crypto/tls: don't send IP literals as SNI values.

https://tools.ietf.org/html/rfc6066#section-3 states:

  “Literal IPv4 and IPv6 addresses are not permitted in "HostName".”

However, if an IP literal was set as Config.ServerName (which could
happen as easily as calling Dial with an IP address) then the code would
send the IP literal as the SNI value.

This change filters out IP literals, as recognised by net.ParseIP, from
being sent as the SNI value.

Fixes #13111.

Change-Id: Ie9ec7acc767ae172b48c9c6dd8d84fa27b1cf0de
Reviewed-on: https://go-review.googlesource.com/16742
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
This commit is contained in:
Adam Langley 2015-11-08 19:10:14 -08:00
parent 7c45cbeef9
commit 25dd71bbe6
3 changed files with 37 additions and 2 deletions

View File

@ -286,7 +286,8 @@ type Config struct {
// ServerName is used to verify the hostname on the returned // ServerName is used to verify the hostname on the returned
// certificates unless InsecureSkipVerify is given. It is also included // certificates unless InsecureSkipVerify is given. It is also included
// in the client's handshake to support virtual hosting. // in the client's handshake to support virtual hosting unless it is
// an IP address.
ServerName string ServerName string
// ClientAuth determines the server's policy for // ClientAuth determines the server's policy for

View File

@ -49,13 +49,20 @@ func (c *Conn) clientHandshake() error {
return errors.New("tls: NextProtos values too large") return errors.New("tls: NextProtos values too large")
} }
sni := c.config.ServerName
// IP address literals are not permitted as SNI values. See
// https://tools.ietf.org/html/rfc6066#section-3.
if net.ParseIP(sni) != nil {
sni = ""
}
hello := &clientHelloMsg{ hello := &clientHelloMsg{
vers: c.config.maxVersion(), vers: c.config.maxVersion(),
compressionMethods: []uint8{compressionNone}, compressionMethods: []uint8{compressionNone},
random: make([]byte, 32), random: make([]byte, 32),
ocspStapling: true, ocspStapling: true,
scts: true, scts: true,
serverName: c.config.ServerName, serverName: sni,
supportedCurves: c.config.curvePreferences(), supportedCurves: c.config.curvePreferences(),
supportedPoints: []uint8{pointFormatUncompressed}, supportedPoints: []uint8{pointFormatUncompressed},
nextProtoNeg: len(c.config.NextProtos) > 0, nextProtoNeg: len(c.config.NextProtos) > 0,

View File

@ -600,3 +600,30 @@ func TestHandshakClientSCTs(t *testing.T) {
} }
runClientTestTLS12(t, test) runClientTestTLS12(t, test)
} }
func TestNoIPAddressesInSNI(t *testing.T) {
for _, ipLiteral := range []string{"1.2.3.4", "::1"} {
c, s := net.Pipe()
go func() {
client := Client(c, &Config{ServerName: ipLiteral})
client.Handshake()
}()
var header [5]byte
if _, err := io.ReadFull(s, header[:]); err != nil {
t.Fatal(err)
}
recordLen := int(header[3])<<8 | int(header[4])
record := make([]byte, recordLen)
if _, err := io.ReadFull(s, record[:]); err != nil {
t.Fatal(err)
}
s.Close()
if bytes.Index(record, []byte(ipLiteral)) != -1 {
t.Errorf("IP literal %q found in ClientHello: %x", ipLiteral, record)
}
}
}