aboutsummaryrefslogtreecommitdiffstats
path: root/plugins
diff options
context:
space:
mode:
authorMatthew Wild <mwild1@gmail.com>2022-04-25 15:09:53 +0100
committerMatthew Wild <mwild1@gmail.com>2022-04-25 15:09:53 +0100
commitfc5a8d7f4a909e60fc89a495a57950c1f4eb6166 (patch)
tree4f6ffd64999dcae04f02cda682a42846034dfa53 /plugins
parentf40337890ee71a17a80f86af3e2789f3a508b94d (diff)
parent0eef6dde1e3193ec86f949acc114e91c36c5f365 (diff)
downloadprosody-fc5a8d7f4a909e60fc89a495a57950c1f4eb6166.tar.gz
prosody-fc5a8d7f4a909e60fc89a495a57950c1f4eb6166.zip
Merge 0.12->trunk
Diffstat (limited to 'plugins')
-rw-r--r--plugins/mod_s2s.lua11
1 files changed, 11 insertions, 0 deletions
diff --git a/plugins/mod_s2s.lua b/plugins/mod_s2s.lua
index 5f60e01c..2f3815c4 100644
--- a/plugins/mod_s2s.lua
+++ b/plugins/mod_s2s.lua
@@ -343,6 +343,15 @@ function make_authenticated(event)
}, nil, "Could not establish encrypted connection to remote server");
end
end
+
+ if session.type == "s2sout_unauthed" and not session.authenticated_remote and secure_auth and not insecure_domains[host] then
+ session:close({
+ condition = "policy-violation";
+ text = "Failed to verify certificate (internal error)";
+ });
+ return;
+ end
+
if hosts[host] then
session:close({ condition = "undefined-condition", text = "Attempt to authenticate as a host we serve" });
end
@@ -525,6 +534,8 @@ function stream_callbacks._streamopened(session, attr)
if session.secure and not session.cert_chain_status then
if check_cert_status(session) == false then
return;
+ else
+ session.authenticated_remote = true;
end
end