3 local cert_verify_identity
= require
"util.x509".verify_identity
;
5 local log = module
._log
;
7 module
:hook("s2s-check-certificate", function(event
)
8 local session
, host
, cert
= event
.session
, event
.host
, event
.cert
;
9 local conn
= session
.conn
:socket();
10 local log = session
.log or log;
13 log("warn", "No certificate provided by %s", host
or "unknown host");
17 local chain_valid
, errors
;
18 if conn
.getpeerverification
then
19 chain_valid
, errors
= conn
:getpeerverification();
20 elseif conn
.getpeerchainvalid
then -- COMPAT mw/luasec-hg
21 chain_valid
, errors
= conn
:getpeerchainvalid();
22 errors
= (not chain_valid
) and { { errors
} } or nil;
24 chain_valid
, errors
= false, { { "Chain verification not supported by this version of LuaSec" } };
26 -- Is there any interest in printing out all/the number of errors here?
27 if not chain_valid
then
28 log("debug", "certificate chain validation result: invalid");
29 for depth
, t
in pairs(errors
or NULL
) do
30 log("debug", "certificate error(s) at depth %d: %s", depth
-1, table.concat(t
, ", "))
32 session
.cert_chain_status
= "invalid";
34 log("debug", "certificate chain validation result: valid");
35 session
.cert_chain_status
= "valid";
37 -- We'll go ahead and verify the asserted identity if the
38 -- connecting server specified one.
40 if cert_verify_identity(host
, "xmpp-server", cert
) then
41 session
.cert_identity_status
= "valid"
43 session
.cert_identity_status
= "invalid"
45 log("debug", "certificate identity validation result: %s", session
.cert_identity_status
);