Created
July 8, 2011 12:26
-
-
Save emboss/1071724 to your computer and use it in GitHub Desktop.
SSL Server that accepts no clients
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require 'socket' | |
require 'openssl' | |
class MyServer | |
DHParam = OpenSSL::PKey::DH.new(128) | |
TEST_KEY_RSA1024 = OpenSSL::PKey::RSA.new <<-_end_of_pem_ | |
-----BEGIN RSA PRIVATE KEY----- | |
MIICXgIBAAKBgQDLwsSw1ECnPtT+PkOgHhcGA71nwC2/nL85VBGnRqDxOqjVh7Cx | |
aKPERYHsk4BPCkE3brtThPWc9kjHEQQ7uf9Y1rbCz0layNqHyywQEVLFmp1cpIt/ | |
Q3geLv8ZD9pihowKJDyMDiN6ArYUmZczvW4976MU3+l54E6lF/JfFEU5hwIDAQAB | |
AoGBAKSl/MQarye1yOysqX6P8fDFQt68VvtXkNmlSiKOGuzyho0M+UVSFcs6k1L0 | |
maDE25AMZUiGzuWHyaU55d7RXDgeskDMakD1v6ZejYtxJkSXbETOTLDwUWTn618T | |
gnb17tU1jktUtU67xK/08i/XodlgnQhs6VoHTuCh3Hu77O6RAkEA7+gxqBuZR572 | |
74/akiW/SuXm0SXPEviyO1MuSRwtI87B02D0qgV8D1UHRm4AhMnJ8MCs1809kMQE | |
JiQUCrp9mQJBANlt2ngBO14us6NnhuAseFDTBzCHXwUUu1YKHpMMmxpnGqaldGgX | |
sOZB3lgJsT9VlGf3YGYdkLTNVbogQKlKpB8CQQDiSwkb4vyQfDe8/NpU5Not0fII | |
8jsDUCb+opWUTMmfbxWRR3FBNu8wnym/m19N4fFj8LqYzHX4KY0oVPu6qvJxAkEA | |
wa5snNekFcqONLIE4G5cosrIrb74sqL8GbGb+KuTAprzj5z1K8Bm0UW9lTjVDjDi | |
qRYgZfZSL+x1P/54+xTFSwJAY1FxA/N3QPCXCjPh5YqFxAMQs2VVYTfg+t0MEcJD | |
dPMQD5JX6g5HKnHFg2mZtoXQrWmJSn7p8GJK8yNTopEErA== | |
-----END RSA PRIVATE KEY----- | |
_end_of_pem_ | |
TEST_KEY_RSA2048 = OpenSSL::PKey::RSA.new <<-_end_of_pem_ | |
-----BEGIN RSA PRIVATE KEY----- | |
MIIEpAIBAAKCAQEAuV9ht9J7k4NBs38jOXvvTKY9gW8nLICSno5EETR1cuF7i4pN | |
s9I1QJGAFAX0BEO4KbzXmuOvfCpD3CU+Slp1enenfzq/t/e/1IRW0wkJUJUFQign | |
4CtrkJL+P07yx18UjyPlBXb81ApEmAB5mrJVSrWmqbjs07JbuS4QQGGXLc+Su96D | |
kYKmSNVjBiLxVVSpyZfAY3hD37d60uG+X8xdW5v68JkRFIhdGlb6JL8fllf/A/bl | |
NwdJOhVr9mESHhwGjwfSeTDPfd8ZLE027E5lyAVX9KZYcU00mOX+fdxOSnGqS/8J | |
DRh0EPHDL15RcJjV2J6vZjPb0rOYGDoMcH+94wIDAQABAoIBAAzsamqfYQAqwXTb | |
I0CJtGg6msUgU7HVkOM+9d3hM2L791oGHV6xBAdpXW2H8LgvZHJ8eOeSghR8+dgq | |
PIqAffo4x1Oma+FOg3A0fb0evyiACyrOk+EcBdbBeLo/LcvahBtqnDfiUMQTpy6V | |
seSoFCwuN91TSCeGIsDpRjbG1vxZgtx+uI+oH5+ytqJOmfCksRDCkMglGkzyfcl0 | |
Xc5CUhIJ0my53xijEUQl19rtWdMnNnnkdbG8PT3LZlOta5Do86BElzUYka0C6dUc | |
VsBDQ0Nup0P6rEQgy7tephHoRlUGTYamsajGJaAo1F3IQVIrRSuagi7+YpSpCqsW | |
wORqorkCgYEA7RdX6MDVrbw7LePnhyuaqTiMK+055/R1TqhB1JvvxJ1CXk2rDL6G | |
0TLHQ7oGofd5LYiemg4ZVtWdJe43BPZlVgT6lvL/iGo8JnrncB9Da6L7nrq/+Rvj | |
XGjf1qODCK+LmreZWEsaLPURIoR/Ewwxb9J2zd0CaMjeTwafJo1CZvcCgYEAyCgb | |
aqoWvUecX8VvARfuA593Lsi50t4MEArnOXXcd1RnXoZWhbx5rgO8/ATKfXr0BK/n | |
h2GF9PfKzHFm/4V6e82OL7gu/kLy2u9bXN74vOvWFL5NOrOKPM7Kg+9I131kNYOw | |
Ivnr/VtHE5s0dY7JChYWE1F3vArrOw3T00a4CXUCgYEA0SqY+dS2LvIzW4cHCe9k | |
IQqsT0yYm5TFsUEr4sA3xcPfe4cV8sZb9k/QEGYb1+SWWZ+AHPV3UW5fl8kTbSNb | |
v4ng8i8rVVQ0ANbJO9e5CUrepein2MPL0AkOATR8M7t7dGGpvYV0cFk8ZrFx0oId | |
U0PgYDotF/iueBWlbsOM430CgYEAqYI95dFyPI5/AiSkY5queeb8+mQH62sdcCCr | |
vd/w/CZA/K5sbAo4SoTj8dLk4evU6HtIa0DOP63y071eaxvRpTNqLUOgmLh+D6gS | |
Cc7TfLuFrD+WDBatBd5jZ+SoHccVrLR/4L8jeodo5FPW05A+9gnKXEXsTxY4LOUC | |
9bS4e1kCgYAqVXZh63JsMwoaxCYmQ66eJojKa47VNrOeIZDZvd2BPVf30glBOT41 | |
gBoDG3WMPZoQj9pb7uMcrnvs4APj2FIhMU8U15LcPAj59cD6S6rWnAxO8NFK7HQG | |
4Jxg3JNNf8ErQoCHb1B3oVdXJkmbJkARoDpBKmTCgKtP8ADYLmVPQw== | |
-----END RSA PRIVATE KEY----- | |
_end_of_pem_ | |
def initialize | |
@ca = OpenSSL::X509::Name.parse("/DC=org/DC=ruby-lang/CN=CA") | |
@svr = OpenSSL::X509::Name.parse("/DC=org/DC=ruby-lang/CN=localhost") | |
now = Time.at(Time.now.to_i) | |
ca_exts = [ | |
["basicConstraints","CA:TRUE",true], | |
["keyUsage","cRLSign,keyCertSign",true], | |
] | |
ee_exts = [ | |
["keyUsage","keyEncipherment,digitalSignature",true], | |
] | |
@ca_key = TEST_KEY_RSA2048 | |
@svr_key = TEST_KEY_RSA1024 | |
@ca_cert = issue_cert(@ca, @ca_key, 1, now, now+3600, ca_exts, nil, nil, OpenSSL::Digest::SHA1.new) | |
@svr_cert = issue_cert(@svr, @svr_key, 2, now, now+1800, ee_exts, @ca_cert, @ca_key, OpenSSL::Digest::SHA1.new) | |
end | |
def issue_cert(dn, key, serial, not_before, not_after, extensions, | |
issuer, issuer_key, digest) | |
cert = OpenSSL::X509::Certificate.new | |
issuer = cert unless issuer | |
issuer_key = key unless issuer_key | |
cert.version = 2 | |
cert.serial = serial | |
cert.subject = dn | |
cert.issuer = issuer.subject | |
cert.public_key = key.public_key | |
cert.not_before = not_before | |
cert.not_after = not_after | |
ef = OpenSSL::X509::ExtensionFactory.new | |
ef.subject_certificate = cert | |
ef.issuer_certificate = issuer | |
extensions.each{|oid, value, critical| | |
cert.add_extension(ef.create_extension(oid, value, critical)) | |
} | |
cert.sign(issuer_key, digest) | |
cert | |
end | |
def readwrite_loop(ctx, ssl) | |
while line = ssl.gets | |
if line =~ /^STARTTLS$/ | |
ssl.accept | |
next | |
end | |
ssl.write(line) | |
end | |
rescue OpenSSL::SSL::SSLError | |
rescue IOError | |
ensure | |
ssl.close rescue nil | |
end | |
def server_loop(ctx, ssls, server_proc) | |
loop do | |
ssl = nil | |
begin | |
ssl = ssls.accept | |
rescue OpenSSL::SSL::SSLError | |
retry | |
end | |
Thread.start do | |
Thread.current.abort_on_exception = true | |
server_proc.call(ctx, ssl) | |
end | |
end | |
rescue Errno::EBADF, IOError, Errno::EINVAL, Errno::ECONNABORTED, Errno::ENOTSOCK | |
end | |
def start_server(port0, verify_mode, start_immediately, args = {}, &block) | |
ctx_proc = args[:ctx_proc] | |
server_proc = args[:server_proc] | |
server_proc ||= method(:readwrite_loop) | |
store = OpenSSL::X509::Store.new | |
store.add_cert(@ca_cert) | |
store.purpose = OpenSSL::X509::PURPOSE_SSL_CLIENT | |
ctx = OpenSSL::SSL::SSLContext.new | |
ctx.cert_store = store | |
#ctx.extra_chain_cert = [ ca_cert ] | |
ctx.cert = @svr_cert | |
ctx.key = @svr_key | |
ctx.verify_mode = verify_mode | |
ctx_proc.call(ctx) if ctx_proc | |
Socket.do_not_reverse_lookup = true | |
tcps = nil | |
port = port0 | |
begin | |
tcps = TCPServer.new("127.0.0.1", port) | |
rescue Errno::EADDRINUSE | |
port += 1 | |
retry | |
end | |
ssls = OpenSSL::SSL::SSLServer.new(tcps, ctx) | |
ssls.start_immediately = start_immediately | |
begin | |
server = Thread.new do | |
Thread.current.abort_on_exception = true | |
server_loop(ctx, ssls, server_proc) | |
end | |
$stderr.printf("%s started: pid=%d port=%d\n", SSL_SERVER, pid, port) if $DEBUG | |
block.call(server, port.to_i) | |
ensure | |
begin | |
begin | |
tcps.shutdown | |
rescue Errno::ENOTCONN | |
tcps.close | |
tcps = nil | |
end if (tcps) | |
if (server) | |
server.join(5) | |
if server.alive? | |
server.kill | |
server.join | |
flunk("TCPServer was closed and SSLServer is still alive") unless $! | |
end | |
end | |
ensure | |
tcps.close if (tcps) | |
end | |
end | |
end | |
end | |
vflag = OpenSSL::SSL::VERIFY_PEER|OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT | |
#vflag = OpenSSL::SSL::VERIFY_NONE #it would succeed if this was used | |
server = MyServer.new | |
server.start_server(20443, vflag, true){|server, port| | |
ctx = OpenSSL::SSL::SSLContext.new | |
ctx.key = @cli_key | |
ctx.cert = @cli_cert | |
sock = TCPSocket.new("127.0.0.1", port) | |
ssl = OpenSSL::SSL::SSLSocket.new(sock, ctx) | |
ssl.sync_close = true | |
ssl.connect # will always fail | |
ssl.close | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment