[PATCH] Makes https+pycurl urls works with self-certified hosts

John Arbash Meinel john at arbash-meinel.com
Mon Aug 21 15:54:46 BST 2006


Vincent LADEUIL wrote:
>>>>>> "jam" == John Arbash Meinel <john at arbash-meinel.com> writes:
> 
> <snip/>
> 
>     >>  <cough> Setting HHTPS_PROXY (note caps) works. <blush>
> 
>     jam> Well, I hope it is 'HTTPS_PROXY' :)
> 

...

v- The first line of this change seems accidental, you don't really want
the extra whitespace, do you?

Also, you are again using Tabs, rather than space characters.

>          ua_str = 'bzr/%s (pycurl)' % (bzrlib.__version__,)
>          curl.setopt(pycurl.USERAGENT, ua_str)
>          curl.setopt(pycurl.HTTPHEADER, headers)
> -        curl.setopt(pycurl.FOLLOWLOCATION, 1) # follow redirect responses
> +        curl.setopt(pycurl.FOLLOWLOCATION,  1) #  follow redirect responses
> +	# FIXME: The  following allows the  use of self-certified
> +	# hosts.  This  should not be activated  without the user
> +	# understanding  the  consequences (there  is  a risk  to
> +	# connect  to  rogue  hosts).  This should  certainly  be
> +	# handled better but  that keep the relevant informations
> +	# at the right place for now.
> +	if os.getenv('BZR_ACCEPT_SELF_CERTIFIED_HOSTS') is not None:
> +	    curl.setopt(pycurl.SSL_VERIFYHOST, 1)
> +	    curl.setopt(pycurl.SSL_VERIFYPEER, False)

I think it would be better to keep a list somewhere, of what hosts have
been accepted. Rather than just blindly accepting all self-certified
hosts. This has pretty big implications for man-in-the-middle attacks.
If you allow self-certified across the board, than a man-in-the-middle
has no problem inserting themselves, and the user won't even be alerted
to the fact that the certified host's key has changed.

So I would prefer a user prompt (through bzrlib.ui.ui_factory) in the
case that the self certificate fails.

I'm not sure where you would exactly need to put this check. But I think
it would end up being around one of the get/has handlers. Because you
don't know that it fails to validate until you have actually made a
request. But then if it does fail, you catch the correct exception (I
would guess CURLE_SSL_PEER_CERTIFICATE (51) look in _pycurl_errors.py).

Now, in the short term, it might be okay to expose a big thunk like
this. But we can make it slightly better with:

BZR_ACCEPT_SELF_CERTIFIED_HOSTS = 'host1:host2:host3:host4'

And then internally you use:

hosts = os.getenv('BZR_ACCEPT_SELF_CERTIFIED_HOSTS', '').split(':')
if self._host in hosts:
  curl.setopt(...)

So final feeling:

1) You need to get rid of the tabs
2) If you use an env var, have it explicitly list the allowed hosts. It
might also be reasonable to put this into ~/.bazaar/bazaar.conf, and
then you can access it with a_config = bzrlib.config.GlobalConfig().
Though it is a small layering violation to have a Transport know about
bzrlib.config. We've never really stated how we want to handle global
state information like this.
3) I would prefer handling this on a case-by-case, with a user-prompt.
But (2) is reasonably secure, since you have to explicitly enable a host
as being okay for self certified. It still leaves you open to
man-in-the-middle on that host, but at least it doesn't open you up to
man-in-the-middle on every other host.

John
=:->

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 254 bytes
Desc: OpenPGP digital signature
Url : https://lists.ubuntu.com/archives/bazaar/attachments/20060821/5c360526/attachment.pgp 


More information about the bazaar mailing list