| #
69c3516b |
| 17-Dec-2013 |
Joakim Söderberg <[email protected]> |
Get rid of deprecation warnings for OpenSSL on OSX 10.7+
|
| #
19222e52 |
| 13-Dec-2013 |
Joakim Soderberg <[email protected]> |
Added some GCC specific options.
- Added sample applications. - Fixed the https-client to work on Windows kind of (No cert validation).
|
|
Revision tags: release-2.1.3-alpha |
|
| #
29af65eb |
| 14-Apr-2013 |
Alexey Ozeritsky <[email protected]> |
https-client: code cleanup
|
| #
95acdaa3 |
| 10-Apr-2013 |
Nick Mathewson <[email protected]> |
Another tweak to https-client.c
|
| #
8a90a850 |
| 10-Apr-2013 |
Nick Mathewson <[email protected]> |
Remove http_struct.h usage in sample/https-client.c
|
| #
c5887f73 |
| 11-Mar-2013 |
Alexey Ozeritsky <[email protected]> |
POST supported, args supported
|
| #
64d9f161 |
| 28-Feb-2013 |
Patrick Pelletier <[email protected]> |
use iSECPartners code to validate hostname in certificate
The problem is that if you go to a website whose certificate does not match its hostname, it should fail. Try this in a web browser for htt
use iSECPartners code to validate hostname in certificate
The problem is that if you go to a website whose certificate does not match its hostname, it should fail. Try this in a web browser for https://www.kegel.com/ for example. Your web browser will say the certificate is for *.pair.com, not for www.kegel.com, and won't let you visit it without clicking through a bunch of scary warnings.
However, prior to this commit, https-client was happy to fetch https://www.kegel.com/ without complaining. That is bad. Now, with this commit, it will properly complain, which is good:
pelletier@chives:~/src/libevent/sample$ ./https-client https://www.kegel.com/ Got 'MatchNotFound' for hostname 'www.kegel.com' and certificate: /C=US/postalCode=15203/ST=Pennsylvania/L=Pittsburgh/street=Suite 210/street=2403 Sidney Street/O=pair Networks, Inc./OU=Provided by pair Networks, Inc./OU=PairWildcardSSL $250,000/CN=*.pair.com some request failed - no idea which one though! error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed ppelletier@chives:~/src/libevent/sample$
It will still succeed for sites with an exactly-matching certificate, such as https://github.com/ and that is also good!
However, the problem is that the iSECPartners code doesn't handle wildcards, which means we reject https://ip.appspot.com/ even though it is perfectly legitimate, because we don't understand the wildcard:
ppelletier@chives:~/src/libevent/sample$ ./https-client https://ip.appspot.com/ Got 'MatchNotFound' for hostname 'ip.appspot.com' and certificate: /C=US/ST=California/L=Mountain View/O=Google Inc/CN=*.appspot.com some request failed - no idea which one though! error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed ppelletier@chives:~/src/libevent/sample$
So, we need to fix this. In other words, "to be continued..."
show more ...
|
| #
aacd674c |
| 26-Feb-2013 |
Patrick Pelletier <[email protected]> |
use Debian's default root certificate location
as suggested here: http://archives.seul.org/libevent/users/Feb-2013/msg00034.html
although curl's acinclude.m4 reveals many other possibilities:
dnl
use Debian's default root certificate location
as suggested here: http://archives.seul.org/libevent/users/Feb-2013/msg00034.html
although curl's acinclude.m4 reveals many other possibilities:
dnl /etc/ssl/certs/ca-certificates.crt Debian systems dnl /etc/pki/tls/certs/ca-bundle.crt Redhat and Mandriva dnl /usr/share/ssl/certs/ca-bundle.crt old(er) Redhat dnl /usr/local/share/certs/ca-root.crt FreeBSD dnl /etc/ssl/cert.pem OpenBSD dnl /etc/ssl/certs/ (ca path) SUSE
And none of these cover Windows :(
show more ...
|
| #
5754d96a |
| 26-Feb-2013 |
Patrick Pelletier <[email protected]> |
better handling of OpenSSL errors
|
| #
42d7441a |
| 26-Feb-2013 |
Patrick Pelletier <[email protected]> |
https-client was putting newlines at 256-byte boundaries
presumably this was meant to put a ">" before every line, but that isn't what it does, since evbuffer_remove is simply returning fixed-size c
https-client was putting newlines at 256-byte boundaries
presumably this was meant to put a ">" before every line, but that isn't what it does, since evbuffer_remove is simply returning fixed-size chunks. So, when retrieving a document of more than 256 bytes (e. g. any nontrivial document), we got "> " and newlines thrown in at very arbitrary places.
show more ...
|
| #
be46c99b |
| 19-Feb-2013 |
Catalin Patulea <[email protected]> |
Add sample/https-client.c, an example of stacking evhttp as a client on top of bufferevent_ssl.
Signed-off-by: Catalin Patulea <[email protected]>
|