diff options
author | Kim Alvefur <zash@zash.se> | 2014-07-25 20:41:54 +0200 |
---|---|---|
committer | Kim Alvefur <zash@zash.se> | 2014-07-25 20:41:54 +0200 |
commit | bd170409998f293bc35db5569a4f3cfc432f9c2f (patch) | |
tree | 0823deb8d91a268bbcdabfcecf63894aca7612be /plugins/mod_s2s/mod_s2s.lua | |
parent | 713c007fc2b3dc18e86a57f73b86e814868259db (diff) | |
download | prosody-bd170409998f293bc35db5569a4f3cfc432f9c2f.tar.gz prosody-bd170409998f293bc35db5569a4f3cfc432f9c2f.zip |
mod_s2s_auth_certs: Split PKIX based certificate checking from mod_s2s into new plugin
Diffstat (limited to 'plugins/mod_s2s/mod_s2s.lua')
-rw-r--r-- | plugins/mod_s2s/mod_s2s.lua | 33 |
1 files changed, 0 insertions, 33 deletions
diff --git a/plugins/mod_s2s/mod_s2s.lua b/plugins/mod_s2s/mod_s2s.lua index e704c25a..f0d465c0 100644 --- a/plugins/mod_s2s/mod_s2s.lua +++ b/plugins/mod_s2s/mod_s2s.lua @@ -243,39 +243,6 @@ function check_cert_status(session) cert = conn:getpeercertificate() end - if cert then - local chain_valid, errors; - if conn.getpeerverification then - chain_valid, errors = conn:getpeerverification(); - elseif conn.getpeerchainvalid then -- COMPAT mw/luasec-hg - chain_valid, errors = conn:getpeerchainvalid(); - errors = (not chain_valid) and { { errors } } or nil; - else - chain_valid, errors = false, { { "Chain verification not supported by this version of LuaSec" } }; - end - -- Is there any interest in printing out all/the number of errors here? - if not chain_valid then - (session.log or log)("debug", "certificate chain validation result: invalid"); - for depth, t in pairs(errors or NULL) do - (session.log or log)("debug", "certificate error(s) at depth %d: %s", depth-1, table.concat(t, ", ")) - end - session.cert_chain_status = "invalid"; - else - (session.log or log)("debug", "certificate chain validation result: valid"); - session.cert_chain_status = "valid"; - - -- We'll go ahead and verify the asserted identity if the - -- connecting server specified one. - if host then - if cert_verify_identity(host, "xmpp-server", cert) then - session.cert_identity_status = "valid" - else - session.cert_identity_status = "invalid" - end - (session.log or log)("debug", "certificate identity validation result: %s", session.cert_identity_status); - end - end - end return module:fire_event("s2s-check-certificate", { host = host, session = session, cert = cert }); end |