- If no PrivateKeyFile is specified, /etc/tinc/netname/rsa_key.priv is assumed.
- Check RSA key before using it.
This commit is contained in:
parent
1c34ba7fb8
commit
1708997bc8
1 changed files with 46 additions and 8 deletions
54
src/net.c
54
src/net.c
|
@ -17,7 +17,7 @@
|
||||||
along with this program; if not, write to the Free Software
|
along with this program; if not, write to the Free Software
|
||||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||||
|
|
||||||
$Id: net.c,v 1.35.4.152 2002/02/10 21:57:54 guus Exp $
|
$Id: net.c,v 1.35.4.153 2002/02/11 14:20:21 guus Exp $
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "config.h"
|
#include "config.h"
|
||||||
|
@ -596,6 +596,7 @@ cp
|
||||||
{
|
{
|
||||||
BN_hex2bn(&c->rsa_key->n, key);
|
BN_hex2bn(&c->rsa_key->n, key);
|
||||||
BN_hex2bn(&c->rsa_key->e, "FFFF");
|
BN_hex2bn(&c->rsa_key->e, "FFFF");
|
||||||
|
free(key);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -609,8 +610,10 @@ cp
|
||||||
{
|
{
|
||||||
syslog(LOG_ERR, _("Error reading RSA public key file `%s': %m"),
|
syslog(LOG_ERR, _("Error reading RSA public key file `%s': %m"),
|
||||||
fname);
|
fname);
|
||||||
|
free(fname);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
free(fname);
|
||||||
c->rsa_key = PEM_read_RSAPublicKey(fp, &c->rsa_key, NULL, NULL);
|
c->rsa_key = PEM_read_RSAPublicKey(fp, &c->rsa_key, NULL, NULL);
|
||||||
fclose(fp);
|
fclose(fp);
|
||||||
if(!c->rsa_key)
|
if(!c->rsa_key)
|
||||||
|
@ -622,7 +625,10 @@ cp
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
return -1;
|
{
|
||||||
|
free(fname);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Else, check if a harnessed public key is in the config file */
|
/* Else, check if a harnessed public key is in the config file */
|
||||||
|
@ -655,15 +661,23 @@ cp
|
||||||
myself->connection->rsa_key = RSA_new();
|
myself->connection->rsa_key = RSA_new();
|
||||||
BN_hex2bn(&myself->connection->rsa_key->d, key);
|
BN_hex2bn(&myself->connection->rsa_key->d, key);
|
||||||
BN_hex2bn(&myself->connection->rsa_key->e, "FFFF");
|
BN_hex2bn(&myself->connection->rsa_key->e, "FFFF");
|
||||||
|
free(key);
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
else if(get_config_string(lookup_config(config_tree, "PrivateKeyFile"), &fname))
|
|
||||||
|
if(!get_config_string(lookup_config(config_tree, "PrivateKeyFile"), &fname))
|
||||||
|
asprintf(&fname, "%s/rsa_key.priv", confbase);
|
||||||
|
|
||||||
|
if(is_safe_path(fname))
|
||||||
{
|
{
|
||||||
if((fp = fopen(fname, "r")) == NULL)
|
if((fp = fopen(fname, "r")) == NULL)
|
||||||
{
|
{
|
||||||
syslog(LOG_ERR, _("Error reading RSA private key file `%s': %m"),
|
syslog(LOG_ERR, _("Error reading RSA private key file `%s': %m"),
|
||||||
fname);
|
fname);
|
||||||
|
free(fname);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
free(fname);
|
||||||
myself->connection->rsa_key = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL);
|
myself->connection->rsa_key = PEM_read_RSAPrivateKey(fp, NULL, NULL, NULL);
|
||||||
fclose(fp);
|
fclose(fp);
|
||||||
if(!myself->connection->rsa_key)
|
if(!myself->connection->rsa_key)
|
||||||
|
@ -672,11 +686,36 @@ cp
|
||||||
fname);
|
fname);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
free(fname);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int check_rsa_key(RSA *rsa_key)
|
||||||
|
{
|
||||||
|
char *test1, *test2, *test3;
|
||||||
|
cp
|
||||||
|
if(rsa_key->p && rsa_key->q)
|
||||||
|
{
|
||||||
|
if(RSA_check_key(rsa_key) != 1)
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
syslog(LOG_ERR, _("No private key for tinc daemon specified!"));
|
test1 = xmalloc(RSA_size(rsa_key));
|
||||||
return -1;
|
test2 = xmalloc(RSA_size(rsa_key));
|
||||||
|
test3 = xmalloc(RSA_size(rsa_key));
|
||||||
|
|
||||||
|
if(RSA_public_encrypt(RSA_size(rsa_key), test1, test2, rsa_key, RSA_NO_PADDING) != RSA_size(rsa_key))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
if(RSA_private_decrypt(RSA_size(rsa_key), test2, test3, rsa_key, RSA_NO_PADDING) != RSA_size(rsa_key))
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
if(memcmp(test1, test3, RSA_size(rsa_key)))
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
cp
|
cp
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -732,13 +771,12 @@ cp
|
||||||
return -1;
|
return -1;
|
||||||
cp
|
cp
|
||||||
|
|
||||||
/*
|
if(check_rsa_key(myself->connection->rsa_key))
|
||||||
if(RSA_check_key(rsa_key) != 1)
|
|
||||||
{
|
{
|
||||||
syslog(LOG_ERR, _("Invalid public/private keypair!"));
|
syslog(LOG_ERR, _("Invalid public/private keypair!"));
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
*/
|
|
||||||
if(!get_config_port(lookup_config(myself->connection->config_tree, "Port"), &myself->port))
|
if(!get_config_port(lookup_config(myself->connection->config_tree, "Port"), &myself->port))
|
||||||
myself->port = 655;
|
myself->port = 655;
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue