aboutsummaryrefslogtreecommitdiffstats
path: root/plugins
diff options
context:
space:
mode:
authorKim Alvefur <zash@zash.se>2025-04-01 18:31:26 +0200
committerKim Alvefur <zash@zash.se>2025-04-01 18:31:26 +0200
commit126262edb30d67f15abd18097f28d9e0a5898ef9 (patch)
tree72a592aebab590ca7609d4121c567f079c0296ef /plugins
parentd4af16441d839620e400eb79dc281085ee4ca096 (diff)
parent7976f21e3e34f7ae1c46446dbed46115a66fa8a4 (diff)
downloadprosody-126262edb30d67f15abd18097f28d9e0a5898ef9.tar.gz
prosody-126262edb30d67f15abd18097f28d9e0a5898ef9.zip
Merge 13.0->trunk
Diffstat (limited to 'plugins')
-rw-r--r--plugins/mod_s2s.lua2
-rw-r--r--plugins/mod_tls.lua5
2 files changed, 5 insertions, 2 deletions
diff --git a/plugins/mod_s2s.lua b/plugins/mod_s2s.lua
index 84ae34b5..7beab34a 100644
--- a/plugins/mod_s2s.lua
+++ b/plugins/mod_s2s.lua
@@ -999,7 +999,7 @@ local function friendly_cert_error(session) --> string
local cert_errors = set.new(session.cert_chain_errors[1]);
if cert_errors:contains("certificate has expired") then
return "has expired";
- elseif cert_errors:contains("self signed certificate") then
+ elseif cert_errors:contains("self signed certificate") or cert_errors:contains("self-signed certificate") then
return "is self-signed";
elseif cert_errors:contains("no matching DANE TLSA records") then
return "does not match any DANE TLSA records";
diff --git a/plugins/mod_tls.lua b/plugins/mod_tls.lua
index b240a64c..ac215b81 100644
--- a/plugins/mod_tls.lua
+++ b/plugins/mod_tls.lua
@@ -55,6 +55,7 @@ function module.load(reload)
module:log("debug", "Creating context for c2s");
local request_client_certs = { verify = { "peer", "client_once", }; };
+ local custom_cert_verification = { verifyext = { "lsec_continue", "lsec_ignore_purpose" }; };
local xmpp_alpn = { alpn = "xmpp-server" };
ssl_ctx_c2s, err_c2s, ssl_cfg_c2s = create_context(host.host, "server", host_c2s, host_ssl, global_c2s); -- for incoming client connections
@@ -67,7 +68,9 @@ function module.load(reload)
module:log("debug", "Creating context for s2sin");
-- for incoming server connections
- ssl_ctx_s2sin, err_s2sin, ssl_cfg_s2sin = create_context(host.host, "server", host_s2s, host_ssl, global_s2s, request_client_certs);
+ ssl_ctx_s2sin, err_s2sin, ssl_cfg_s2sin = create_context(host.host, "server",
+ host_s2s, host_ssl, global_s2s, request_client_certs, custom_cert_verification
+ );
if not ssl_ctx_s2sin then module:log("error", "Error creating contexts for s2sin: %s", err_s2sin); end
if reload then