# HG changeset patch # User Aki Tuomi # Date 1548063390 -7200 # Node ID f71099c5f00751df161d6fbc50ba2ff88e959745 # Parent fb58bb0c8b8543f4aec46a91bf071462b9a06b55 login-common: Ensure we get username from certificate diff -r fb58bb0c8b85 -r f71099c5f007 src/login-common/sasl-server.c --- a/src/login-common/sasl-server.c Thu Jan 31 14:07:19 2019 +0200 +++ b/src/login-common/sasl-server.c Mon Jan 21 11:36:30 2019 +0200 @@ -321,6 +321,37 @@ } } +static bool get_cert_username(struct client *client, const char **username_r, + const char **error_r) +{ + /* no SSL */ + if (client->ssl_proxy == NULL) { + *username_r = NULL; + return TRUE; + } + + /* no client certificate */ + if (!ssl_proxy_has_valid_client_cert(client->ssl_proxy)) { + *username_r = NULL; + return TRUE; + } + + /* get peer name */ + const char *username = ssl_proxy_get_peer_name(client->ssl_proxy); + + /* if we wanted peer name, but it was not there, fail */ + if (client->set->auth_ssl_username_from_cert && + (username == NULL || *username == '\0')) { + if (client->set->auth_ssl_require_client_cert) { + *error_r = "Missing username in certificate"; + return FALSE; + } + } + + *username_r = username; + return TRUE; +} + void sasl_server_auth_begin(struct client *client, const char *service, const char *mech_name, const char *initial_resp_base64, @@ -359,8 +390,15 @@ info.mech = mech->name; info.service = service; info.session_id = client_get_session_id(client); - info.cert_username = client->ssl_proxy == NULL ? NULL : - ssl_proxy_get_peer_name(client->ssl_proxy); + if (client->set->auth_ssl_username_from_cert) { + const char *error; + if (!get_cert_username(client, &info.cert_username, &error)) { + client_log_err(client, t_strdup_printf("Cannot get username " + "from certificate: %s", error)); + sasl_server_auth_failed(client, "Unable to validate certificate"); + return; + } + } info.flags = client_get_auth_flags(client); info.local_ip = client->local_ip; info.remote_ip = client->ip;