1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165
|
package gui
import (
"crypto/x509"
"fmt"
"sort"
"strings"
"time"
"github.com/twstrike/gotk3adapter/gtki"
"github.com/twstrike/coyim/digests"
)
func (u *gtkUI) certificateFailedToVerify(a *account, certs []*x509.Certificate) <-chan bool {
c := make(chan bool)
u.certificateFailedToVerifyDisplayDialog(a, certs, c, "verify", "")
return c
}
func (u *gtkUI) certificateFailedToVerifyHostname(a *account, certs []*x509.Certificate, origin string) <-chan bool {
c := make(chan bool)
u.certificateFailedToVerifyDisplayDialog(a, certs, c, "hostname", origin)
return c
}
func (u *gtkUI) validCertificateShouldBePinned(a *account, certs []*x509.Certificate) <-chan bool {
c := make(chan bool)
u.certificateFailedToVerifyDisplayDialog(a, certs, c, "pinning", "")
return c
}
const chunkingDefaultGrouping = 8
func splitStringEvery(s string, n int) []string {
result := []string{}
str := s
for len(str) > 0 {
result = append(result, str[0:n])
str = str[n:]
}
return result
}
func join20(s []string) string {
return joinOther(s)
}
func join32(s []string) string {
return fmt.Sprintf("%s %s %s %s %s %s %s %s", s[0], s[1], s[2], s[3], s[4], s[5], s[6], s[7])
}
func joinOther(s []string) string {
return strings.Join(s, " ")
}
func displayChunked(fpr []byte) string {
str := fmt.Sprintf("%X", fpr)
spl := splitStringEvery(str, chunkingDefaultGrouping)
switch len(fpr) {
case 20:
return join20(spl)
case 32:
return join32(spl)
default:
return joinOther(spl)
}
}
func (u *gtkUI) certificateFailedToVerifyDisplayDialog(a *account, certs []*x509.Certificate, c chan<- bool, tp, extra string) {
doInUIThread(func() {
builder := newBuilder("CertificateDialog")
var md gtki.Dialog
var message gtki.Label
var issuedToCN, issuedToO, snis, issuedToOU, serial gtki.Label
var issuedByCN, issuedByO, issuedByOU gtki.Label
var issuedOn, expiresOn gtki.Label
var sha1Fingerprint, sha256Fingerprint, sha3_256Fingerprint gtki.Label
builder.getItems(
"dialog", &md,
"message", &message,
"issuedToCnValue", &issuedToCN,
"issuedToOValue", &issuedToO,
"issuedToOUValue", &issuedToOU,
"snisValue", &snis,
"SNValue", &serial,
"issuedByCnValue", &issuedByCN,
"issuedByOValue", &issuedByO,
"issuedByOUValue", &issuedByOU,
"issuedOnValue", &issuedOn,
"expiresOnValue", &expiresOn,
"sha1FingerprintValue", &sha1Fingerprint,
"sha256FingerprintValue", &sha256Fingerprint,
"sha3_256FingerprintValue", &sha3_256Fingerprint,
)
issuedToCN.SetLabel(certs[0].Subject.CommonName)
issuedToO.SetLabel(strings.Join(certs[0].Subject.Organization, ", "))
issuedToOU.SetLabel(strings.Join(certs[0].Subject.OrganizationalUnit, ", "))
serial.SetLabel(certs[0].SerialNumber.String())
ss := certs[0].DNSNames[:]
sort.Strings(ss)
snis.SetLabel(strings.Join(ss, ", "))
issuedByCN.SetLabel(certs[0].Issuer.CommonName)
issuedByO.SetLabel(strings.Join(certs[0].Issuer.Organization, ", "))
issuedByOU.SetLabel(strings.Join(certs[0].Issuer.OrganizationalUnit, ", "))
issuedOn.SetLabel(certs[0].NotBefore.Format(time.RFC822))
expiresOn.SetLabel(certs[0].NotAfter.Format(time.RFC822))
sha1Fingerprint.SetLabel(displayChunked(digests.Sha1(certs[0].Raw)))
sha256Fingerprint.SetLabel(displayChunked(digests.Sha256(certs[0].Raw)))
sha3_256Fingerprint.SetLabel(displayChunked(digests.Sha3_256(certs[0].Raw)))
accountName := "this account"
if a != nil {
accountName = a.session.GetConfig().Account
}
md.SetTitle(strings.Replace(md.GetTitle(), "ACCOUNT_NAME", accountName, -1))
switch tp {
case "verify":
message.SetLabel(fmt.Sprintf("We couldn't verify the certificate for the connection to account %s. This can happen if the server you are connecting to doesn't use the traditional certificate hierarchies. It can also be the symptom of an attack.\n\nTry to verify that this information is correct before proceeding with the connection.", accountName))
case "hostname":
message.SetLabel(fmt.Sprintf("The certificate for the connection to account %s is correct, but the names for it doesn't match. We need a certificate for the name %s, but this wasn't provided. This can happen if the server is configured incorrectly or there are other reasons the proper name couldn't be used. This is very common for corporate Google accounts. It can also be the symptom of an attack.\n\nTry to verify that this information is correct before proceeding with the connection.", accountName, extra))
case "pinning":
message.SetLabel(fmt.Sprintf("The certificate for the connection to account %s is correct - but you have a pinning policy that requires us to ask whether you would like to continue connecting using this certificate, save it for the future, or stop connecting.\n\nTry to verify that this information is correct before proceeding with the connection.", accountName))
}
md.SetTransientFor(u.window)
md.ShowAll()
switch gtki.ResponseType(md.Run()) {
case gtki.RESPONSE_OK:
c <- true
case gtki.RESPONSE_ACCEPT:
if a != nil {
a.session.GetConfig().SaveCert(certs[0].Subject.CommonName, certs[0].Issuer.CommonName, digests.Sha3_256(certs[0].Raw))
u.SaveConfig()
}
c <- true
case gtki.RESPONSE_CANCEL:
if a != nil {
a.session.SetWantToBeOnline(false)
}
c <- false
default:
a.session.SetWantToBeOnline(false)
c <- false
}
md.Destroy()
})
}
|