1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-07-21 04:34:15 -04:00
v2fly/transport/internet/tls/config_other.go
Shelikhoo a53fd35205
separate client ca and server ca
This is designed to prevent a server from being attacked with a client with a certificate issued by a trusted system CA.
Some commercial CA actually can issue certificate to individual to proof their identity. The server should not accept these certs as a valid client certificates.
2021-09-01 22:34:13 +01:00

63 lines
1.3 KiB
Go

//go:build !windows && !confonly
// +build !windows,!confonly
package tls
import (
"crypto/x509"
"sync"
)
type rootCertsCache struct {
sync.Mutex
pool *x509.CertPool
}
func (c *rootCertsCache) load() (*x509.CertPool, error) {
c.Lock()
defer c.Unlock()
if c.pool != nil {
return c.pool, nil
}
pool, err := x509.SystemCertPool()
if err != nil {
return nil, err
}
c.pool = pool
return pool, nil
}
var rootCerts rootCertsCache
func (c *Config) getCertPool() (*x509.CertPool, error) {
if c.DisableSystemRoot {
return c.loadSelfCertPool()
}
if len(c.Certificate) == 0 {
return rootCerts.load()
}
pool, err := x509.SystemCertPool()
if err != nil {
return nil, newError("system root").AtWarning().Base(err)
}
for _, cert := range c.Certificate {
/* Do not treat client certificate authority as a peer certificate authority.
This is designed to prevent a client certificate with a permissive key usage from being used to attacker server.
In next release, the certificate usage will be enforced strictly.
Only a certificate with AUTHORITY_VERIFY usage will be accepted.
*/
if cert.Usage == Certificate_AUTHORITY_VERIFY_CLIENT {
continue
}
if !pool.AppendCertsFromPEM(cert.Certificate) {
return nil, newError("append cert to root").AtWarning().Base(err)
}
}
return pool, err
}