Spaces:
Sleeping
Sleeping
/** | |
* SSL utilities for Requests | |
* | |
* @package Requests\Utilities | |
*/ | |
namespace WpOrg\Requests; | |
use WpOrg\Requests\Exception\InvalidArgument; | |
use WpOrg\Requests\Utility\InputValidator; | |
/** | |
* SSL utilities for Requests | |
* | |
* Collection of utilities for working with and verifying SSL certificates. | |
* | |
* @package Requests\Utilities | |
*/ | |
final class Ssl { | |
/** | |
* Verify the certificate against common name and subject alternative names | |
* | |
* Unfortunately, PHP doesn't check the certificate against the alternative | |
* names, leading things like 'https://www.github.com/' to be invalid. | |
* | |
* @link https://tools.ietf.org/html/rfc2818#section-3.1 RFC2818, Section 3.1 | |
* | |
* @param string|Stringable $host Host name to verify against | |
* @param array $cert Certificate data from openssl_x509_parse() | |
* @return bool | |
* @throws \WpOrg\Requests\Exception\InvalidArgument When the passed $host argument is not a string or a stringable object. | |
* @throws \WpOrg\Requests\Exception\InvalidArgument When the passed $cert argument is not an array or array accessible. | |
*/ | |
public static function verify_certificate($host, $cert) { | |
if (InputValidator::is_string_or_stringable($host) === false) { | |
throw InvalidArgument::create(1, '$host', 'string|Stringable', gettype($host)); | |
} | |
if (InputValidator::has_array_access($cert) === false) { | |
throw InvalidArgument::create(2, '$cert', 'array|ArrayAccess', gettype($cert)); | |
} | |
$has_dns_alt = false; | |
// Check the subjectAltName | |
if (!empty($cert['extensions']['subjectAltName'])) { | |
$altnames = explode(',', $cert['extensions']['subjectAltName']); | |
foreach ($altnames as $altname) { | |
$altname = trim($altname); | |
if (strpos($altname, 'DNS:') !== 0) { | |
continue; | |
} | |
$has_dns_alt = true; | |
// Strip the 'DNS:' prefix and trim whitespace | |
$altname = trim(substr($altname, 4)); | |
// Check for a match | |
if (self::match_domain($host, $altname) === true) { | |
return true; | |
} | |
} | |
if ($has_dns_alt === true) { | |
return false; | |
} | |
} | |
// Fall back to checking the common name if we didn't get any dNSName | |
// alt names, as per RFC2818 | |
if (!empty($cert['subject']['CN'])) { | |
// Check for a match | |
return (self::match_domain($host, $cert['subject']['CN']) === true); | |
} | |
return false; | |
} | |
/** | |
* Verify that a reference name is valid | |
* | |
* Verifies a dNSName for HTTPS usage, (almost) as per Firefox's rules: | |
* - Wildcards can only occur in a name with more than 3 components | |
* - Wildcards can only occur as the last character in the first | |
* component | |
* - Wildcards may be preceded by additional characters | |
* | |
* We modify these rules to be a bit stricter and only allow the wildcard | |
* character to be the full first component; that is, with the exclusion of | |
* the third rule. | |
* | |
* @param string|Stringable $reference Reference dNSName | |
* @return boolean Is the name valid? | |
* @throws \WpOrg\Requests\Exception\InvalidArgument When the passed argument is not a string or a stringable object. | |
*/ | |
public static function verify_reference_name($reference) { | |
if (InputValidator::is_string_or_stringable($reference) === false) { | |
throw InvalidArgument::create(1, '$reference', 'string|Stringable', gettype($reference)); | |
} | |
if ($reference === '') { | |
return false; | |
} | |
if (preg_match('`\s`', $reference) > 0) { | |
// Whitespace detected. This can never be a dNSName. | |
return false; | |
} | |
$parts = explode('.', $reference); | |
if ($parts !== array_filter($parts)) { | |
// DNSName cannot contain two dots next to each other. | |
return false; | |
} | |
// Check the first part of the name | |
$first = array_shift($parts); | |
if (strpos($first, '*') !== false) { | |
// Check that the wildcard is the full part | |
if ($first !== '*') { | |
return false; | |
} | |
// Check that we have at least 3 components (including first) | |
if (count($parts) < 2) { | |
return false; | |
} | |
} | |
// Check the remaining parts | |
foreach ($parts as $part) { | |
if (strpos($part, '*') !== false) { | |
return false; | |
} | |
} | |
// Nothing found, verified! | |
return true; | |
} | |
/** | |
* Match a hostname against a dNSName reference | |
* | |
* @param string|Stringable $host Requested host | |
* @param string|Stringable $reference dNSName to match against | |
* @return boolean Does the domain match? | |
* @throws \WpOrg\Requests\Exception\InvalidArgument When either of the passed arguments is not a string or a stringable object. | |
*/ | |
public static function match_domain($host, $reference) { | |
if (InputValidator::is_string_or_stringable($host) === false) { | |
throw InvalidArgument::create(1, '$host', 'string|Stringable', gettype($host)); | |
} | |
// Check if the reference is blocklisted first | |
if (self::verify_reference_name($reference) !== true) { | |
return false; | |
} | |
// Check for a direct match | |
if ((string) $host === (string) $reference) { | |
return true; | |
} | |
// Calculate the valid wildcard match if the host is not an IP address | |
// Also validates that the host has 3 parts or more, as per Firefox's ruleset, | |
// as a wildcard reference is only allowed with 3 parts or more, so the | |
// comparison will never match if host doesn't contain 3 parts or more as well. | |
if (ip2long($host) === false) { | |
$parts = explode('.', $host); | |
$parts[0] = '*'; | |
$wildcard = implode('.', $parts); | |
if ($wildcard === (string) $reference) { | |
return true; | |
} | |
} | |
return false; | |
} | |
} | |