2023-06-20 13:26:14 +02:00
|
|
|
== How to fix it in OpenSSL
|
|
|
|
|
|
|
|
=== Code examples
|
|
|
|
|
|
|
|
include::../../common/fix/code-rationale.adoc[]
|
|
|
|
|
|
|
|
Certificate validation is not enabled by default and has to be explicitly
|
|
|
|
enabled through `set_verify`.
|
|
|
|
|
|
|
|
==== Noncompliant code example
|
|
|
|
|
|
|
|
[source,python,diff-id=1,diff-type=noncompliant]
|
|
|
|
----
|
|
|
|
from OpenSSL import SSL
|
|
|
|
|
|
|
|
ctx1 = SSL.Context(SSL.TLSv1_2_METHOD) # Noncompliant
|
|
|
|
|
|
|
|
ctx2 = SSL.Context(SSL.TLSv1_2_METHOD)
|
|
|
|
ctx2.set_verify(SSL.VERIFY_NONE, verify_callback) # Noncompliant
|
|
|
|
----
|
|
|
|
|
|
|
|
==== Compliant solution
|
|
|
|
|
2023-08-21 15:22:49 +02:00
|
|
|
[source,python,diff-id=1,diff-type=compliant]
|
2023-06-20 13:26:14 +02:00
|
|
|
----
|
|
|
|
from OpenSSL import SSL
|
|
|
|
|
|
|
|
ctx = SSL.Context(SSL.TLSv1_2_METHOD)
|
|
|
|
ctx.set_verify(SSL.VERIFY_PEER, verify_callback)
|
|
|
|
ctx.set_verify(SSL.VERIFY_PEER | SSL.VERIFY_FAIL_IF_NO_PEER_CERT, verify_callback)
|
|
|
|
ctx.set_verify(SSL.VERIFY_PEER | SSL.VERIFY_FAIL_IF_NO_PEER_CERT | SSL.VERIFY_CLIENT_ONCE, verify_callback)
|
|
|
|
----
|
|
|
|
|
|
|
|
=== How does this work?
|
|
|
|
|
|
|
|
include::../../common/fix/validation.adoc[]
|
|
|
|
|