	return r;
}

/*
 *	Destroy global context
 */
void
B
Bruce Momjian 已提交
247
pqsecure_destroy(void)
B
Bruce Momjian 已提交
248 249 250 251 252 253 254 255 256
{
#ifdef USE_SSL
	destroy_SSL();
#endif
}

/*
 *	Attempt to negotiate secure session.
 */
257
PostgresPollingStatusType
B
Bruce Momjian 已提交
258
pqsecure_open_client(PGconn *conn)
B
Bruce Momjian 已提交
259 260
{
#ifdef USE_SSL
261 262 263 264 265 266 267
	/* First time through? */
	if (conn->ssl == NULL)
	{
		if (!(conn->ssl = SSL_new(SSL_context)) ||
			!SSL_set_app_data(conn->ssl, conn) ||
			!SSL_set_fd(conn->ssl, conn->sock))
		{
B
Bruce Momjian 已提交
268 269
			char	   *err = SSLerrmessage();

270 271
			printfPQExpBuffer(&conn->errorMessage,
			   libpq_gettext("could not establish SSL connection: %s\n"),
272 273
							  err);
			SSLerrfree(err);
274 275 276
			close_SSL(conn);
			return PGRES_POLLING_FAILED;
		}
277 278 279 280 281
		/*
		 * Initialize errorMessage to empty.  This allows open_client_SSL()
		 * to detect whether client_cert_cb() has stored a message.
		 */
		resetPQExpBuffer(&conn->errorMessage);
282 283 284 285 286 287
	}
	/* Begin or continue the actual handshake */
	return open_client_SSL(conn);
#else
	/* shouldn't get here */
	return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
288 289 290 291 292 293 294
#endif
}

/*
 *	Close secure session.
 */
void
B
Bruce Momjian 已提交
295
pqsecure_close(PGconn *conn)
B
Bruce Momjian 已提交
296 297 298 299 300 301 302 303 304 305 306
{
#ifdef USE_SSL
	if (conn->ssl)
		close_SSL(conn);
#endif
}

/*
 *	Read data from a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
307
pqsecure_read(PGconn *conn, void *ptr, size_t len)
B
Bruce Momjian 已提交
308
{
B
Bruce Momjian 已提交
309
	ssize_t		n;
B
Bruce Momjian 已提交
310 311 312 313

#ifdef USE_SSL
	if (conn->ssl)
	{
314 315
		int			err;

B
Bruce Momjian 已提交
316
rloop:
B
Bruce Momjian 已提交
317
		n = SSL_read(conn->ssl, ptr, len);
318 319
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
320
		{
B
Bruce Momjian 已提交
321 322 323
			case SSL_ERROR_NONE:
				break;
			case SSL_ERROR_WANT_READ:
324 325
				n = 0;
				break;
326
			case SSL_ERROR_WANT_WRITE:
B
Bruce Momjian 已提交
327

328
				/*
B
Bruce Momjian 已提交
329 330 331 332 333
				 * Returning 0 here would cause caller to wait for
				 * read-ready, which is not correct since what SSL wants
				 * is wait for write-ready.  The former could get us stuck
				 * in an infinite wait, so don't risk it; busy-loop
				 * instead.
334
				 */
335
				goto rloop;
B
Bruce Momjian 已提交
336
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
337 338 339 340 341
				{
					char		sebuf[256];

					if (n == -1)
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
342
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
343 344
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
345
					{
B
Bruce Momjian 已提交
346 347
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
348

349
						SOCK_ERRNO_SET(ECONNRESET);
350 351
						n = -1;
					}
B
Bruce Momjian 已提交
352 353
					break;
				}
B
Bruce Momjian 已提交
354
			case SSL_ERROR_SSL:
355
				{
B
Bruce Momjian 已提交
356 357
					char	   *err = SSLerrmessage();

358
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
359
								  libpq_gettext("SSL error: %s\n"), err);
360 361
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
362 363
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
364
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
365 366
				n = -1;
				break;
367 368
			default:
				printfPQExpBuffer(&conn->errorMessage,
369 370
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
371
				n = -1;
372
				break;
B
Bruce Momjian 已提交
373 374 375 376
		}
	}
	else
#endif
B
Bruce Momjian 已提交
377
		n = recv(conn->sock, ptr, len, 0);
B
Bruce Momjian 已提交
378 379 380 381 382 383 384 385

	return n;
}

/*
 *	Write data to a secure connection.
 */
ssize_t
B
Bruce Momjian 已提交
386
pqsecure_write(PGconn *conn, const void *ptr, size_t len)
B
Bruce Momjian 已提交
387
{
B
Bruce Momjian 已提交
388
	ssize_t		n;
389
	
390
#ifdef ENABLE_THREAD_SAFETY
391 392
	sigset_t	osigmask;
	bool		sigpipe_pending;
393
	bool		got_epipe = false;
394
	
395 396
	if (pq_block_sigpipe(&osigmask, &sigpipe_pending) < 0)
		return -1;
397
#else
B
Bruce Momjian 已提交
398
#ifndef WIN32
B
Bruce Momjian 已提交
399
	pqsigfunc	oldsighandler = pqsignal(SIGPIPE, SIG_IGN);
B
Bruce Momjian 已提交
400
#endif
401
#endif
B
Bruce Momjian 已提交
402 403 404 405

#ifdef USE_SSL
	if (conn->ssl)
	{
406 407
		int			err;

B
Bruce Momjian 已提交
408
		n = SSL_write(conn->ssl, ptr, len);
409 410
		err = SSL_get_error(conn->ssl, n);
		switch (err)
B
Bruce Momjian 已提交
411
		{
B
Bruce Momjian 已提交
412 413
			case SSL_ERROR_NONE:
				break;
414
			case SSL_ERROR_WANT_READ:
B
Bruce Momjian 已提交
415

416 417 418 419 420 421 422
				/*
				 * Returning 0 here causes caller to wait for write-ready,
				 * which is not really the right thing, but it's the best
				 * we can do.
				 */
				n = 0;
				break;
B
Bruce Momjian 已提交
423
			case SSL_ERROR_WANT_WRITE:
424 425
				n = 0;
				break;
B
Bruce Momjian 已提交
426
			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
427 428
				{
					char		sebuf[256];
429

B
Bruce Momjian 已提交
430
					if (n == -1)
431
					{
432
#ifdef ENABLE_THREAD_SAFETY
433 434
						if (SOCK_ERRNO == EPIPE)
							got_epipe = true;
435
#endif
B
Bruce Momjian 已提交
436
						printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
437
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
438
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
439
					}
B
Bruce Momjian 已提交
440
					else
441
					{
B
Bruce Momjian 已提交
442 443
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
444
						SOCK_ERRNO_SET(ECONNRESET);
445 446
						n = -1;
					}
B
Bruce Momjian 已提交
447 448
					break;
				}
B
Bruce Momjian 已提交
449
			case SSL_ERROR_SSL:
450
				{
B
Bruce Momjian 已提交
451 452
					char	   *err = SSLerrmessage();

453
					printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
454
								  libpq_gettext("SSL error: %s\n"), err);
455 456
					SSLerrfree(err);
				}
B
Bruce Momjian 已提交
457 458
				/* fall through */
			case SSL_ERROR_ZERO_RETURN:
459
				SOCK_ERRNO_SET(ECONNRESET);
B
Bruce Momjian 已提交
460 461
				n = -1;
				break;
462 463
			default:
				printfPQExpBuffer(&conn->errorMessage,
464 465
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
466
				n = -1;
467
				break;
B
Bruce Momjian 已提交
468 469 470 471
		}
	}
	else
#endif
472
	{
B
Bruce Momjian 已提交
473
		n = send(conn->sock, ptr, len, 0);
474 475 476 477 478
#ifdef ENABLE_THREAD_SAFETY
		if (n < 0 && SOCK_ERRNO == EPIPE)
			got_epipe = true;
#endif
	}
B
Bruce Momjian 已提交
479

480
#ifdef ENABLE_THREAD_SAFETY
481
	pq_reset_sigpipe(&osigmask, sigpipe_pending, got_epipe);
482
#else
B
Bruce Momjian 已提交
483 484
#ifndef WIN32
	pqsignal(SIGPIPE, oldsighandler);
485
#endif
B
Bruce Momjian 已提交
486 487 488 489 490 491
#endif

	return n;
}

/* ------------------------------------------------------------ */
B
Bruce Momjian 已提交
492
/*						  SSL specific code						*/
B
Bruce Momjian 已提交
493 494 495 496 497 498 499 500 501 502 503 504 505 506
/* ------------------------------------------------------------ */
#ifdef USE_SSL
/*
 *	Certificate verification callback
 *
 *	This callback allows us to log intermediate problems during
 *	verification, but there doesn't seem to be a clean way to get
 *	our PGconn * structure.  So we can't log anything!
 *
 *	This callback also allows us to override the default acceptance
 *	criteria (e.g., accepting self-signed or expired certs), but
 *	for now we accept the default checks.
 */
static int
B
Bruce Momjian 已提交
507
verify_cb(int ok, X509_STORE_CTX *ctx)
B
Bruce Momjian 已提交
508 509 510 511
{
	return ok;
}

B
Bruce Momjian 已提交
512
#ifdef NOT_USED
B
Bruce Momjian 已提交
513 514 515 516
/*
 *	Verify that common name resolves to peer.
 */
static int
B
Bruce Momjian 已提交
517
verify_peer(PGconn *conn)
B
Bruce Momjian 已提交
518 519 520 521
{
	struct hostent *h = NULL;
	struct sockaddr addr;
	struct sockaddr_in *sin;
B
Bruce Momjian 已提交
522 523
	socklen_t	len;
	char	  **s;
B
Bruce Momjian 已提交
524 525 526 527 528 529
	unsigned long l;

	/* get the address on the other side of the socket */
	len = sizeof(addr);
	if (getpeername(conn->sock, &addr, &len) == -1)
	{
B
Bruce Momjian 已提交
530 531
		char		sebuf[256];

B
Bruce Momjian 已提交
532
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
533
						  libpq_gettext("error querying socket: %s\n"),
B
Bruce Momjian 已提交
534
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
B
Bruce Momjian 已提交
535 536 537 538 539 540 541
		return -1;
	}

	/* weird, but legal case */
	if (addr.sa_family == AF_UNIX)
		return 0;

542 543
	{
		struct hostent hpstr;
544
		char		buf[BUFSIZ];
B
Bruce Momjian 已提交
545
		int			herrno = 0;
B
Bruce Momjian 已提交
546

547
		/*
B
Bruce Momjian 已提交
548 549 550 551
		 * Currently, pqGethostbyname() is used only on platforms that
		 * don't have getaddrinfo().  If you enable this function, you
		 * should convert the pqGethostbyname() function call to use
		 * getaddrinfo().
552
		 */
553
		pqGethostbyname(conn->peer_cn, &hpstr, buf, sizeof(buf),
B
Bruce Momjian 已提交
554
						&h, &herrno);
555
	}
B
Bruce Momjian 已提交
556

B
Bruce Momjian 已提交
557
	/* what do we know about the peer's common name? */
558
	if (h == NULL)
B
Bruce Momjian 已提交
559 560
	{
		printfPQExpBuffer(&conn->errorMessage,
561
		libpq_gettext("could not get information about host \"%s\": %s\n"),
B
Bruce Momjian 已提交
562
						  conn->peer_cn, hstrerror(h_errno));
B
Bruce Momjian 已提交
563 564 565 566 567 568
		return -1;
	}

	/* does the address match? */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
569 570 571 572 573 574 575 576
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			for (s = h->h_addr_list; *s != NULL; s++)
			{
				if (!memcmp(&sin->sin_addr.s_addr, *s, h->h_length))
					return 0;
			}
			break;
B
Bruce Momjian 已提交
577

B
Bruce Momjian 已提交
578 579
		default:
			printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
580
							  libpq_gettext("unsupported protocol\n"));
B
Bruce Momjian 已提交
581
			return -1;
B
Bruce Momjian 已提交
582 583
	}

B
Bruce Momjian 已提交
584 585 586 587
	/*
	 * the prior test should be definitive, but in practice it sometimes
	 * fails.  So we also check the aliases.
	 */
B
Bruce Momjian 已提交
588 589
	for (s = h->h_aliases; *s != NULL; s++)
	{
590
		if (pg_strcasecmp(conn->peer_cn, *s) == 0)
B
Bruce Momjian 已提交
591 592 593 594 595 596
			return 0;
	}

	/* generate protocol-aware error message */
	switch (addr.sa_family)
	{
B
Bruce Momjian 已提交
597 598 599 600 601
		case AF_INET:
			sin = (struct sockaddr_in *) & addr;
			l = ntohl(sin->sin_addr.s_addr);
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
602
											"server common name \"%s\" does not resolve to %ld.%ld.%ld.%ld\n"),
B
Bruce Momjian 已提交
603 604 605 606 607 608
					 conn->peer_cn, (l >> 24) % 0x100, (l >> 16) % 0x100,
							  (l >> 8) % 0x100, l % 0x100);
			break;
		default:
			printfPQExpBuffer(&conn->errorMessage,
							  libpq_gettext(
B
Bruce Momjian 已提交
609
											"server common name \"%s\" does not resolve to peer address\n"),
B
Bruce Momjian 已提交
610
							  conn->peer_cn);
B
Bruce Momjian 已提交
611 612 613 614
	}

	return -1;
}
B
Bruce Momjian 已提交
615
#endif
B
Bruce Momjian 已提交
616

617 618 619 620
/*
 *	Load precomputed DH parameters.
 *
 *	To prevent "downgrade" attacks, we perform a number of checks
B
Bruce Momjian 已提交
621
 *	to verify that the DBA-generated DH parameters file contains
622 623
 *	what we expect it to contain.
 */
B
Bruce Momjian 已提交
624 625
static DH  *
load_dh_file(int keylength)
626
{
627
#ifdef WIN32
B
Bruce Momjian 已提交
628
	return NULL;
629
#else
630
	char		pwdbuf[BUFSIZ];
631 632
	struct passwd pwdstr;
	struct passwd *pwd = NULL;
B
Bruce Momjian 已提交
633
	FILE	   *fp;
634
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
635 636
	DH		   *dh = NULL;
	int			codes;
637

638
	if (pqGetpwuid(getuid(), &pwdstr, pwdbuf, sizeof(pwdbuf), &pwd) != 0)
B
Bruce Momjian 已提交
639
		return NULL;
640 641

	/* attempt to open file.  It's not an error if it doesn't exist. */
642
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/dh%d.pem",
B
Bruce Momjian 已提交
643
			 pwd->pw_dir, keylength);
644

645 646 647 648 649 650 651 652 653
	if ((fp = fopen(fnbuf, "r")) == NULL)
		return NULL;

/*	flock(fileno(fp), LOCK_SH); */
	dh = PEM_read_DHparams(fp, NULL, NULL, NULL);
/*	flock(fileno(fp), LOCK_UN); */
	fclose(fp);

	/* is the prime the correct size? */
B
Bruce Momjian 已提交
654
	if (dh != NULL && 8 * DH_size(dh) < keylength)
655 656 657 658 659 660 661 662 663
		dh = NULL;

	/* make sure the DH parameters are usable */
	if (dh != NULL)
	{
		if (DH_check(dh, &codes))
			return NULL;
		if (codes & DH_CHECK_P_NOT_PRIME)
			return NULL;
B
Bruce Momjian 已提交
664
		if ((codes & DH_NOT_SUITABLE_GENERATOR) &&
665 666 667 668 669
			(codes & DH_CHECK_P_NOT_SAFE_PRIME))
			return NULL;
	}

	return dh;
670
#endif
671 672 673 674 675 676 677 678
}

/*
 *	Load hardcoded DH parameters.
 *
 *	To prevent problems if the DH parameters files don't even
 *	exist, we can load DH parameters hardcoded into this file.
 */
B
Bruce Momjian 已提交
679 680
static DH  *
load_dh_buffer(const char *buffer, size_t len)
681
{
B
Bruce Momjian 已提交
682 683
	BIO		   *bio;
	DH		   *dh = NULL;
684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706

	bio = BIO_new_mem_buf((char *) buffer, len);
	if (bio == NULL)
		return NULL;
	dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
	BIO_free(bio);

	return dh;
}

/*
 *	Generate an empheral DH key.  Because this can take a long
 *	time to compute, we can use precomputed parameters of the
 *	common key sizes.
 *
 *	Since few sites will bother to precompute these parameter
 *	files, we also provide a fallback to the parameters provided
 *	by the OpenSSL project.
 *
 *	These values can be static (once loaded or computed) since
 *	the OpenSSL library can efficiently generate random keys from
 *	the information provided.
 */
B
Bruce Momjian 已提交
707 708
static DH  *
tmp_dh_cb(SSL *s, int is_export, int keylength)
709
{
B
Bruce Momjian 已提交
710 711 712 713 714 715
	DH		   *r = NULL;
	static DH  *dh = NULL;
	static DH  *dh512 = NULL;
	static DH  *dh1024 = NULL;
	static DH  *dh2048 = NULL;
	static DH  *dh4096 = NULL;
716 717 718

	switch (keylength)
	{
B
Bruce Momjian 已提交
719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754
		case 512:
			if (dh512 == NULL)
				dh512 = load_dh_file(keylength);
			if (dh512 == NULL)
				dh512 = load_dh_buffer(file_dh512, sizeof file_dh512);
			r = dh512;
			break;

		case 1024:
			if (dh1024 == NULL)
				dh1024 = load_dh_file(keylength);
			if (dh1024 == NULL)
				dh1024 = load_dh_buffer(file_dh1024, sizeof file_dh1024);
			r = dh1024;
			break;

		case 2048:
			if (dh2048 == NULL)
				dh2048 = load_dh_file(keylength);
			if (dh2048 == NULL)
				dh2048 = load_dh_buffer(file_dh2048, sizeof file_dh2048);
			r = dh2048;
			break;

		case 4096:
			if (dh4096 == NULL)
				dh4096 = load_dh_file(keylength);
			if (dh4096 == NULL)
				dh4096 = load_dh_buffer(file_dh4096, sizeof file_dh4096);
			r = dh4096;
			break;

		default:
			if (dh == NULL)
				dh = load_dh_file(keylength);
			r = dh;
755 756 757
	}

	/* this may take a long time, but it may be necessary... */
B
Bruce Momjian 已提交
758
	if (r == NULL || 8 * DH_size(r) < keylength)
759
		r = DH_generate_parameters(keylength, DH_GENERATOR_2, NULL, NULL);
B
Bruce Momjian 已提交
760

761 762 763
	return r;
}

764 765 766 767 768
/*
 *	Callback used by SSL to load client cert and key.
 *	This callback is only called when the server wants a
 *	client cert.
 *
769
 *	Must return 1 on success, 0 on no data or error.
770 771
 */
static int
B
Bruce Momjian 已提交
772
client_cert_cb(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
773
{
774
#ifdef WIN32
B
Bruce Momjian 已提交
775
	return 0;
776
#else
777
	char		pwdbuf[BUFSIZ];
778 779
	struct passwd pwdstr;
	struct passwd *pwd = NULL;
B
Bruce Momjian 已提交
780 781
	struct stat buf,
				buf2;
782
	char		fnbuf[MAXPGPATH];
B
Bruce Momjian 已提交
783 784 785
	FILE	   *fp;
	PGconn	   *conn = (PGconn *) SSL_get_app_data(ssl);
	int			(*cb) () = NULL;	/* how to read user password */
B
Bruce Momjian 已提交
786
	char		sebuf[256];
787

788
	if (pqGetpwuid(getuid(), &pwdstr, pwdbuf, sizeof(pwdbuf), &pwd) != 0)
789
	{
B
Bruce Momjian 已提交
790
		printfPQExpBuffer(&conn->errorMessage,
791
					  libpq_gettext("could not get user information\n"));
792
		return 0;
793 794 795
	}

	/* read the user certificate */
796
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/postgresql.crt",
B
Bruce Momjian 已提交
797
			 pwd->pw_dir);
798 799
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
800
		printfPQExpBuffer(&conn->errorMessage,
801
				  libpq_gettext("could not open certificate file \"%s\": %s\n"),
802
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
803
		return 0;
804 805 806
	}
	if (PEM_read_X509(fp, x509, NULL, NULL) == NULL)
	{
B
Bruce Momjian 已提交
807 808
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
809
		printfPQExpBuffer(&conn->errorMessage,
810
				  libpq_gettext("could not read certificate file \"%s\": %s\n"),
811 812
						  fnbuf, err);
		SSLerrfree(err);
813
		fclose(fp);
814
		return 0;
815 816 817 818
	}
	fclose(fp);

	/* read the user key */
819
	snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/postgresql.key",
B
Bruce Momjian 已提交
820
			 pwd->pw_dir);
821 822
	if (stat(fnbuf, &buf) == -1)
	{
B
Bruce Momjian 已提交
823
		printfPQExpBuffer(&conn->errorMessage,
824
		libpq_gettext("certificate present, but not private key file \"%s\"\n"),
B
Bruce Momjian 已提交
825
						  fnbuf);
826 827 828 829 830
		return 0;
	}
	if (!S_ISREG(buf.st_mode) || (buf.st_mode & 0077) ||
		buf.st_uid != getuid())
	{
B
Bruce Momjian 已提交
831
		printfPQExpBuffer(&conn->errorMessage,
832 833 834
		libpq_gettext("private key file \"%s\" has wrong permissions\n"),
						  fnbuf);
		return 0;
835 836 837
	}
	if ((fp = fopen(fnbuf, "r")) == NULL)
	{
B
Bruce Momjian 已提交
838
		printfPQExpBuffer(&conn->errorMessage,
839
			 libpq_gettext("could not open private key file \"%s\": %s\n"),
840
						  fnbuf, pqStrerror(errno, sebuf, sizeof(sebuf)));
841
		return 0;
842 843 844 845
	}
	if (fstat(fileno(fp), &buf2) == -1 ||
		buf.st_dev != buf2.st_dev || buf.st_ino != buf2.st_ino)
	{
B
Bruce Momjian 已提交
846
		printfPQExpBuffer(&conn->errorMessage,
847 848
						  libpq_gettext("private key file \"%s\" changed during execution\n"), fnbuf);
		return 0;
849 850 851
	}
	if (PEM_read_PrivateKey(fp, pkey, cb, NULL) == NULL)
	{
B
Bruce Momjian 已提交
852 853
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
854
		printfPQExpBuffer(&conn->errorMessage,
855
				  libpq_gettext("could not read private key file \"%s\": %s\n"),
856 857
						  fnbuf, err);
		SSLerrfree(err);
858
		fclose(fp);
859
		return 0;
860 861 862
	}
	fclose(fp);

863 864 865
	/* verify that the cert and key go together */
	if (!X509_check_private_key(*x509, *pkey))
	{
B
Bruce Momjian 已提交
866 867
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
868
		printfPQExpBuffer(&conn->errorMessage,
869
			libpq_gettext("certificate does not match private key file \"%s\": %s\n"),
870 871
						  fnbuf, err);
		SSLerrfree(err);
872
		return 0;
873 874
	}

875
	return 1;
876
#endif
877 878
}

879 880 881 882 883
#ifdef ENABLE_THREAD_SAFETY

static unsigned long
pq_threadidcallback(void)
{
B
Bruce Momjian 已提交
884
	return (unsigned long) pthread_self();
885 886 887 888 889 890
}

static pthread_mutex_t *pq_lockarray;
static void
pq_lockingcallback(int mode, int n, const char *file, int line)
{
B
Bruce Momjian 已提交
891
	if (mode & CRYPTO_LOCK)
892
		pthread_mutex_lock(&pq_lockarray[n]);
B
Bruce Momjian 已提交
893
	else
894 895
		pthread_mutex_unlock(&pq_lockarray[n]);
}
B
Bruce Momjian 已提交
896
#endif   /* ENABLE_THREAD_SAFETY */
897 898 899 900 901

static int
init_ssl_system(PGconn *conn)
{
#ifdef ENABLE_THREAD_SAFETY
902
#ifndef WIN32
B
Bruce Momjian 已提交
903 904
	static pthread_mutex_t init_mutex = PTHREAD_MUTEX_INITIALIZER;

905
#else
906 907 908
	static pthread_mutex_t init_mutex = NULL;
	static long mutex_initlock = 0;

B
Bruce Momjian 已提交
909 910 911 912
	if (init_mutex == NULL)
	{
		while (InterlockedExchange(&mutex_initlock, 1) == 1)
			 /* loop, another thread own the lock */ ;
913 914
		if (init_mutex == NULL)
			pthread_mutex_init(&init_mutex, NULL);
B
Bruce Momjian 已提交
915
		InterlockedExchange(&mutex_initlock, 0);
916
	}
917
#endif
918
	pthread_mutex_lock(&init_mutex);
B
Bruce Momjian 已提交
919 920 921 922 923

	if (pq_initssllib && pq_lockarray == NULL)
	{
		int			i;

924 925
		CRYPTO_set_id_callback(pq_threadidcallback);

B
Bruce Momjian 已提交
926 927 928
		pq_lockarray = malloc(sizeof(pthread_mutex_t) * CRYPTO_num_locks());
		if (!pq_lockarray)
		{
929 930 931
			pthread_mutex_unlock(&init_mutex);
			return -1;
		}
B
Bruce Momjian 已提交
932
		for (i = 0; i < CRYPTO_num_locks(); i++)
933 934 935 936 937 938 939
			pthread_mutex_init(&pq_lockarray[i], NULL);

		CRYPTO_set_locking_callback(pq_lockingcallback);
	}
#endif
	if (!SSL_context)
	{
B
Bruce Momjian 已提交
940 941
		if (pq_initssllib)
		{
942 943 944 945 946 947
			SSL_library_init();
			SSL_load_error_strings();
		}
		SSL_context = SSL_CTX_new(TLSv1_method());
		if (!SSL_context)
		{
B
Bruce Momjian 已提交
948 949
			char	   *err = SSLerrmessage();

950 951 952 953 954 955 956 957 958 959 960 961 962 963 964
			printfPQExpBuffer(&conn->errorMessage,
					 libpq_gettext("could not create SSL context: %s\n"),
							  err);
			SSLerrfree(err);
#ifdef ENABLE_THREAD_SAFETY
			pthread_mutex_unlock(&init_mutex);
#endif
			return -1;
		}
	}
#ifdef ENABLE_THREAD_SAFETY
	pthread_mutex_unlock(&init_mutex);
#endif
	return 0;
}
B
Bruce Momjian 已提交
965

B
Bruce Momjian 已提交
966 967 968 969
/*
 *	Initialize global SSL context.
 */
static int
B
Bruce Momjian 已提交
970
initialize_SSL(PGconn *conn)
B
Bruce Momjian 已提交
971
{
972
#ifndef WIN32
B
Bruce Momjian 已提交
973
	struct stat buf;
974
	char		pwdbuf[BUFSIZ];
975 976
	struct passwd pwdstr;
	struct passwd *pwd = NULL;
977
	char		fnbuf[MAXPGPATH];
978
#endif
B
Bruce Momjian 已提交
979

B
Bruce Momjian 已提交
980
	if (init_ssl_system(conn))
981
		return -1;
B
Bruce Momjian 已提交
982

983
#ifndef WIN32
984
	/* Set up to verify server cert, if root.crt is present */
B
Bruce Momjian 已提交
985
	if (pqGetpwuid(getuid(), &pwdstr, pwdbuf, sizeof(pwdbuf), &pwd) == 0)
B
Bruce Momjian 已提交
986
	{
987
		snprintf(fnbuf, sizeof(fnbuf), "%s/.postgresql/root.crt",
B
Bruce Momjian 已提交
988
				 pwd->pw_dir);
989
		if (stat(fnbuf, &buf) == 0)
B
Bruce Momjian 已提交
990
		{
991 992 993
			if (!SSL_CTX_load_verify_locations(SSL_context, fnbuf, NULL))
			{
				char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
994

995 996 997 998 999 1000
				printfPQExpBuffer(&conn->errorMessage,
								  libpq_gettext("could not read root certificate file \"%s\": %s\n"),
								  fnbuf, err);
				SSLerrfree(err);
				return -1;
			}
B
Bruce Momjian 已提交
1001

1002
			SSL_CTX_set_verify(SSL_context, SSL_VERIFY_PEER, verify_cb);
B
Bruce Momjian 已提交
1003 1004 1005
		}
	}

1006 1007 1008 1009
	/* set up empheral DH keys */
	SSL_CTX_set_tmp_dh_callback(SSL_context, tmp_dh_cb);
	SSL_CTX_set_options(SSL_context, SSL_OP_SINGLE_DH_USE);

1010 1011
	/* set up mechanism to provide client certificate, if available */
	SSL_CTX_set_client_cert_cb(SSL_context, client_cert_cb);
1012
#endif
1013

B
Bruce Momjian 已提交
1014 1015 1016 1017 1018 1019 1020
	return 0;
}

/*
 *	Destroy global SSL context.
 */
static void
B
Bruce Momjian 已提交
1021
destroy_SSL(void)
B
Bruce Momjian 已提交
1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032
{
	if (SSL_context)
	{
		SSL_CTX_free(SSL_context);
		SSL_context = NULL;
	}
}

/*
 *	Attempt to negotiate SSL connection.
 */
1033
static PostgresPollingStatusType
B
Bruce Momjian 已提交
1034
open_client_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1035
{
B
Bruce Momjian 已提交
1036
	int			r;
B
Bruce Momjian 已提交
1037

1038 1039
	r = SSL_connect(conn->ssl);
	if (r <= 0)
B
Bruce Momjian 已提交
1040
	{
1041
		int err = SSL_get_error(conn->ssl, r);
1042

1043
		switch (err)
1044 1045 1046
		{
			case SSL_ERROR_WANT_READ:
				return PGRES_POLLING_READING;
B
Bruce Momjian 已提交
1047

1048 1049 1050 1051
			case SSL_ERROR_WANT_WRITE:
				return PGRES_POLLING_WRITING;

			case SSL_ERROR_SYSCALL:
B
Bruce Momjian 已提交
1052 1053 1054 1055 1056
				{
					char		sebuf[256];

					if (r == -1)
						printfPQExpBuffer(&conn->errorMessage,
1057
								libpq_gettext("SSL SYSCALL error: %s\n"),
B
Bruce Momjian 已提交
1058 1059 1060 1061 1062 1063 1064
						SOCK_STRERROR(SOCK_ERRNO, sebuf, sizeof(sebuf)));
					else
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL SYSCALL error: EOF detected\n"));
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1065
			case SSL_ERROR_SSL:
1066
				{
1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077
					/*
					 * If there are problems with the local certificate files,
					 * these will be detected by client_cert_cb() which is
					 * called from SSL_connect().  We want to return that
					 * error message and not the rather unhelpful error that
					 * OpenSSL itself returns.  So check to see if an error
					 * message was already stored.
					 */
					if (conn->errorMessage.len == 0)
					{
						char	   *err = SSLerrmessage();
B
Bruce Momjian 已提交
1078

1079 1080 1081 1082 1083
						printfPQExpBuffer(&conn->errorMessage,
										  libpq_gettext("SSL error: %s\n"),
										  err);
						SSLerrfree(err);
					}
1084 1085 1086
					close_SSL(conn);
					return PGRES_POLLING_FAILED;
				}
1087 1088 1089

			default:
				printfPQExpBuffer(&conn->errorMessage,
1090 1091
						 libpq_gettext("unrecognized SSL error code: %d\n"),
								  err);
1092 1093 1094
				close_SSL(conn);
				return PGRES_POLLING_FAILED;
		}
B
Bruce Momjian 已提交
1095 1096 1097
	}

	/* check the certificate chain of the server */
B
Bruce Momjian 已提交
1098

1099 1100
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1101

B
Bruce Momjian 已提交
1102 1103 1104 1105
	/*
	 * this eliminates simple man-in-the-middle attacks and simple
	 * impersonations
	 */
B
Bruce Momjian 已提交
1106 1107 1108 1109
	r = SSL_get_verify_result(conn->ssl);
	if (r != X509_V_OK)
	{
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1110 1111
			   libpq_gettext("certificate could not be validated: %s\n"),
						  X509_verify_cert_error_string(r));
B
Bruce Momjian 已提交
1112
		close_SSL(conn);
1113
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1114
	}
1115
#endif
B
Bruce Momjian 已提交
1116 1117 1118 1119 1120

	/* pull out server distinguished and common names */
	conn->peer = SSL_get_peer_certificate(conn->ssl);
	if (conn->peer == NULL)
	{
B
Bruce Momjian 已提交
1121 1122
		char	   *err = SSLerrmessage();

B
Bruce Momjian 已提交
1123
		printfPQExpBuffer(&conn->errorMessage,
B
Bruce Momjian 已提交
1124
				libpq_gettext("certificate could not be obtained: %s\n"),
1125 1126
						  err);
		SSLerrfree(err);
B
Bruce Momjian 已提交
1127
		close_SSL(conn);
1128
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1129 1130 1131
	}

	X509_NAME_oneline(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1132 1133
					  conn->peer_dn, sizeof(conn->peer_dn));
	conn->peer_dn[sizeof(conn->peer_dn) - 1] = '\0';
B
Bruce Momjian 已提交
1134 1135

	X509_NAME_get_text_by_NID(X509_get_subject_name(conn->peer),
B
Bruce Momjian 已提交
1136
							  NID_commonName, conn->peer_cn, SM_USER);
B
Bruce Momjian 已提交
1137 1138 1139
	conn->peer_cn[SM_USER] = '\0';

	/* verify that the common name resolves to peer */
B
Bruce Momjian 已提交
1140

1141 1142
#ifdef NOT_USED
	/* CLIENT CERTIFICATES NOT REQUIRED  bjm 2002-09-26 */
B
Bruce Momjian 已提交
1143

B
Bruce Momjian 已提交
1144 1145 1146 1147 1148
	/*
	 * this is necessary to eliminate man-in-the-middle attacks and
	 * impersonations where the attacker somehow learned the server's
	 * private key
	 */
B
Bruce Momjian 已提交
1149 1150 1151
	if (verify_peer(conn) == -1)
	{
		close_SSL(conn);
1152
		return PGRES_POLLING_FAILED;
B
Bruce Momjian 已提交
1153
	}
1154
#endif
B
Bruce Momjian 已提交
1155

1156 1157
	/* SSL handshake is complete */
	return PGRES_POLLING_OK;
B
Bruce Momjian 已提交
1158 1159 1160 1161 1162 1163
}

/*
 *	Close SSL connection.
 */
static void
B
Bruce Momjian 已提交
1164
close_SSL(PGconn *conn)
B
Bruce Momjian 已提交
1165 1166 1167 1168 1169 1170 1171
{
	if (conn->ssl)
	{
		SSL_shutdown(conn->ssl);
		SSL_free(conn->ssl);
		conn->ssl = NULL;
	}
1172 1173 1174 1175 1176 1177

	if (conn->peer)
	{
		X509_free(conn->peer);
		conn->peer = NULL;
	}
B
Bruce Momjian 已提交
1178 1179 1180 1181 1182 1183 1184 1185 1186
}

/*
 * Obtain reason string for last SSL error
 *
 * Some caution is needed here since ERR_reason_error_string will
 * return NULL if it doesn't recognize the error code.  We don't
 * want to return NULL ever.
 */
1187
static char ssl_nomem[] = "Out of memory allocating error description";
B
Bruce Momjian 已提交
1188 1189

#define SSL_ERR_LEN 128
1190 1191

static char *
B
Bruce Momjian 已提交
1192 1193
SSLerrmessage(void)
{
B
Bruce Momjian 已提交
1194 1195
	unsigned long errcode;
	const char *errreason;
B
Bruce Momjian 已提交
1196
	char	   *errbuf;
B
Bruce Momjian 已提交
1197

1198 1199 1200
	errbuf = malloc(SSL_ERR_LEN);
	if (!errbuf)
		return ssl_nomem;
B
Bruce Momjian 已提交
1201
	errcode = ERR_get_error();
B
Bruce Momjian 已提交
1202 1203
	if (errcode == 0)
	{
1204 1205 1206
		strcpy(errbuf, "No SSL error reported");
		return errbuf;
	}
B
Bruce Momjian 已提交
1207
	errreason = ERR_reason_error_string(errcode);
B
Bruce Momjian 已提交
1208 1209 1210 1211
	if (errreason != NULL)
	{
		strncpy(errbuf, errreason, SSL_ERR_LEN - 1);
		errbuf[SSL_ERR_LEN - 1] = '\0';
1212 1213 1214
		return errbuf;
	}
	snprintf(errbuf, SSL_ERR_LEN, "SSL error code %lu", errcode);
B
Bruce Momjian 已提交
1215 1216 1217
	return errbuf;
}

1218 1219 1220 1221 1222 1223
static void
SSLerrfree(char *buf)
{
	if (buf != ssl_nomem)
		free(buf);
}
B
Bruce Momjian 已提交
1224

B
Bruce Momjian 已提交
1225 1226 1227 1228 1229 1230 1231 1232 1233 1234
/*
 *	Return pointer to SSL object.
 */
SSL *
PQgetssl(PGconn *conn)
{
	if (!conn)
		return NULL;
	return conn->ssl;
}
1235 1236 1237 1238 1239 1240
#else
void *
PQgetssl(PGconn *conn)
{
	return NULL;
}
B
Bruce Momjian 已提交
1241
#endif   /* USE_SSL */
1242 1243 1244

#ifdef ENABLE_THREAD_SAFETY
/*
1245 1246
 *	Block SIGPIPE for this thread.  This prevents send()/write() from exiting
 *	the application.
1247
 */
1248 1249
int
pq_block_sigpipe(sigset_t *osigset, bool *sigpipe_pending)
1250
{
1251 1252 1253 1254 1255 1256 1257
	sigset_t sigpipe_sigset;
	sigset_t sigset;
	
	sigemptyset(&sigpipe_sigset);
	sigaddset(&sigpipe_sigset, SIGPIPE);

	/* Block SIGPIPE and save previous mask for later reset */
1258 1259 1260
	SOCK_ERRNO_SET(pthread_sigmask(SIG_BLOCK, &sigpipe_sigset, osigset));
	if (SOCK_ERRNO)
		return -1;
1261 1262 1263

	/* We can have a pending SIGPIPE only if it was blocked before */
	if (sigismember(osigset, SIGPIPE))
1264
	{
1265 1266 1267 1268 1269 1270
		/* Is there a pending SIGPIPE? */
		if (sigpending(&sigset) != 0)
			return -1;
	
		if (sigismember(&sigset, SIGPIPE))
			*sigpipe_pending = true;
1271
		else
1272
			*sigpipe_pending = false;
1273
	}
1274 1275 1276
	else
		*sigpipe_pending = false;
	
1277
	return 0;
1278
}
1279
	
1280
/*
1281
 *	Discard any pending SIGPIPE and reset the signal mask.
1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296
 *
 * Note: we are effectively assuming here that the C library doesn't queue
 * up multiple SIGPIPE events.  If it did, then we'd accidentally leave
 * ours in the queue when an event was already pending and we got another.
 * As long as it doesn't queue multiple events, we're OK because the caller
 * can't tell the difference.
 *
 * The caller should say got_epipe = FALSE if it is certain that it
 * didn't get an EPIPE error; in that case we'll skip the clear operation
 * and things are definitely OK, queuing or no.  If it got one or might have
 * gotten one, pass got_epipe = TRUE.
 *
 * We do not want this to change errno, since if it did that could lose
 * the error code from a preceding send().  We essentially assume that if
 * we were able to do pq_block_sigpipe(), this can't fail.
1297
 */
1298 1299
void
pq_reset_sigpipe(sigset_t *osigset, bool sigpipe_pending, bool got_epipe)
1300
{
1301
	int	save_errno = SOCK_ERRNO;
1302 1303
	int	signo;
	sigset_t sigset;
B
Bruce Momjian 已提交
1304

1305
	/* Clear SIGPIPE only if none was pending */
1306
	if (got_epipe && !sigpipe_pending)
1307
	{
1308 1309
		if (sigpending(&sigset) == 0 &&
			sigismember(&sigset, SIGPIPE))
1310 1311 1312 1313 1314
		{
			sigset_t sigpipe_sigset;
			
			sigemptyset(&sigpipe_sigset);
			sigaddset(&sigpipe_sigset, SIGPIPE);
1315

1316 1317 1318 1319 1320
			sigwait(&sigpipe_sigset, &signo);
		}
	}
	
	/* Restore saved block mask */
1321 1322 1323
	pthread_sigmask(SIG_SETMASK, osigset, NULL);

	SOCK_ERRNO_SET(save_errno);
1324
}
1325
#endif