mod_admin_telnet: Identify native bidi sessions
[prosody.git] / plugins / mod_s2s_auth_certs.lua
blob76e134a71067b4c9e84a71c733ffff65dd1c6043
1 module:set_global();
3 local cert_verify_identity = require "util.x509".verify_identity;
4 local NULL = {};
5 local log = module._log;
7 module:hook("s2s-check-certificate", function(event)
8 local session, host, cert = event.session, event.host, event.cert;
9 local conn = session.conn:socket();
10 local log = session.log or log;
12 if not cert then
13 log("warn", "No certificate provided by %s", host or "unknown host");
14 return;
15 end
17 local chain_valid, errors;
18 if conn.getpeerverification then
19 chain_valid, errors = conn:getpeerverification();
20 else
21 chain_valid, errors = false, { { "Chain verification not supported by this version of LuaSec" } };
22 end
23 -- Is there any interest in printing out all/the number of errors here?
24 if not chain_valid then
25 log("debug", "certificate chain validation result: invalid");
26 for depth, t in pairs(errors or NULL) do
27 log("debug", "certificate error(s) at depth %d: %s", depth-1, table.concat(t, ", "))
28 end
29 session.cert_chain_status = "invalid";
30 else
31 log("debug", "certificate chain validation result: valid");
32 session.cert_chain_status = "valid";
34 -- We'll go ahead and verify the asserted identity if the
35 -- connecting server specified one.
36 if host then
37 if cert_verify_identity(host, "xmpp-server", cert) then
38 session.cert_identity_status = "valid"
39 else
40 session.cert_identity_status = "invalid"
41 end
42 log("debug", "certificate identity validation result: %s", session.cert_identity_status);
43 end
44 end
45 end, 509);