]> git.proxmox.com Git - libgit2.git/commitdiff
Setup better defaults for OpenSSL ciphers
authorDirkjan Bussink <d.bussink@gmail.com>
Mon, 14 Mar 2016 12:02:00 +0000 (12:02 +0000)
committerEdward Thomson <ethomson@github.com>
Mon, 11 Apr 2016 19:58:56 +0000 (15:58 -0400)
This ensures that when using OpenSSL a safe default set of ciphers
is selected. This is done so that the client communicates securely
and we don't accidentally enable unsafe ciphers like RC4, or even
worse some old export ciphers.

Implements the first part of https://github.com/libgit2/libgit2/issues/3682

include/git2/common.h
src/global.c
src/global.h
src/openssl_stream.c
src/settings.c
tests/online/badssl.c

index c1efee3202e021bfabed76447a83c26be97148ec..0629abb7f9ab6126ea89680ab76b78acd5cc669f 100644 (file)
@@ -149,6 +149,7 @@ typedef enum {
        GIT_OPT_SET_SSL_CERT_LOCATIONS,
        GIT_OPT_SET_USER_AGENT,
        GIT_OPT_ENABLE_STRICT_OBJECT_CREATION,
+       GIT_OPT_SET_SSL_CIPHERS,
 } git_libgit2_opt_t;
 
 /**
@@ -260,6 +261,11 @@ typedef enum {
  *             > example, when this is enabled, the parent(s) and tree inputs
  *             > will be validated when creating a new commit.  This defaults
  *             > to disabled.
+ *     * opts(GIT_OPT_SET_SSL_CIPHERS, const char *ciphers)
+ *
+ *             > Set the SSL ciphers use for HTTPS connections.
+ *             >
+ *             > - `ciphers` is the list of ciphers that are eanbled.
  *
  * @param option Option key
  * @param ... value to set the option
index 0bfde1e04e01249ec00cacce64c0e5e2bc5d1a8e..c725b51843c0f9348e64e1cd0f899ac125b3194c 100644 (file)
@@ -27,6 +27,7 @@ static git_global_shutdown_fn git__shutdown_callbacks[MAX_SHUTDOWN_CB];
 static git_atomic git__n_shutdown_callbacks;
 static git_atomic git__n_inits;
 char *git__user_agent;
+char *git__ssl_ciphers;
 
 void git__on_shutdown(git_global_shutdown_fn callback)
 {
@@ -83,6 +84,7 @@ static void shutdown_common(void)
        }
 
        git__free(git__user_agent);
+       git__free(git__ssl_ciphers);
 
 #if defined(GIT_MSVC_CRTDBG)
        git_win32__crtdbg_stacktrace_cleanup();
index 9fdcee5733ad5017e9501adee73d7223d51bd7d5..219951525d76976ae66ec8f1cbb24efb54798815 100644 (file)
@@ -36,5 +36,6 @@ extern void git__on_shutdown(git_global_shutdown_fn callback);
 extern void git__free_tls_data(void);
 
 extern const char *git_libgit2__user_agent(void);
+extern const char *git_libgit2__ssl_ciphers(void);
 
 #endif
index 97736b7149df76869eb9f66df35ee3702e79c5de..a65f5586eec42a7bb765c32c4d8123e2759fcaa8 100644 (file)
@@ -34,6 +34,8 @@
 
 SSL_CTX *git__ssl_ctx;
 
+#define GIT_SSL_DEFAULT_CIPHERS "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES128-SHA256:DHE-DSS-AES256-SHA256:DHE-DSS-AES128-SHA:DHE-DSS-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA"
+
 #ifdef GIT_THREADS
 
 static git_mutex *openssl_locks;
@@ -85,6 +87,7 @@ int git_openssl_stream_global_init(void)
 {
 #ifdef GIT_OPENSSL
        long ssl_opts = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3;
+       const char *ciphers = git_libgit2__ssl_ciphers();
 
        /* Older OpenSSL and MacOS OpenSSL doesn't have this */
 #ifdef SSL_OP_NO_COMPRESSION
@@ -108,6 +111,16 @@ int git_openssl_stream_global_init(void)
                git__ssl_ctx = NULL;
                return -1;
        }
+
+       if (!ciphers) {
+               ciphers = GIT_SSL_DEFAULT_CIPHERS;
+       }
+
+       if(!SSL_CTX_set_cipher_list(git__ssl_ctx, ciphers)) {
+               SSL_CTX_free(git__ssl_ctx);
+               git__ssl_ctx = NULL;
+               return -1;
+       }
 #endif
 
        git__on_shutdown(shutdown_ssl);
index 88602bad0d350cbfd44cf183c99fa0dd6c97c49f..c0e503d375bff8ede755da7f3109c75fb2389fc9 100644 (file)
@@ -71,12 +71,18 @@ static int config_level_to_sysdir(int config_level)
 }
 
 extern char *git__user_agent;
+extern char *git__ssl_ciphers;
 
 const char *git_libgit2__user_agent()
 {
        return git__user_agent;
 }
 
+const char *git_libgit2__ssl_ciphers()
+{
+       return git__ssl_ciphers;
+}
+
 int git_libgit2_opts(int key, ...)
 {
        int error = 0;
@@ -187,6 +193,22 @@ int git_libgit2_opts(int key, ...)
                git_object__strict_input_validation = (va_arg(ap, int) != 0);
                break;
 
+       case GIT_OPT_SET_SSL_CIPHERS:
+#ifdef GIT_OPENSSL
+               {
+                       git__free(git__ssl_ciphers);
+                       git__ssl_ciphers = git__strdup(va_arg(ap, const char *));
+                       if (!git__ssl_ciphers) {
+                               giterr_set_oom();
+                               error = -1;
+                       }
+               }
+#else
+               giterr_set(GITERR_NET, "Cannot set custom ciphers: OpenSSL is not enabled");
+               error = -1;
+#endif
+               break;
+
        default:
                giterr_set(GITERR_INVALID, "invalid option key");
                error = -1;
index 12badbda3b8684955893c0f4bb06f4503288cc14..141f22f92603df4b971b58e788ceb5507494823a 100644 (file)
@@ -36,3 +36,12 @@ void test_online_badssl__self_signed(void)
        cl_git_fail_with(GIT_ECERTIFICATE,
                         git_clone(&g_repo, "https://self-signed.badssl.com/fake.git", "./fake", NULL));
 }
+
+void test_online_badssl__old_cipher(void)
+{
+       if (!g_has_ssl)
+               cl_skip();
+
+       cl_git_fail_with(GIT_ERROR,
+                        git_clone(&g_repo, "https://rc4.badssl.com/fake.git", "./fake", NULL));
+}