Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -135,21 +135,35 @@ private async Task<AuthenticateResult> ValidateCertificateAsync(X509Certificate2
}

var chainPolicy = BuildChainPolicy(clientCertificate, isCertificateSelfSigned);
using var chain = new X509Chain
var chain = new X509Chain
{
ChainPolicy = chainPolicy
};

var certificateIsValid = chain.Build(clientCertificate);
if (!certificateIsValid)
try
{
var certificateIsValid = chain.Build(clientCertificate);
if (!certificateIsValid)
{
var chainErrors = new List<string>(chain.ChainStatus.Length);
foreach (var validationFailure in chain.ChainStatus)
{
chainErrors.Add($"{validationFailure.Status} {validationFailure.StatusInformation}");
}
Logger.CertificateFailedValidation(clientCertificate.Subject, chainErrors);
return AuthenticateResults.InvalidClientCertificate;
}
}
finally
{
var chainErrors = new List<string>(chain.ChainStatus.Length);
foreach (var validationFailure in chain.ChainStatus)
// Disposing the chain does not dispose the elements we potentially built.
// Do the full walk manually to dispose.
for (var i = 0; i < chain.ChainElements.Count; i++)
{
chainErrors.Add($"{validationFailure.Status} {validationFailure.StatusInformation}");
chain.ChainElements[i].Certificate.Dispose();
}
Logger.CertificateFailedValidation(clientCertificate.Subject, chainErrors);
return AuthenticateResults.InvalidClientCertificate;

chain.Dispose();
}

var certificateValidatedContext = new CertificateValidatedContext(Context, Scheme, Options)
Expand Down
38 changes: 26 additions & 12 deletions src/Shared/CertificateGeneration/UnixCertificateManager.cs
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ namespace Microsoft.AspNetCore.Certificates.Generation;
/// </remarks>
internal sealed partial class UnixCertificateManager : CertificateManager
{
private const UnixFileMode DirectoryPermissions = UnixFileMode.UserRead | UnixFileMode.UserWrite | UnixFileMode.UserExecute;
private const UnixFileMode DirectoryPermissions = UnixFileMode.UserRead | UnixFileMode.UserWrite | UnixFileMode.UserExecute;

/// <summary>The name of an environment variable consumed by OpenSSL to locate certificates.</summary>
private const string OpenSslCertificateDirectoryVariableName = "SSL_CERT_DIR";
Expand Down Expand Up @@ -62,18 +62,32 @@ public override TrustLevel GetTrustLevel(X509Certificate2 certificate)
// Building the chain will check whether dotnet trusts the cert. We could, instead,
// enumerate the Root store and/or look for the file in the OpenSSL directory, but
// this tests the real-world behavior.
using var chain = new X509Chain();
// This is just a heuristic for whether or not we should prompt the user to re-run with `--trust`
// so we don't need to check revocation (which doesn't really make sense for dev certs anyway)
chain.ChainPolicy.RevocationMode = X509RevocationMode.NoCheck;
if (chain.Build(certificate))
var chain = new X509Chain();
try
{
sawTrustSuccess = true;
// This is just a heuristic for whether or not we should prompt the user to re-run with `--trust`
// so we don't need to check revocation (which doesn't really make sense for dev certs anyway)
chain.ChainPolicy.RevocationMode = X509RevocationMode.NoCheck;
if (chain.Build(certificate))
{
sawTrustSuccess = true;
}
else
{
sawTrustFailure = true;
Log.UnixNotTrustedByDotnet();
}
}
else
finally
{
sawTrustFailure = true;
Log.UnixNotTrustedByDotnet();
// Disposing the chain does not dispose the elements we potentially built.
// Do the full walk manually to dispose.
for (var i = 0; i < chain.ChainElements.Count; i++)
{
chain.ChainElements[i].Certificate.Dispose();
}

chain.Dispose();
}

// Will become the name of the file on disk and the nickname in the NSS DBs
Expand All @@ -94,7 +108,7 @@ public override TrustLevel GetTrustLevel(X509Certificate2 certificate)
var certPath = Path.Combine(sslCertDir, certificateNickname + ".pem");
if (File.Exists(certPath))
{
var candidate = new X509Certificate2(certPath);
using var candidate = new X509Certificate2(certPath);
if (AreCertificatesEqual(certificate, candidate))
{
foundCert = true;
Expand Down Expand Up @@ -161,7 +175,7 @@ protected override X509Certificate2 SaveCertificateCore(X509Certificate2 certifi
store.Open(OpenFlags.ReadWrite);
store.Add(certificate);
store.Close();
};
}

return certificate;
}
Expand Down
Loading