2023-01-24 15:29:31 +01:00
|
|
|
|
/* Copyright (c) Cloud Software Group, Inc.
|
2013-06-24 13:41:48 +02:00
|
|
|
|
*
|
|
|
|
|
* Redistribution and use in source and binary forms,
|
|
|
|
|
* with or without modification, are permitted provided
|
|
|
|
|
* that the following conditions are met:
|
|
|
|
|
*
|
|
|
|
|
* * Redistributions of source code must retain the above
|
|
|
|
|
* copyright notice, this list of conditions and the
|
|
|
|
|
* following disclaimer.
|
|
|
|
|
* * Redistributions in binary form must reproduce the above
|
|
|
|
|
* copyright notice, this list of conditions and the
|
|
|
|
|
* following disclaimer in the documentation and/or other
|
|
|
|
|
* materials provided with the distribution.
|
|
|
|
|
*
|
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
|
|
|
|
|
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
|
|
|
|
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
|
|
|
|
|
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
|
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
using System.Net;
|
|
|
|
|
using System.Net.Security;
|
|
|
|
|
using System.Security.Cryptography;
|
|
|
|
|
using System.Security.Cryptography.X509Certificates;
|
|
|
|
|
using System.Windows.Forms;
|
|
|
|
|
|
|
|
|
|
using XenAdmin.Core;
|
|
|
|
|
using XenAdmin.Dialogs.Network;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
namespace XenAdmin.Network
|
|
|
|
|
{
|
|
|
|
|
internal class SSL
|
|
|
|
|
{
|
|
|
|
|
private static readonly log4net.ILog log = log4net.LogManager.GetLogger(System.Reflection.MethodBase.GetCurrentMethod().DeclaringType);
|
|
|
|
|
|
|
|
|
|
private static readonly object CertificateValidationLock = new object();
|
|
|
|
|
|
|
|
|
|
internal static bool ValidateServerCertificate(
|
|
|
|
|
object sender,
|
|
|
|
|
X509Certificate certificate,
|
|
|
|
|
X509Chain chain,
|
|
|
|
|
SslPolicyErrors sslPolicyErrors)
|
|
|
|
|
{
|
|
|
|
|
if (sslPolicyErrors == SslPolicyErrors.None)
|
|
|
|
|
{
|
|
|
|
|
log.Debug("SslPolicyErrors is set to None, exiting validation");
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
lock (CertificateValidationLock)
|
|
|
|
|
{
|
|
|
|
|
bool AcceptCertificate = false;
|
|
|
|
|
HttpWebRequest webreq = (HttpWebRequest)sender;
|
|
|
|
|
|
|
|
|
|
//This allows to run tests without MainWindow
|
|
|
|
|
if (Program.MainWindow == null) return true;
|
|
|
|
|
|
|
|
|
|
foreach (KeyValuePair<string, string> kvp in Settings.KnownServers)
|
|
|
|
|
{
|
|
|
|
|
if (kvp.Key != webreq.Address.Host)
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (kvp.Value == certificate.GetCertHashString())
|
|
|
|
|
{
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2019-09-26 13:36:47 +02:00
|
|
|
|
else if (!Properties.Settings.Default.WarnChangedCertificate && Registry.SSLCertificateTypes == SSLCertificateTypes.None)
|
2013-06-24 13:41:48 +02:00
|
|
|
|
{
|
2020-04-05 17:26:45 +02:00
|
|
|
|
Settings.ReplaceCertificate(kvp.Key, certificate.GetCertHashString());
|
2013-06-24 13:41:48 +02:00
|
|
|
|
log.Debug("Updating cert silently");
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2018-10-04 14:14:57 +02:00
|
|
|
|
Program.Invoke(Program.MainWindow, () =>
|
2013-06-24 13:41:48 +02:00
|
|
|
|
{
|
2018-10-04 14:14:57 +02:00
|
|
|
|
using (var dialog = new CertificateChangedDialog(certificate, webreq.Address.Host))
|
|
|
|
|
AcceptCertificate = dialog.ShowDialog(Program.MainWindow) == DialogResult.OK;
|
2013-06-24 13:41:48 +02:00
|
|
|
|
});
|
2018-10-04 14:14:57 +02:00
|
|
|
|
|
2013-06-24 13:41:48 +02:00
|
|
|
|
if (AcceptCertificate)
|
|
|
|
|
log.Debug("Updating cert after confirmation");
|
|
|
|
|
else
|
|
|
|
|
log.Debug("User rejected changed cert");
|
|
|
|
|
return AcceptCertificate;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-26 13:36:47 +02:00
|
|
|
|
if (!Properties.Settings.Default.WarnUnrecognizedCertificate && Registry.SSLCertificateTypes != SSLCertificateTypes.All)
|
2013-06-24 13:41:48 +02:00
|
|
|
|
{
|
|
|
|
|
// user has chosen to ignore new certificates
|
2020-04-05 17:26:45 +02:00
|
|
|
|
Settings.AddCertificate(certificate.GetCertHashString(), webreq.Address.Host);
|
2013-06-24 13:41:48 +02:00
|
|
|
|
log.Debug("Adding new cert silently");
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2018-10-04 14:14:57 +02:00
|
|
|
|
Program.Invoke(Program.MainWindow, () =>
|
2013-06-24 13:41:48 +02:00
|
|
|
|
{
|
2018-10-04 14:14:57 +02:00
|
|
|
|
using (var dialog = new UnknownCertificateDialog(certificate, webreq.Address.Host))
|
|
|
|
|
AcceptCertificate = dialog.ShowDialog(Program.MainWindow) == DialogResult.OK;
|
2013-06-24 13:41:48 +02:00
|
|
|
|
});
|
2018-10-04 14:14:57 +02:00
|
|
|
|
|
2013-06-24 13:41:48 +02:00
|
|
|
|
if (AcceptCertificate)
|
|
|
|
|
log.Debug("Adding cert after confirmation");
|
|
|
|
|
else
|
2015-10-26 17:01:55 +01:00
|
|
|
|
log.Debug("User rejected new cert");
|
2013-06-24 13:41:48 +02:00
|
|
|
|
return AcceptCertificate;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static class X509Ext
|
|
|
|
|
{
|
|
|
|
|
public static bool VerifyInAllStores(this X509Certificate2 certificate2)
|
|
|
|
|
{
|
|
|
|
|
try
|
|
|
|
|
{
|
|
|
|
|
X509Chain chain = new X509Chain(true);
|
|
|
|
|
if (chain.Build(certificate2))
|
|
|
|
|
return true;
|
|
|
|
|
return certificate2.Verify();
|
|
|
|
|
}
|
|
|
|
|
catch (CryptographicException)
|
|
|
|
|
{
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|