Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125,
for security reasons. It now doesn't match multiple wildcards nor wildcards inside IDN fragments.
This commit is contained in:
parent
ca580f4ec1
commit
72c98d3a76
|
@ -283,10 +283,10 @@ Certificate handling
|
||||||
Verify that *cert* (in decoded format as returned by
|
Verify that *cert* (in decoded format as returned by
|
||||||
:meth:`SSLSocket.getpeercert`) matches the given *hostname*. The rules
|
:meth:`SSLSocket.getpeercert`) matches the given *hostname*. The rules
|
||||||
applied are those for checking the identity of HTTPS servers as outlined
|
applied are those for checking the identity of HTTPS servers as outlined
|
||||||
in :rfc:`2818`, except that IP addresses are not currently supported.
|
in :rfc:`2818` and :rfc:`6125`, except that IP addresses are not currently
|
||||||
In addition to HTTPS, this function should be suitable for checking the
|
supported. In addition to HTTPS, this function should be suitable for
|
||||||
identity of servers in various SSL-based protocols such as FTPS, IMAPS,
|
checking the identity of servers in various SSL-based protocols such as
|
||||||
POPS and others.
|
FTPS, IMAPS, POPS and others.
|
||||||
|
|
||||||
:exc:`CertificateError` is raised on failure. On success, the function
|
:exc:`CertificateError` is raised on failure. On success, the function
|
||||||
returns nothing::
|
returns nothing::
|
||||||
|
@ -301,6 +301,13 @@ Certificate handling
|
||||||
|
|
||||||
.. versionadded:: 3.2
|
.. versionadded:: 3.2
|
||||||
|
|
||||||
|
.. versionchanged:: 3.3.3
|
||||||
|
The function now follows :rfc:`6125`, section 6.4.3 and does neither
|
||||||
|
match multiple wildcards (e.g. ``*.*.com`` or ``*a*.example.org``) nor
|
||||||
|
a wildcard inside an internationalized domain names (IDN) fragment.
|
||||||
|
IDN A-labels such as ``www*.xn--pthon-kva.org`` are still supported,
|
||||||
|
but ``x*.python.org`` no longer matches ``xn--tda.python.org``.
|
||||||
|
|
||||||
.. function:: cert_time_to_seconds(timestring)
|
.. function:: cert_time_to_seconds(timestring)
|
||||||
|
|
||||||
Returns a floating-point value containing a normal seconds-after-the-epoch
|
Returns a floating-point value containing a normal seconds-after-the-epoch
|
||||||
|
|
72
Lib/ssl.py
72
Lib/ssl.py
|
@ -129,31 +129,59 @@ class CertificateError(ValueError):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
def _dnsname_to_pat(dn, max_wildcards=1):
|
def _dnsname_match(dn, hostname, max_wildcards=1):
|
||||||
|
"""Matching according to RFC 6125, section 6.4.3
|
||||||
|
|
||||||
|
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
||||||
|
"""
|
||||||
pats = []
|
pats = []
|
||||||
for frag in dn.split(r'.'):
|
if not dn:
|
||||||
if frag.count('*') > max_wildcards:
|
return False
|
||||||
# Issue #17980: avoid denials of service by refusing more
|
|
||||||
# than one wildcard per fragment. A survey of established
|
leftmost, *remainder = dn.split(r'.')
|
||||||
# policy among SSL implementations showed it to be a
|
|
||||||
# reasonable choice.
|
wildcards = leftmost.count('*')
|
||||||
raise CertificateError(
|
if wildcards > max_wildcards:
|
||||||
"too many wildcards in certificate DNS name: " + repr(dn))
|
# Issue #17980: avoid denials of service by refusing more
|
||||||
if frag == '*':
|
# than one wildcard per fragment. A survery of established
|
||||||
# When '*' is a fragment by itself, it matches a non-empty dotless
|
# policy among SSL implementations showed it to be a
|
||||||
# fragment.
|
# reasonable choice.
|
||||||
pats.append('[^.]+')
|
raise CertificateError(
|
||||||
else:
|
"too many wildcards in certificate DNS name: " + repr(dn))
|
||||||
# Otherwise, '*' matches any dotless fragment.
|
|
||||||
frag = re.escape(frag)
|
# speed up common case w/o wildcards
|
||||||
pats.append(frag.replace(r'\*', '[^.]*'))
|
if not wildcards:
|
||||||
return re.compile(r'\A' + r'\.'.join(pats) + r'\Z', re.IGNORECASE)
|
return dn.lower() == hostname.lower()
|
||||||
|
|
||||||
|
# RFC 6125, section 6.4.3, subitem 1.
|
||||||
|
# The client SHOULD NOT attempt to match a presented identifier in which
|
||||||
|
# the wildcard character comprises a label other than the left-most label.
|
||||||
|
if leftmost == '*':
|
||||||
|
# When '*' is a fragment by itself, it matches a non-empty dotless
|
||||||
|
# fragment.
|
||||||
|
pats.append('[^.]+')
|
||||||
|
elif leftmost.startswith('xn--') or hostname.startswith('xn--'):
|
||||||
|
# RFC 6125, section 6.4.3, subitem 3.
|
||||||
|
# The client SHOULD NOT attempt to match a presented identifier
|
||||||
|
# where the wildcard character is embedded within an A-label or
|
||||||
|
# U-label of an internationalized domain name.
|
||||||
|
pats.append(re.escape(leftmost))
|
||||||
|
else:
|
||||||
|
# Otherwise, '*' matches any dotless string, e.g. www*
|
||||||
|
pats.append(re.escape(leftmost).replace(r'\*', '[^.]*'))
|
||||||
|
|
||||||
|
# add the remaining fragments, ignore any wildcards
|
||||||
|
for frag in remainder:
|
||||||
|
pats.append(re.escape(frag))
|
||||||
|
|
||||||
|
pat = re.compile(r'\A' + r'\.'.join(pats) + r'\Z', re.IGNORECASE)
|
||||||
|
return pat.match(hostname)
|
||||||
|
|
||||||
|
|
||||||
def match_hostname(cert, hostname):
|
def match_hostname(cert, hostname):
|
||||||
"""Verify that *cert* (in decoded format as returned by
|
"""Verify that *cert* (in decoded format as returned by
|
||||||
SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 rules
|
SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125
|
||||||
are mostly followed, but IP addresses are not accepted for *hostname*.
|
rules are followed, but IP addresses are not accepted for *hostname*.
|
||||||
|
|
||||||
CertificateError is raised on failure. On success, the function
|
CertificateError is raised on failure. On success, the function
|
||||||
returns nothing.
|
returns nothing.
|
||||||
|
@ -164,7 +192,7 @@ def match_hostname(cert, hostname):
|
||||||
san = cert.get('subjectAltName', ())
|
san = cert.get('subjectAltName', ())
|
||||||
for key, value in san:
|
for key, value in san:
|
||||||
if key == 'DNS':
|
if key == 'DNS':
|
||||||
if _dnsname_to_pat(value).match(hostname):
|
if _dnsname_match(value, hostname):
|
||||||
return
|
return
|
||||||
dnsnames.append(value)
|
dnsnames.append(value)
|
||||||
if not dnsnames:
|
if not dnsnames:
|
||||||
|
@ -175,7 +203,7 @@ def match_hostname(cert, hostname):
|
||||||
# XXX according to RFC 2818, the most specific Common Name
|
# XXX according to RFC 2818, the most specific Common Name
|
||||||
# must be used.
|
# must be used.
|
||||||
if key == 'commonName':
|
if key == 'commonName':
|
||||||
if _dnsname_to_pat(value).match(hostname):
|
if _dnsname_match(value, hostname):
|
||||||
return
|
return
|
||||||
dnsnames.append(value)
|
dnsnames.append(value)
|
||||||
if len(dnsnames) > 1:
|
if len(dnsnames) > 1:
|
||||||
|
|
|
@ -344,11 +344,7 @@ class BasicSocketTests(unittest.TestCase):
|
||||||
fail(cert, 'Xa.com')
|
fail(cert, 'Xa.com')
|
||||||
fail(cert, '.a.com')
|
fail(cert, '.a.com')
|
||||||
|
|
||||||
cert = {'subject': ((('commonName', 'a.*.com'),),)}
|
# only match one left-most wildcard
|
||||||
ok(cert, 'a.foo.com')
|
|
||||||
fail(cert, 'a..com')
|
|
||||||
fail(cert, 'a.com')
|
|
||||||
|
|
||||||
cert = {'subject': ((('commonName', 'f*.com'),),)}
|
cert = {'subject': ((('commonName', 'f*.com'),),)}
|
||||||
ok(cert, 'foo.com')
|
ok(cert, 'foo.com')
|
||||||
ok(cert, 'f.com')
|
ok(cert, 'f.com')
|
||||||
|
@ -363,6 +359,36 @@ class BasicSocketTests(unittest.TestCase):
|
||||||
fail(cert, 'example.org')
|
fail(cert, 'example.org')
|
||||||
fail(cert, 'null.python.org')
|
fail(cert, 'null.python.org')
|
||||||
|
|
||||||
|
# error cases with wildcards
|
||||||
|
cert = {'subject': ((('commonName', '*.*.a.com'),),)}
|
||||||
|
fail(cert, 'bar.foo.a.com')
|
||||||
|
fail(cert, 'a.com')
|
||||||
|
fail(cert, 'Xa.com')
|
||||||
|
fail(cert, '.a.com')
|
||||||
|
|
||||||
|
cert = {'subject': ((('commonName', 'a.*.com'),),)}
|
||||||
|
fail(cert, 'a.foo.com')
|
||||||
|
fail(cert, 'a..com')
|
||||||
|
fail(cert, 'a.com')
|
||||||
|
|
||||||
|
# wildcard doesn't match IDNA prefix 'xn--'
|
||||||
|
idna = 'püthon.python.org'.encode("idna").decode("ascii")
|
||||||
|
cert = {'subject': ((('commonName', idna),),)}
|
||||||
|
ok(cert, idna)
|
||||||
|
cert = {'subject': ((('commonName', 'x*.python.org'),),)}
|
||||||
|
fail(cert, idna)
|
||||||
|
cert = {'subject': ((('commonName', 'xn--p*.python.org'),),)}
|
||||||
|
fail(cert, idna)
|
||||||
|
|
||||||
|
# wildcard in first fragment and IDNA A-labels in sequent fragments
|
||||||
|
# are supported.
|
||||||
|
idna = 'www*.pythön.org'.encode("idna").decode("ascii")
|
||||||
|
cert = {'subject': ((('commonName', idna),),)}
|
||||||
|
ok(cert, 'www.pythön.org'.encode("idna").decode("ascii"))
|
||||||
|
ok(cert, 'www1.pythön.org'.encode("idna").decode("ascii"))
|
||||||
|
fail(cert, 'ftp.pythön.org'.encode("idna").decode("ascii"))
|
||||||
|
fail(cert, 'pythön.org'.encode("idna").decode("ascii"))
|
||||||
|
|
||||||
# Slightly fake real-world example
|
# Slightly fake real-world example
|
||||||
cert = {'notAfter': 'Jun 26 21:41:46 2011 GMT',
|
cert = {'notAfter': 'Jun 26 21:41:46 2011 GMT',
|
||||||
'subject': ((('commonName', 'linuxfrz.org'),),),
|
'subject': ((('commonName', 'linuxfrz.org'),),),
|
||||||
|
@ -423,7 +449,7 @@ class BasicSocketTests(unittest.TestCase):
|
||||||
cert = {'subject': ((('commonName', 'a*b.com'),),)}
|
cert = {'subject': ((('commonName', 'a*b.com'),),)}
|
||||||
ok(cert, 'axxb.com')
|
ok(cert, 'axxb.com')
|
||||||
cert = {'subject': ((('commonName', 'a*b.co*'),),)}
|
cert = {'subject': ((('commonName', 'a*b.co*'),),)}
|
||||||
ok(cert, 'axxb.com')
|
fail(cert, 'axxb.com')
|
||||||
cert = {'subject': ((('commonName', 'a*b*.com'),),)}
|
cert = {'subject': ((('commonName', 'a*b*.com'),),)}
|
||||||
with self.assertRaises(ssl.CertificateError) as cm:
|
with self.assertRaises(ssl.CertificateError) as cm:
|
||||||
ssl.match_hostname(cert, 'axxbxxc.com')
|
ssl.match_hostname(cert, 'axxbxxc.com')
|
||||||
|
|
|
@ -81,6 +81,10 @@ Core and Builtins
|
||||||
Library
|
Library
|
||||||
-------
|
-------
|
||||||
|
|
||||||
|
- Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125,
|
||||||
|
for security reasons. It now doesn't match multiple wildcards nor wildcards
|
||||||
|
inside IDN fragments.
|
||||||
|
|
||||||
- Issue #16039: CVE-2013-1752: Change use of readline in imaplib module to limit
|
- Issue #16039: CVE-2013-1752: Change use of readline in imaplib module to limit
|
||||||
line length. Patch by Emil Lind.
|
line length. Patch by Emil Lind.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue