From: Viktor Dukhovni Date: Sat, 16 Jan 2016 06:15:02 +0000 (-0500) Subject: Multiple -trusted/-untrusted/-CRLfile options in verify X-Git-Tag: OpenSSL_1_1_0-pre3~469 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=feb2f53edc7e9b96cfe9c0ab611461edabdd2b34 Multiple -trusted/-untrusted/-CRLfile options in verify It is sometimes useful (especially in automated tests) to supply multiple trusted or untrusted certificates via separate files rather than have to prepare a single file containing them all. To that end, change verify(1) to accept these options zero or more times. Also automatically set -no-CAfile and -no-CApath when -trusted is specified. Improve verify(1) documentation, which could still use some work. Reviewed-by: Richard Levitte --- diff --git a/apps/verify.c b/apps/verify.c index 183579c06d..158504464b 100644 --- a/apps/verify.c +++ b/apps/verify.c @@ -115,7 +115,6 @@ int verify_main(int argc, char **argv) X509_VERIFY_PARAM *vpm = NULL; char *prog, *CApath = NULL, *CAfile = NULL; int noCApath = 0, noCAfile = 0; - char *untfile = NULL, *trustfile = NULL, *crlfile = NULL; int vpmtouched = 0, crl_download = 0, show_chain = 0, i = 0, ret = 1; OPTION_CHOICE o; @@ -167,13 +166,24 @@ int verify_main(int argc, char **argv) noCAfile = 1; break; case OPT_UNTRUSTED: - untfile = opt_arg(); + /* Zero or more times */ + if (!load_certs(opt_arg(), &untrusted, FORMAT_PEM, NULL, e, + "untrusted certificates")) + goto end; break; case OPT_TRUSTED: - trustfile = opt_arg(); + /* Zero or more times */ + noCAfile = 1; + noCApath = 1; + if (!load_certs(opt_arg(), &trusted, FORMAT_PEM, NULL, e, + "trusted certificates")) + goto end; break; case OPT_CRLFILE: - crlfile = opt_arg(); + /* Zero or more times */ + if (!load_crls(opt_arg(), &crls, FORMAT_PEM, NULL, e, + "other CRLs")) + goto end; break; case OPT_CRL_DOWNLOAD: crl_download = 1; @@ -182,6 +192,7 @@ int verify_main(int argc, char **argv) show_chain = 1; break; case OPT_ENGINE: + /* Specify *before* -trusted/-untrusted/-CRLfile */ e = setup_engine(opt_arg(), 0); break; case OPT_VERBOSE: @@ -191,7 +202,7 @@ int verify_main(int argc, char **argv) } argc = opt_num_rest(); argv = opt_rest(); - if (trustfile && (CAfile || CApath)) { + if (trusted != NULL && (CAfile || CApath)) { BIO_printf(bio_err, "%s: Cannot use -trusted with -CAfile or -CApath\n", prog); @@ -207,23 +218,6 @@ int verify_main(int argc, char **argv) ERR_clear_error(); - if (untfile) { - if (!load_certs(untfile, &untrusted, FORMAT_PEM, NULL, e, - "untrusted certificates")) - goto end; - } - - if (trustfile) { - if (!load_certs(trustfile, &trusted, FORMAT_PEM, NULL, e, - "trusted certificates")) - goto end; - } - - if (crlfile) { - if (!load_crls(crlfile, &crls, FORMAT_PEM, NULL, e, "other CRLs")) - goto end; - } - if (crl_download) store_setup_crl_download(store); diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod index 74477e5c0f..e15a5de968 100644 --- a/doc/apps/verify.pod +++ b/doc/apps/verify.pod @@ -17,6 +17,7 @@ B B [B<-crl_download>] [B<-crl_check>] [B<-crl_check_all>] +[B<-engine id>] [B<-explicit_policy>] [B<-extended_crl>] [B<-help>] @@ -59,8 +60,8 @@ The B command verifies certificate chains. =item B<-CAfile file> -A file of trusted certificates. The file should contain multiple certificates -in PEM format concatenated together. +A B of trusted certificates. +The file should contain one or more certificates in PEM format. =item B<-CApath directory> @@ -91,7 +92,11 @@ because it doesn't add any security. =item B<-CRLfile file> -File containing one or more CRL's (in PEM format) to load. +The B should contain one or more CRLs in PEM format. +This option can be specified more than once to include CRLs from multiple +B. +If you want to enable an B via the B<-engine> option, that option has +to be specified before this one. =item B<-crl_download> @@ -107,6 +112,15 @@ If a valid CRL cannot be found an error occurs. Checks the validity of B certificates in the chain by attempting to look up valid CRLs. +=item B<-engine id> + +Specifying an engine B will cause L to attempt to load the +specified engine. +The engine will then be set as the default for all its supported algorithms. +If you want to load certificates or CRLs that require engine support via any of +the B<-trusted>, B<-untrusted> or B<-CRLfile> options, the B<-engine> option +must be specified before those options. + =item B<-explicit_policy> Set policy variable require-explicit-policy (see RFC5280). @@ -144,7 +158,9 @@ rejections may take place. =item B<-partial_chain> -Allow partial certificate chain if at least one certificate is in trusted store. +Allow verification to succeed even if a I chain cannot be built to a +self-signed trust-anchor, provided it is possible to construct a chain to a +trusted certificate that might not be self-signed. =item B<-policy arg> @@ -178,9 +194,10 @@ P-256 and P-384. =item B<-trusted_first> -Use certificates in CA file or CA directory before certificates in untrusted -file when building the trust chain to verify certificates. -This is mainly useful in environments with Bridge CA or Cross-Certified CAs. +When constructing the certificate chain, use the trusted certificates specified +via B<-CAfile>, B<-CApath> or B<-trusted> before any certificates specified via +B<-untrusted>. +This can be useful in environments with Bridge or Cross-Certified CAs. =item B<-no_alt_chains> @@ -188,21 +205,33 @@ When building a certificate chain, if the first certificate chain found is not trusted, then OpenSSL will continue to check to see if an alternative chain can be found that is trusted. With this option that behaviour is suppressed so that only the first chain found is ever used. Using this option will force the -behaviour to match that of OpenSSL versions prior to 1.1.0. +behaviour to match that of OpenSSL versions prior to 1.1.0. =item B<-untrusted file> -A file of untrusted certificates. The file should contain one or more -certificates in PEM format. +A B of additional untrusted certificates (intermediate issuer CAs) used +to constuct a certificate chain from the subject certificate to a trust-anchor. +The B should contain one or more certificates in PEM format. +This option can be specified more than once to include untrusted certiificates +from multiple B. +If you want to enable an B via the B<-engine> option, that option has +to be specified before this one. =item B<-trusted file> -A file of trusted certificates. The file contain one or more -certificates in PEM format. -With this option, no additional (e.g., default) certificate lists -are consulted. That is, the only trusted issuers are those listed -in B. -This option cannot be used with the B<-CAfile> or B<-CApath> options. +A B of trusted certificates, which must be self-signed, unless the +B<-partial_chain> option is specified. +The B contain one or more certificates in PEM format. +With this option, no additional (e.g., default) certificate lists are +consulted. +That is, the only trust-anchors are those listed in B. +This option can be specified more than once to include trusted certificates +from multiple B. +This option implies the B<-no-CAfile> and B<-no-CApath> options. +This option cannot be used in combination with either of the B<-CAfile> or +B<-CApath> options. +If you want to enable an B via the B<-engine> option, that option has +to be specified before this one. =item B<-use_deltas> @@ -233,9 +262,15 @@ the subject certificate. =item B<-verify_name name> -Use default verification options like trust model and required certificate +Use default verification policies like trust model and required certificate policies identified by B. -Supported usages include: default, pkcs7, smime_sign, ssl_client, ssl_server. +Supported policy names include: B, B, B, +B, B. +This checks not only the purpose of the leaf certificate, but also the +trust settings of the trusted CAs. +When in doubt, use this option rather than B<-purpose>. +The B<-verify_name> option more closely matches how certificates are checked in +e.g. SSL and S/MIME. =item B<-x509_strict> @@ -277,20 +312,21 @@ determined. The verify operation consists of a number of separate steps. Firstly a certificate chain is built up starting from the supplied certificate -and ending in the root CA. It is an error if the whole chain cannot be built -up. The chain is built up by looking up the issuers certificate of the current -certificate. If a certificate is found which is its own issuer it is assumed -to be the root CA. - -The process of 'looking up the issuers certificate' itself involves a number -of steps. -Ater all certificates -whose subject name matches the issuer name of the current certificate are -subject to further tests. The relevant authority key identifier components -of the current certificate (if present) must match the subject key identifier -(if present) and issuer and serial number of the candidate issuer, in addition -the keyUsage extension of the candidate issuer (if present) must permit -certificate signing. +and ending in the root CA. +It is an error if the whole chain cannot be built up. +The chain is built up by looking up the issuers certificate of the current +certificate. +If a certificate is found which is its own issuer it is assumed to be the root +CA. + +The process of 'looking up the issuers certificate' itself involves a number of +steps. +Ater all certificates whose subject name matches the issuer name of the current +certificate are subject to further tests. +The relevant authority key identifier components of the current certificate (if +present) must match the subject key identifier (if present) and issuer and +serial number of the candidate issuer, in addition the keyUsage extension of +the candidate issuer (if present) must permit certificate signing. The lookup first looks in the list of untrusted certificates and if no match is found the remaining lookups are from the trusted certificates. The root CA @@ -305,10 +341,10 @@ compatible with the supplied purpose and all other certificates must also be val CA certificates. The precise extensions required are described in more detail in the B section of the B utility. -The third operation is to check the trust settings on the root CA. The root -CA should be trusted for the supplied purpose. For compatibility with previous -versions of OpenSSL, a certificate with no trust settings is considered -to be valid for all purposes. +The third operation is to check the trust settings on the root CA. The root CA +should be trusted for the supplied purpose. +For compatibility with previous versions of OpenSSL, a certificate with no +trust settings is considered to be valid for all purposes. The final operation is to check the validity of the certificate chain. The validity period is checked against the current system time and the notBefore and notAfter @@ -333,7 +369,7 @@ problem was detected starting with zero for the certificate being verified itsel then 1 for the CA that signed the certificate and so on. Finally a text version of the error number is presented. -An exhaustive list of the error codes and messages is shown below, this also +An partial list of the error codes and messages is shown below, this also includes the name of the error code as defined in the header file x509_vfy.h Some of the error codes are defined but never returned: these are described as "unused". diff --git a/test/recipes/25-test_verify.t b/test/recipes/25-test_verify.t index 1059878683..030e4a5766 100644 --- a/test/recipes/25-test_verify.t +++ b/test/recipes/25-test_verify.t @@ -8,10 +8,6 @@ use OpenSSL::Test qw/:DEFAULT top_dir top_file/; setup("test_verify"); -# Note for now, at most one trusted and one untrusted PEM file can be -# specified. The verify(1) option parser does not accumulate content -# from multiple trusted or untrusted files. -# sub verify { my ($cert, $vname, $trusted, $untrusted, @opts) = @_; my @args = qw(openssl verify -verify_name);