1 | use alloc::vec::Vec; |
2 | |
3 | use pki_types::{CertificateDer, CertificateRevocationListDer, ServerName, UnixTime}; |
4 | use webpki::{CertRevocationList, ExpirationPolicy, RevocationCheckDepth, UnknownStatusPolicy}; |
5 | |
6 | use crate::crypto::{CryptoProvider, WebPkiSupportedAlgorithms}; |
7 | use crate::log::trace; |
8 | use crate::sync::Arc; |
9 | use crate::verify::{ |
10 | DigitallySignedStruct, HandshakeSignatureValid, ServerCertVerified, ServerCertVerifier, |
11 | }; |
12 | use crate::webpki::verify::{ |
13 | ParsedCertificate, verify_server_cert_signed_by_trust_anchor_impl, verify_tls12_signature, |
14 | verify_tls13_signature, |
15 | }; |
16 | use crate::webpki::{VerifierBuilderError, parse_crls, verify_server_name}; |
17 | #[cfg (doc)] |
18 | use crate::{ConfigBuilder, ServerConfig, crypto}; |
19 | use crate::{Error, RootCertStore, SignatureScheme}; |
20 | |
21 | /// A builder for configuring a `webpki` server certificate verifier. |
22 | /// |
23 | /// For more information, see the [`WebPkiServerVerifier`] documentation. |
24 | #[derive (Debug, Clone)] |
25 | pub struct ServerCertVerifierBuilder { |
26 | roots: Arc<RootCertStore>, |
27 | crls: Vec<CertificateRevocationListDer<'static>>, |
28 | revocation_check_depth: RevocationCheckDepth, |
29 | unknown_revocation_policy: UnknownStatusPolicy, |
30 | revocation_expiration_policy: ExpirationPolicy, |
31 | supported_algs: WebPkiSupportedAlgorithms, |
32 | } |
33 | |
34 | impl ServerCertVerifierBuilder { |
35 | pub(crate) fn new( |
36 | roots: Arc<RootCertStore>, |
37 | supported_algs: WebPkiSupportedAlgorithms, |
38 | ) -> Self { |
39 | Self { |
40 | roots, |
41 | crls: Vec::new(), |
42 | revocation_check_depth: RevocationCheckDepth::Chain, |
43 | unknown_revocation_policy: UnknownStatusPolicy::Deny, |
44 | revocation_expiration_policy: ExpirationPolicy::Ignore, |
45 | supported_algs, |
46 | } |
47 | } |
48 | |
49 | /// Verify the revocation state of presented client certificates against the provided |
50 | /// certificate revocation lists (CRLs). Calling `with_crls` multiple times appends the |
51 | /// given CRLs to the existing collection. |
52 | pub fn with_crls( |
53 | mut self, |
54 | crls: impl IntoIterator<Item = CertificateRevocationListDer<'static>>, |
55 | ) -> Self { |
56 | self.crls.extend(crls); |
57 | self |
58 | } |
59 | |
60 | /// Only check the end entity certificate revocation status when using CRLs. |
61 | /// |
62 | /// If CRLs are provided using [`with_crls`][Self::with_crls] only check the end entity |
63 | /// certificate's revocation status. Overrides the default behavior of checking revocation |
64 | /// status for each certificate in the verified chain built to a trust anchor |
65 | /// (excluding the trust anchor itself). |
66 | /// |
67 | /// If no CRLs are provided then this setting has no effect. Neither the end entity certificate |
68 | /// or any intermediates will have revocation status checked. |
69 | pub fn only_check_end_entity_revocation(mut self) -> Self { |
70 | self.revocation_check_depth = RevocationCheckDepth::EndEntity; |
71 | self |
72 | } |
73 | |
74 | /// Allow unknown certificate revocation status when using CRLs. |
75 | /// |
76 | /// If CRLs are provided with [`with_crls`][Self::with_crls] and it isn't possible to |
77 | /// determine the revocation status of a certificate, do not treat it as an error condition. |
78 | /// Overrides the default behavior where unknown revocation status is considered an error. |
79 | /// |
80 | /// If no CRLs are provided then this setting has no effect as revocation status checks |
81 | /// are not performed. |
82 | pub fn allow_unknown_revocation_status(mut self) -> Self { |
83 | self.unknown_revocation_policy = UnknownStatusPolicy::Allow; |
84 | self |
85 | } |
86 | |
87 | /// Enforce the CRL nextUpdate field (i.e. expiration) |
88 | /// |
89 | /// If CRLs are provided with [`with_crls`][Self::with_crls] and the verification time is |
90 | /// beyond the time in the CRL nextUpdate field, it is expired and treated as an error condition. |
91 | /// Overrides the default behavior where expired CRLs are not treated as an error condition. |
92 | /// |
93 | /// If no CRLs are provided then this setting has no effect as revocation status checks |
94 | /// are not performed. |
95 | pub fn enforce_revocation_expiration(mut self) -> Self { |
96 | self.revocation_expiration_policy = ExpirationPolicy::Enforce; |
97 | self |
98 | } |
99 | |
100 | /// Build a server certificate verifier, allowing control over the root certificates to use as |
101 | /// trust anchors, and to control how server certificate revocation checking is performed. |
102 | /// |
103 | /// If `with_signature_verification_algorithms` was not called on the builder, a default set of |
104 | /// signature verification algorithms is used, controlled by the selected [`crypto::CryptoProvider`]. |
105 | /// |
106 | /// Once built, the provided `Arc<dyn ServerCertVerifier>` can be used with a Rustls |
107 | /// [`ServerConfig`] to configure client certificate validation using |
108 | /// [`with_client_cert_verifier`][ConfigBuilder<ClientConfig, WantsVerifier>::with_client_cert_verifier]. |
109 | /// |
110 | /// # Errors |
111 | /// This function will return a [`VerifierBuilderError`] if: |
112 | /// 1. No trust anchors have been provided. |
113 | /// 2. DER encoded CRLs have been provided that can not be parsed successfully. |
114 | pub fn build(self) -> Result<Arc<WebPkiServerVerifier>, VerifierBuilderError> { |
115 | if self.roots.is_empty() { |
116 | return Err(VerifierBuilderError::NoRootAnchors); |
117 | } |
118 | |
119 | Ok(WebPkiServerVerifier::new( |
120 | self.roots, |
121 | parse_crls(self.crls)?, |
122 | self.revocation_check_depth, |
123 | self.unknown_revocation_policy, |
124 | self.revocation_expiration_policy, |
125 | self.supported_algs, |
126 | ) |
127 | .into()) |
128 | } |
129 | } |
130 | |
131 | /// Default `ServerCertVerifier`, see the trait impl for more information. |
132 | #[allow (unreachable_pub)] |
133 | #[derive (Debug)] |
134 | pub struct WebPkiServerVerifier { |
135 | roots: Arc<RootCertStore>, |
136 | crls: Vec<CertRevocationList<'static>>, |
137 | revocation_check_depth: RevocationCheckDepth, |
138 | unknown_revocation_policy: UnknownStatusPolicy, |
139 | revocation_expiration_policy: ExpirationPolicy, |
140 | supported: WebPkiSupportedAlgorithms, |
141 | } |
142 | |
143 | #[allow (unreachable_pub)] |
144 | impl WebPkiServerVerifier { |
145 | /// Create a builder for the `webpki` server certificate verifier configuration using |
146 | /// the [process-default `CryptoProvider`][CryptoProvider#using-the-per-process-default-cryptoprovider]. |
147 | /// |
148 | /// Server certificates will be verified using the trust anchors found in the provided `roots`. |
149 | /// |
150 | /// Use [`Self::builder_with_provider`] if you wish to specify an explicit provider. |
151 | /// |
152 | /// For more information, see the [`ServerCertVerifierBuilder`] documentation. |
153 | pub fn builder(roots: Arc<RootCertStore>) -> ServerCertVerifierBuilder { |
154 | Self::builder_with_provider( |
155 | roots, |
156 | Arc::clone(CryptoProvider::get_default_or_install_from_crate_features()), |
157 | ) |
158 | } |
159 | |
160 | /// Create a builder for the `webpki` server certificate verifier configuration using |
161 | /// a specified [`CryptoProvider`]. |
162 | /// |
163 | /// Server certificates will be verified using the trust anchors found in the provided `roots`. |
164 | /// |
165 | /// The cryptography used comes from the specified [`CryptoProvider`]. |
166 | /// |
167 | /// For more information, see the [`ServerCertVerifierBuilder`] documentation. |
168 | pub fn builder_with_provider( |
169 | roots: Arc<RootCertStore>, |
170 | provider: Arc<CryptoProvider>, |
171 | ) -> ServerCertVerifierBuilder { |
172 | ServerCertVerifierBuilder::new(roots, provider.signature_verification_algorithms) |
173 | } |
174 | |
175 | /// Short-cut for creating a `WebPkiServerVerifier` that does not perform certificate revocation |
176 | /// checking, avoiding the need to use a builder. |
177 | pub(crate) fn new_without_revocation( |
178 | roots: impl Into<Arc<RootCertStore>>, |
179 | supported_algs: WebPkiSupportedAlgorithms, |
180 | ) -> Self { |
181 | Self::new( |
182 | roots, |
183 | Vec::default(), |
184 | RevocationCheckDepth::Chain, |
185 | UnknownStatusPolicy::Allow, |
186 | ExpirationPolicy::Ignore, |
187 | supported_algs, |
188 | ) |
189 | } |
190 | |
191 | /// Constructs a new `WebPkiServerVerifier`. |
192 | /// |
193 | /// * `roots` is the set of trust anchors to trust for issuing server certs. |
194 | /// * `crls` are a vec of owned certificate revocation lists (CRLs) to use for |
195 | /// client certificate validation. |
196 | /// * `revocation_check_depth` controls which certificates have their revocation status checked |
197 | /// when `crls` are provided. |
198 | /// * `unknown_revocation_policy` controls how certificates with an unknown revocation status |
199 | /// are handled when `crls` are provided. |
200 | /// * `supported` is the set of supported algorithms that will be used for |
201 | /// certificate verification and TLS handshake signature verification. |
202 | pub(crate) fn new( |
203 | roots: impl Into<Arc<RootCertStore>>, |
204 | crls: Vec<CertRevocationList<'static>>, |
205 | revocation_check_depth: RevocationCheckDepth, |
206 | unknown_revocation_policy: UnknownStatusPolicy, |
207 | revocation_expiration_policy: ExpirationPolicy, |
208 | supported: WebPkiSupportedAlgorithms, |
209 | ) -> Self { |
210 | Self { |
211 | roots: roots.into(), |
212 | crls, |
213 | revocation_check_depth, |
214 | unknown_revocation_policy, |
215 | revocation_expiration_policy, |
216 | supported, |
217 | } |
218 | } |
219 | } |
220 | |
221 | impl ServerCertVerifier for WebPkiServerVerifier { |
222 | /// Will verify the certificate is valid in the following ways: |
223 | /// - Signed by a trusted `RootCertStore` CA |
224 | /// - Not Expired |
225 | /// - Valid for DNS entry |
226 | /// - Valid revocation status (if applicable). |
227 | /// |
228 | /// Depending on the verifier's configuration revocation status checking may be performed for |
229 | /// each certificate in the chain to a root CA (excluding the root itself), or only the |
230 | /// end entity certificate. Similarly, unknown revocation status may be treated as an error |
231 | /// or allowed based on configuration. |
232 | fn verify_server_cert( |
233 | &self, |
234 | end_entity: &CertificateDer<'_>, |
235 | intermediates: &[CertificateDer<'_>], |
236 | server_name: &ServerName<'_>, |
237 | ocsp_response: &[u8], |
238 | now: UnixTime, |
239 | ) -> Result<ServerCertVerified, Error> { |
240 | let cert = ParsedCertificate::try_from(end_entity)?; |
241 | |
242 | let crl_refs = self.crls.iter().collect::<Vec<_>>(); |
243 | |
244 | let revocation = if self.crls.is_empty() { |
245 | None |
246 | } else { |
247 | // Note: unwrap here is safe because RevocationOptionsBuilder only errors when given |
248 | // empty CRLs. |
249 | Some( |
250 | webpki::RevocationOptionsBuilder::new(crl_refs.as_slice()) |
251 | // Note: safe to unwrap here - new is only fallible if no CRLs are provided |
252 | // and we verify this above. |
253 | .unwrap() |
254 | .with_depth(self.revocation_check_depth) |
255 | .with_status_policy(self.unknown_revocation_policy) |
256 | .with_expiration_policy(self.revocation_expiration_policy) |
257 | .build(), |
258 | ) |
259 | }; |
260 | |
261 | // Note: we use the crate-internal `_impl` fn here in order to provide revocation |
262 | // checking information, if applicable. |
263 | verify_server_cert_signed_by_trust_anchor_impl( |
264 | &cert, |
265 | &self.roots, |
266 | intermediates, |
267 | revocation, |
268 | now, |
269 | self.supported.all, |
270 | )?; |
271 | |
272 | if !ocsp_response.is_empty() { |
273 | trace!("Unvalidated OCSP response: {:?}" , ocsp_response.to_vec()); |
274 | } |
275 | |
276 | verify_server_name(&cert, server_name)?; |
277 | Ok(ServerCertVerified::assertion()) |
278 | } |
279 | |
280 | fn verify_tls12_signature( |
281 | &self, |
282 | message: &[u8], |
283 | cert: &CertificateDer<'_>, |
284 | dss: &DigitallySignedStruct, |
285 | ) -> Result<HandshakeSignatureValid, Error> { |
286 | verify_tls12_signature(message, cert, dss, &self.supported) |
287 | } |
288 | |
289 | fn verify_tls13_signature( |
290 | &self, |
291 | message: &[u8], |
292 | cert: &CertificateDer<'_>, |
293 | dss: &DigitallySignedStruct, |
294 | ) -> Result<HandshakeSignatureValid, Error> { |
295 | verify_tls13_signature(message, cert, dss, &self.supported) |
296 | } |
297 | |
298 | fn supported_verify_schemes(&self) -> Vec<SignatureScheme> { |
299 | self.supported.supported_schemes() |
300 | } |
301 | } |
302 | |
303 | #[cfg (test)] |
304 | #[macro_rules_attribute::apply(test_for_each_provider)] |
305 | mod tests { |
306 | use std::prelude::v1::*; |
307 | use std::{println, vec}; |
308 | |
309 | use pki_types::pem::PemObject; |
310 | use pki_types::{CertificateDer, CertificateRevocationListDer}; |
311 | |
312 | use super::{VerifierBuilderError, WebPkiServerVerifier, provider}; |
313 | use crate::RootCertStore; |
314 | use crate::sync::Arc; |
315 | |
316 | fn load_crls(crls_der: &[&[u8]]) -> Vec<CertificateRevocationListDer<'static>> { |
317 | crls_der |
318 | .iter() |
319 | .map(|pem_bytes| CertificateRevocationListDer::from_pem_slice(pem_bytes).unwrap()) |
320 | .collect() |
321 | } |
322 | |
323 | fn test_crls() -> Vec<CertificateRevocationListDer<'static>> { |
324 | load_crls(&[ |
325 | include_bytes!("../../../test-ca/ecdsa-p256/client.revoked.crl.pem" ).as_slice(), |
326 | include_bytes!("../../../test-ca/rsa-2048/client.revoked.crl.pem" ).as_slice(), |
327 | ]) |
328 | } |
329 | |
330 | fn load_roots(roots_der: &[&[u8]]) -> Arc<RootCertStore> { |
331 | let mut roots = RootCertStore::empty(); |
332 | roots_der.iter().for_each(|der| { |
333 | roots |
334 | .add(CertificateDer::from(der.to_vec())) |
335 | .unwrap() |
336 | }); |
337 | roots.into() |
338 | } |
339 | |
340 | fn test_roots() -> Arc<RootCertStore> { |
341 | load_roots(&[ |
342 | include_bytes!("../../../test-ca/ecdsa-p256/ca.der" ).as_slice(), |
343 | include_bytes!("../../../test-ca/rsa-2048/ca.der" ).as_slice(), |
344 | ]) |
345 | } |
346 | |
347 | #[test ] |
348 | fn test_with_invalid_crls() { |
349 | // Trying to build a server verifier with invalid CRLs should error at build time. |
350 | let result = WebPkiServerVerifier::builder_with_provider( |
351 | test_roots(), |
352 | provider::default_provider().into(), |
353 | ) |
354 | .with_crls(vec![CertificateRevocationListDer::from(vec![0xFF])]) |
355 | .build(); |
356 | assert!(matches!(result, Err(VerifierBuilderError::InvalidCrl(_)))); |
357 | } |
358 | |
359 | #[test ] |
360 | fn test_with_crls_multiple_calls() { |
361 | // We should be able to call `with_crls` on a server verifier multiple times. |
362 | let initial_crls = test_crls(); |
363 | let extra_crls = |
364 | load_crls(&[ |
365 | include_bytes!("../../../test-ca/eddsa/client.revoked.crl.pem" ).as_slice(), |
366 | ]); |
367 | |
368 | let builder = WebPkiServerVerifier::builder_with_provider( |
369 | test_roots(), |
370 | provider::default_provider().into(), |
371 | ) |
372 | .with_crls(initial_crls.clone()) |
373 | .with_crls(extra_crls.clone()); |
374 | |
375 | // There should be the expected number of crls. |
376 | assert_eq!(builder.crls.len(), initial_crls.len() + extra_crls.len()); |
377 | // The builder should be Debug. |
378 | println!("{:?}" , builder); |
379 | builder.build().unwrap(); |
380 | } |
381 | |
382 | #[test ] |
383 | fn test_builder_no_roots() { |
384 | // Trying to create a server verifier builder with no trust anchors should fail at build time |
385 | let result = WebPkiServerVerifier::builder_with_provider( |
386 | RootCertStore::empty().into(), |
387 | provider::default_provider().into(), |
388 | ) |
389 | .build(); |
390 | assert!(matches!(result, Err(VerifierBuilderError::NoRootAnchors))); |
391 | } |
392 | |
393 | #[test ] |
394 | fn test_server_verifier_ee_only() { |
395 | // We should be able to build a server cert. verifier that only checks the EE cert. |
396 | let builder = WebPkiServerVerifier::builder_with_provider( |
397 | test_roots(), |
398 | provider::default_provider().into(), |
399 | ) |
400 | .only_check_end_entity_revocation(); |
401 | // The builder should be Debug. |
402 | println!("{:?}" , builder); |
403 | builder.build().unwrap(); |
404 | } |
405 | |
406 | #[test ] |
407 | fn test_server_verifier_allow_unknown() { |
408 | // We should be able to build a server cert. verifier that allows unknown revocation |
409 | // status. |
410 | let builder = WebPkiServerVerifier::builder_with_provider( |
411 | test_roots(), |
412 | provider::default_provider().into(), |
413 | ) |
414 | .allow_unknown_revocation_status(); |
415 | // The builder should be Debug. |
416 | println!("{:?}" , builder); |
417 | builder.build().unwrap(); |
418 | } |
419 | |
420 | #[test ] |
421 | fn test_server_verifier_allow_unknown_ee_only() { |
422 | // We should be able to build a server cert. verifier that allows unknown revocation |
423 | // status and only checks the EE cert. |
424 | let builder = WebPkiServerVerifier::builder_with_provider( |
425 | test_roots(), |
426 | provider::default_provider().into(), |
427 | ) |
428 | .allow_unknown_revocation_status() |
429 | .only_check_end_entity_revocation(); |
430 | // The builder should be Debug. |
431 | println!("{:?}" , builder); |
432 | builder.build().unwrap(); |
433 | } |
434 | |
435 | #[test ] |
436 | fn test_server_verifier_enforce_expiration() { |
437 | // We should be able to build a server cert. verifier that allows unknown revocation |
438 | // status. |
439 | let builder = WebPkiServerVerifier::builder_with_provider( |
440 | test_roots(), |
441 | provider::default_provider().into(), |
442 | ) |
443 | .enforce_revocation_expiration(); |
444 | // The builder should be Debug. |
445 | println!("{:?}" , builder); |
446 | builder.build().unwrap(); |
447 | } |
448 | } |
449 | |