summaryrefslogtreecommitdiff
path: root/src/server-tls-manager.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/server-tls-manager.c')
-rw-r--r--src/server-tls-manager.c585
1 files changed, 585 insertions, 0 deletions
diff --git a/src/server-tls-manager.c b/src/server-tls-manager.c
new file mode 100644
index 0000000..e32c991
--- /dev/null
+++ b/src/server-tls-manager.c
@@ -0,0 +1,585 @@
+/*
+ * server-tls-manager.c - Source for IdleServerTLSManager
+ * Copyright (C) 2010 Collabora Ltd.
+ * @author Cosimo Cecchi <cosimo.cecchi@collabora.co.uk>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2.1 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#include "config.h"
+#include "server-tls-manager.h"
+
+#include <telepathy-glib/telepathy-glib.h>
+#include <telepathy-glib/telepathy-glib-dbus.h>
+
+#define DEBUG_FLAG IDLE_DEBUG_TLS
+#include "debug.h"
+#include "gabble/caps-channel-manager.h"
+#include "connection.h"
+#include "server-tls-channel.h"
+#include "util.h"
+
+#include "extensions/extensions.h"
+
+#include <wocky/wocky.h>
+
+static void channel_manager_iface_init (gpointer, gpointer);
+
+G_DEFINE_TYPE_WITH_CODE (IdleServerTLSManager, idle_server_tls_manager,
+ WOCKY_TYPE_TLS_HANDLER,
+ G_IMPLEMENT_INTERFACE (TP_TYPE_CHANNEL_MANAGER,
+ channel_manager_iface_init);
+ G_IMPLEMENT_INTERFACE (IDLE_TYPE_CAPS_CHANNEL_MANAGER,
+ NULL));
+
+enum {
+ PROP_CONNECTION = 1,
+ PROP_INTERACTIVE_TLS,
+ NUM_PROPERTIES
+};
+
+struct _IdleServerTLSManagerPrivate {
+ /* Properties */
+ IdleConnection *connection;
+ gboolean interactive_tls;
+
+ /* Current operation data */
+ gchar *peername;
+ GStrv reference_identities;
+ WockyTLSSession *tls_session;
+ IdleServerTLSChannel *channel;
+ GSimpleAsyncResult *async_result;
+
+ /* List of owned TpBaseChannel not yet closed by the client */
+ GList *completed_channels;
+
+ gboolean dispose_has_run;
+};
+
+#define chainup ((WockyTLSHandlerClass *) \
+ idle_server_tls_manager_parent_class)
+
+static void
+idle_server_tls_manager_get_property (GObject *object,
+ guint property_id,
+ GValue *value,
+ GParamSpec *pspec)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (object);
+
+ switch (property_id)
+ {
+ case PROP_CONNECTION:
+ g_value_set_object (value, self->priv->connection);
+ break;
+ case PROP_INTERACTIVE_TLS:
+ g_value_set_boolean (value, self->priv->interactive_tls);
+ break;
+ default:
+ G_OBJECT_WARN_INVALID_PROPERTY_ID (object, property_id, pspec);
+ break;
+ }
+}
+
+static void
+idle_server_tls_manager_set_property (GObject *object,
+ guint property_id,
+ const GValue *value,
+ GParamSpec *pspec)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (object);
+
+ switch (property_id)
+ {
+ case PROP_CONNECTION:
+ self->priv->connection = g_value_dup_object (value);
+ break;
+ case PROP_INTERACTIVE_TLS:
+ self->priv->interactive_tls = g_value_get_boolean (value);
+ break;
+ default:
+ G_OBJECT_WARN_INVALID_PROPERTY_ID (object, property_id, pspec);
+ break;
+ }
+}
+
+static void
+close_all (IdleServerTLSManager *self)
+{
+ GList *l;
+
+ if (self->priv->channel != NULL)
+ tp_base_channel_close (TP_BASE_CHANNEL (self->priv->channel));
+
+ l = self->priv->completed_channels;
+ while (l != NULL)
+ {
+ /* use a temporary variable as the ::closed callback will delete
+ * the link from the list. */
+ GList *next = l->next;
+
+ tp_base_channel_close (l->data);
+
+ l = next;
+ }
+}
+
+static void
+connection_status_changed_cb (IdleConnection *conn,
+ guint status,
+ guint reason,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = user_data;
+
+ DEBUG ("Connection status changed, now %d", status);
+
+ if (status == TP_CONNECTION_STATUS_DISCONNECTED)
+ {
+ close_all (self);
+ tp_clear_object (&self->priv->connection);
+ }
+}
+
+static void
+complete_verify (IdleServerTLSManager *self)
+{
+ /* Move channel to a list until a client Close() it */
+ if (self->priv->channel != NULL)
+ {
+ self->priv->completed_channels = g_list_prepend (
+ self->priv->completed_channels,
+ g_object_ref (self->priv->channel));
+ }
+
+ g_simple_async_result_complete (self->priv->async_result);
+
+ /* Reset to initial state */
+ tp_clear_pointer (&self->priv->peername, g_free);
+ tp_clear_pointer (&self->priv->reference_identities, g_strfreev);
+ g_clear_object (&self->priv->tls_session);
+ g_clear_object (&self->priv->channel);
+ g_clear_object (&self->priv->async_result);
+}
+
+static void
+verify_fallback_cb (GObject *source,
+ GAsyncResult *result,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = (IdleServerTLSManager *) source;
+ GError *error = NULL;
+
+ if (!chainup->verify_finish_func (WOCKY_TLS_HANDLER (self), result, &error))
+ g_simple_async_result_take_error (self->priv->async_result, error);
+
+ complete_verify (self);
+}
+
+static void
+server_tls_channel_closed_cb (IdleServerTLSChannel *channel,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = user_data;
+
+ DEBUG ("Server TLS channel closed.");
+
+ if (channel == self->priv->channel)
+ {
+ /* fallback to the old-style non interactive TLS verification */
+ DEBUG ("Channel closed, but unhandled, falling back...");
+
+ chainup->verify_async_func (WOCKY_TLS_HANDLER (self),
+ self->priv->tls_session, self->priv->peername,
+ self->priv->reference_identities, verify_fallback_cb, NULL);
+
+ self->priv->channel = NULL;
+ }
+ else
+ {
+ GList *l;
+
+ l = g_list_find (self->priv->completed_channels, channel);
+ g_assert (l != NULL);
+
+ self->priv->completed_channels = g_list_delete_link (
+ self->priv->completed_channels, l);
+ }
+
+ tp_channel_manager_emit_channel_closed_for_object (self,
+ TP_EXPORTABLE_CHANNEL (channel));
+ g_object_unref (channel);
+}
+
+GQuark
+idle_server_tls_error_quark (void)
+{
+ static GQuark quark = 0;
+
+ if (!quark)
+ quark = g_quark_from_static_string ("server-tls-error");
+
+ return quark;
+}
+
+static void
+tls_certificate_accepted_cb (IdleTLSCertificate *certificate,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = user_data;
+
+ DEBUG ("TLS certificate accepted");
+
+ complete_verify (self);
+}
+
+static void
+tls_certificate_rejected_cb (IdleTLSCertificate *certificate,
+ GPtrArray *rejections,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = user_data;
+
+ DEBUG ("TLS certificate rejected with rejections %p, length %u.",
+ rejections, rejections->len);
+
+ g_simple_async_result_set_error (self->priv->async_result,
+ IDLE_SERVER_TLS_ERROR, 0, "TLS certificate rejected");
+
+ complete_verify (self);
+}
+
+static void
+extend_string_ptr_array (GPtrArray *array,
+ GStrv new_elements)
+{
+ gint i;
+
+ if (new_elements != NULL)
+ {
+ for (i = 0; new_elements[i] != NULL; i++)
+ {
+ if (!tp_str_empty (new_elements[i]))
+ g_ptr_array_add (array, g_strdup (new_elements[i]));
+ }
+ }
+}
+
+static void
+fill_reference_identities (IdleServerTLSManager *self,
+ const gchar *peername,
+ GStrv original_extra_identities)
+{
+ GPtrArray *identities;
+ gchar *connect_server = NULL;
+ gchar *explicit_server = NULL;
+ GStrv extra_certificate_identities = NULL;
+
+ g_return_if_fail (self->priv->reference_identities == NULL);
+
+ g_object_get (self->priv->connection,
+ "connect-server", &connect_server,
+ "explicit-server", &explicit_server,
+ "extra-certificate-identities", &extra_certificate_identities,
+ NULL);
+
+ identities = g_ptr_array_new ();
+
+ /* The peer name, i.e, the domain part of the JID */
+ g_ptr_array_add (identities, g_strdup (peername));
+
+ /* The extra identities that the caller of verify_async() passed */
+ extend_string_ptr_array (identities, original_extra_identities);
+
+ /* The explicitly overridden server (if in use) */
+ if (!tp_str_empty (explicit_server) &&
+ !tp_strdiff (connect_server, explicit_server))
+ {
+ g_ptr_array_add (identities, g_strdup (explicit_server));
+ }
+
+ /* Extra identities added to the account as a result of user choices */
+ extend_string_ptr_array (identities, extra_certificate_identities);
+
+ /* Null terminate, since this is a gchar** */
+ g_ptr_array_add (identities, NULL);
+
+ self->priv->reference_identities = (GStrv) g_ptr_array_free (identities,
+ FALSE);
+
+ g_strfreev (extra_certificate_identities);
+ g_free (explicit_server);
+ g_free (connect_server);
+}
+
+static void
+idle_server_tls_manager_verify_async (WockyTLSHandler *handler,
+ WockyTLSSession *tls_session,
+ const gchar *peername,
+ GStrv extra_identities,
+ GAsyncReadyCallback callback,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (handler);
+ IdleTLSCertificate *certificate;
+ GSimpleAsyncResult *result;
+
+ g_return_if_fail (self->priv->async_result == NULL);
+
+ DEBUG ("verify_async() called on the IdleServerTLSManager.");
+
+ result = g_simple_async_result_new (G_OBJECT (self),
+ callback, user_data, idle_server_tls_manager_verify_async);
+
+ if (self->priv->connection == NULL)
+ {
+ DEBUG ("connection already went away; failing immediately");
+ g_simple_async_result_set_error (result, TP_ERROR, TP_ERROR_CANCELLED,
+ "The Telepathy connection has already been disconnected");
+ g_simple_async_result_complete_in_idle (result);
+ g_object_unref (result);
+ return;
+ }
+
+ self->priv->async_result = result;
+
+ fill_reference_identities (self, peername, extra_identities);
+
+ if (!self->priv->interactive_tls)
+ {
+ DEBUG ("ignore-ssl-errors is set, fallback to non-interactive "
+ "verification.");
+
+ chainup->verify_async_func (WOCKY_TLS_HANDLER (self), tls_session,
+ peername, self->priv->reference_identities, verify_fallback_cb, NULL);
+
+ return;
+ }
+
+ self->priv->tls_session = g_object_ref (tls_session);
+ self->priv->peername = g_strdup (peername);
+
+ self->priv->channel = g_object_new (IDLE_TYPE_SERVER_TLS_CHANNEL,
+ "connection", self->priv->connection,
+ "tls-session", tls_session,
+ "hostname", peername,
+ "reference-identities", self->priv->reference_identities,
+ NULL);
+
+ g_signal_connect (self->priv->channel, "closed",
+ G_CALLBACK (server_tls_channel_closed_cb), self);
+
+ certificate = idle_server_tls_channel_get_certificate (self->priv->channel);
+
+ g_signal_connect (certificate, "accepted",
+ G_CALLBACK (tls_certificate_accepted_cb), self);
+ g_signal_connect (certificate, "rejected",
+ G_CALLBACK (tls_certificate_rejected_cb), self);
+
+ /* emit NewChannel on the ChannelManager iface */
+ tp_channel_manager_emit_new_channel (self,
+ (TpExportableChannel *) self->priv->channel, NULL);
+}
+
+static gboolean
+idle_server_tls_manager_verify_finish (WockyTLSHandler *self,
+ GAsyncResult *result,
+ GError **error)
+{
+ wocky_implement_finish_void (self, idle_server_tls_manager_verify_async);
+}
+
+static void
+idle_server_tls_manager_init (IdleServerTLSManager *self)
+{
+ self->priv = G_TYPE_INSTANCE_GET_PRIVATE (self,
+ IDLE_TYPE_SERVER_TLS_MANAGER, IdleServerTLSManagerPrivate);
+}
+
+static void
+idle_server_tls_manager_dispose (GObject *object)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (object);
+
+ DEBUG ("%p", self);
+
+ if (self->priv->dispose_has_run)
+ return;
+
+ self->priv->dispose_has_run = TRUE;
+
+ tp_clear_object (&self->priv->tls_session);
+ tp_clear_object (&self->priv->connection);
+
+ G_OBJECT_CLASS (idle_server_tls_manager_parent_class)->dispose (object);
+}
+
+static void
+idle_server_tls_manager_finalize (GObject *object)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (object);
+
+ DEBUG ("%p", self);
+
+ close_all (self);
+
+ g_free (self->priv->peername);
+ g_strfreev (self->priv->reference_identities);
+
+ G_OBJECT_CLASS (idle_server_tls_manager_parent_class)->finalize (object);
+}
+
+static void
+idle_server_tls_manager_constructed (GObject *object)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (object);
+ void (*chain_up) (GObject *) =
+ G_OBJECT_CLASS (idle_server_tls_manager_parent_class)->constructed;
+
+ if (chain_up != NULL)
+ chain_up (object);
+
+ DEBUG ("Server TLS Manager constructed");
+
+ idle_signal_connect_weak (self->priv->connection, "status-changed",
+ G_CALLBACK (connection_status_changed_cb), object);
+}
+
+static void
+idle_server_tls_manager_class_init (IdleServerTLSManagerClass *klass)
+{
+ GObjectClass *oclass = G_OBJECT_CLASS (klass);
+ WockyTLSHandlerClass *hclass = WOCKY_TLS_HANDLER_CLASS (klass);
+ GParamSpec *pspec;
+
+ g_type_class_add_private (klass, sizeof (IdleServerTLSManagerPrivate));
+
+ oclass->dispose = idle_server_tls_manager_dispose;
+ oclass->finalize = idle_server_tls_manager_finalize;
+ oclass->constructed = idle_server_tls_manager_constructed;
+ oclass->set_property = idle_server_tls_manager_set_property;
+ oclass->get_property = idle_server_tls_manager_get_property;
+
+ hclass->verify_async_func = idle_server_tls_manager_verify_async;
+ hclass->verify_finish_func = idle_server_tls_manager_verify_finish;
+
+ pspec = g_param_spec_object ("connection", "IdleConnection object",
+ "Idle connection object that owns this manager.",
+ IDLE_TYPE_CONNECTION,
+ G_PARAM_CONSTRUCT_ONLY | G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
+ g_object_class_install_property (oclass, PROP_CONNECTION, pspec);
+
+ pspec = g_param_spec_boolean ("interactive-tls", "Interactive TLS setting",
+ "Whether interactive TLS certificate verification is enabled.",
+ FALSE,
+ G_PARAM_READWRITE | G_PARAM_STATIC_STRINGS);
+ g_object_class_install_property (oclass, PROP_INTERACTIVE_TLS, pspec);
+}
+
+static void
+idle_server_tls_manager_foreach_channel (TpChannelManager *manager,
+ TpExportableChannelFunc func,
+ gpointer user_data)
+{
+ IdleServerTLSManager *self = IDLE_SERVER_TLS_MANAGER (manager);
+ GList *l;
+
+ if (self->priv->channel != NULL)
+ func (TP_EXPORTABLE_CHANNEL (self->priv->channel), user_data);
+
+ for (l = self->priv->completed_channels; l != NULL; l = l->next)
+ {
+ func (l->data, user_data);
+ }
+}
+
+static void
+channel_manager_iface_init (gpointer g_iface,
+ gpointer iface_data)
+{
+ TpChannelManagerIface *iface = g_iface;
+
+ iface->foreach_channel = idle_server_tls_manager_foreach_channel;
+
+ /* these channels are not requestable. */
+ iface->ensure_channel = NULL;
+ iface->create_channel = NULL;
+ iface->request_channel = NULL;
+ iface->foreach_channel_class = NULL;
+}
+
+static TpConnectionStatusReason
+cert_reject_reason_to_conn_reason (TpTLSCertificateRejectReason tls_reason)
+{
+ #define EASY_CASE(x) \
+ case TP_TLS_CERTIFICATE_REJECT_REASON_ ## x: \
+ return TP_CONNECTION_STATUS_REASON_CERT_ ## x;
+
+ switch (tls_reason)
+ {
+ EASY_CASE (UNTRUSTED);
+ EASY_CASE (EXPIRED);
+ EASY_CASE (NOT_ACTIVATED);
+ EASY_CASE (FINGERPRINT_MISMATCH);
+ EASY_CASE (HOSTNAME_MISMATCH);
+ EASY_CASE (SELF_SIGNED);
+ EASY_CASE (REVOKED);
+ EASY_CASE (INSECURE);
+ EASY_CASE (LIMIT_EXCEEDED);
+
+ case TP_TLS_CERTIFICATE_REJECT_REASON_UNKNOWN:
+ default:
+ return TP_CONNECTION_STATUS_REASON_CERT_OTHER_ERROR;
+ }
+
+ #undef EASY_CASE
+}
+
+void
+idle_server_tls_manager_get_rejection_details (IdleServerTLSManager *self,
+ gchar **dbus_error,
+ GHashTable **details,
+ TpConnectionStatusReason *reason)
+{
+ IdleTLSCertificate *certificate;
+ GPtrArray *rejections;
+ GValueArray *rejection;
+ TpTLSCertificateRejectReason tls_reason;
+
+ /* We probably want the rejection details of last completed operation */
+ g_return_if_fail (self->priv->completed_channels != NULL);
+
+ certificate = idle_server_tls_channel_get_certificate (
+ self->priv->completed_channels->data);
+ g_object_get (certificate,
+ "rejections", &rejections,
+ NULL);
+
+ /* we return 'Invalid_Argument' if Reject() is called with zero
+ * reasons, so if this fails something bad happened.
+ */
+ g_assert (rejections->len >= 1);
+
+ rejection = g_ptr_array_index (rejections, 0);
+
+ tls_reason = g_value_get_uint (g_value_array_get_nth (rejection, 0));
+ *dbus_error = g_value_dup_string (g_value_array_get_nth (rejection, 1));
+ *details = g_value_dup_boxed (g_value_array_get_nth (rejection, 2));
+
+ *reason = cert_reject_reason_to_conn_reason (tls_reason);
+
+ tp_clear_boxed (TP_ARRAY_TYPE_TLS_CERTIFICATE_REJECTION_LIST,
+ &rejections);
+}