History log of /openbsd/usr.sbin/relayd/ca.c (Results 1 – 25 of 45)
Revision Date Author Comments
# 668e5ba9 21-Nov-2024 claudio <claudio@openbsd.org>

Convert the common imsgbuf_read calls to the post EAGAIN world.

OK tb@


# dd7efffe 21-Nov-2024 claudio <claudio@openbsd.org>

Rename imsg_init, imsg_clear, imsg_read, imsg_write and imsg_flush to
imsgbuf_init, imsgbuf_clear, imsgbuf_read, imsgbuf_write and imsgbuf_flush.

This separates the imsgbuf API from the per-imsg API

Rename imsg_init, imsg_clear, imsg_read, imsg_write and imsg_flush to
imsgbuf_init, imsgbuf_clear, imsgbuf_read, imsgbuf_write and imsgbuf_flush.

This separates the imsgbuf API from the per-imsg API.

OK tb@

show more ...


# 27f65520 16-Jul-2023 tb <tb@openbsd.org>

relayd: remove ENGINE dependency

What is achieved here through ENGINE can be done in a much simpler way
by setting the default RSA implementation. Drop a number of indirections
that only add a bit o

relayd: remove ENGINE dependency

What is achieved here through ENGINE can be done in a much simpler way
by setting the default RSA implementation. Drop a number of indirections
that only add a bit of logging. This removes a lot of boiler plate and
shows where the actual magic happens more clearly.

ok op tobhe

show more ...


# 7078bf6a 11-Jun-2023 op <op@openbsd.org>

fix typo: 'hash buffer to small' -> too small


# f1b4a8a5 26-Mar-2023 tb <tb@openbsd.org>

Add missing #include <openssl/err.h>


# 3b59bd4a 10-Nov-2022 mbuhl <mbuhl@openbsd.org>

In case RSA_meth_new fails, errstr would be passed to fatalx without
initialization.
OK tb


# 5fa7fa1a 20-Jan-2022 benno <benno@openbsd.org>

catch poll() returning EINTR.
ok millert@ claudio@


# ad3e8fb5 11-Jan-2022 tb <tb@openbsd.org>

Convert relayd for opaque RSA_METHOD

This is a mostly mechanical diff which will hopefully be superseded
soon by work in libtls.

ok jsing


# 4c23ab60 08-Dec-2021 tb <tb@openbsd.org>

zap a stray space


# c7e61995 23-Mar-2021 claudio <claudio@openbsd.org>

Timed out RSA key ops, may leave uncalled for responses in the imsg return
path. These have to be dropped or every subsequent call will cause decrypt
errors. Use a sequence number cookie to keep the

Timed out RSA key ops, may leave uncalled for responses in the imsg return
path. These have to be dropped or every subsequent call will cause decrypt
errors. Use a sequence number cookie to keep the systems in sync.
Diff from niklas@ with some minor adjustments by myself.

show more ...


# f2f4e153 31-May-2019 reyk <reyk@openbsd.org>

Move the relay keys/certs into a separate global list and look them up by id.

Moving the certs out of the relay struct will help to add multiple SNI certs.

Tested by many users (thanks!)

Feedback

Move the relay keys/certs into a separate global list and look them up by id.

Moving the certs out of the relay struct will help to add multiple SNI certs.

Tested by many users (thanks!)

Feedback & OK rob@

show more ...


# 917ba595 19-Sep-2018 reyk <reyk@openbsd.org>

Do not abort when the ca privenc runs into a timeout.

OK claudio@


# 7084d095 24-Jan-2018 claudio <claudio@openbsd.org>

Log some more errors in the ca code, since there seems to be still a bug
hidden somewhere. Also return after a poll timeout, there is no reason to
wait longer than a second for the answer of the ca p

Log some more errors in the ca code, since there seems to be still a bug
hidden somewhere. Also return after a poll timeout, there is no reason to
wait longer than a second for the answer of the ca process.
OK jsing@

show more ...


# e45fc33a 01-Jan-2018 claudio <claudio@openbsd.org>

RSA_private_{en,de}crypt() can fail and will return -1 in that case.
Check for this in the ca process and return a valid answer to the
relay process. This fixes rsae_send_imsg poll timeouts blocking

RSA_private_{en,de}crypt() can fail and will return -1 in that case.
Check for this in the ca process and return a valid answer to the
relay process. This fixes rsae_send_imsg poll timeouts blocking relay
processes as seen by Mischa Peters and myself.
OK benno@

show more ...


# 0987b10d 28-Nov-2017 claudio <claudio@openbsd.org>

relay_load_fd() is no longer clobering errno in the error case so use
fatal() instead of fatalx()


# a7c0a300 27-Nov-2017 bluhm <bluhm@openbsd.org>

Make ca_launch error messages unique.
OK claudio@


# 114ce177 27-Nov-2017 claudio <claudio@openbsd.org>

Use file descriptor passing to load certificates into the relays. Especially
the ca file (having all the trusted certs in them) can be so big that loading
via imsg fails.
OK beck@


# 23276981 09-Aug-2017 claudio <claudio@openbsd.org>

Use X509_pubkey_digest() like libtls to hash the keys for the TLS privsep
code. This fixes interception mode (since there we rewrite the CERT which
would alter the hash of the cert but the keys still

Use X509_pubkey_digest() like libtls to hash the keys for the TLS privsep
code. This fixes interception mode (since there we rewrite the CERT which
would alter the hash of the cert but the keys still remain the same).
OK bluhm@ and jsing@

show more ...


# f8a1e24f 28-Jul-2017 bluhm <bluhm@openbsd.org>

Always calculate the hash value of the x509 cert in ssl_load_pkey().
Check whether TLS server object is available before using it. With
these fixes the ssl inspect regress test just fails and does n

Always calculate the hash value of the x509 cert in ssl_load_pkey().
Check whether TLS server object is available before using it. With
these fixes the ssl inspect regress test just fails and does not
crash relayd.
OK claudio@

show more ...


# efc39811 28-May-2017 benno <benno@openbsd.org>

use __func__ in log messages. fix some whitespace while here.
From Hiltjo Posthuma hiltjo -AT codemadness -DOT- org, thanks!
ok florian, claudio


# 85e5f500 27-May-2017 claudio <claudio@openbsd.org>

Migrate relayd to use libtls for TLS. Still does the TLS privsep via the
engine but at least we can use a sane API for new features.
Going in now so it is possible to work with this in tree.
General

Migrate relayd to use libtls for TLS. Still does the TLS privsep via the
engine but at least we can use a sane API for new features.
Going in now so it is possible to work with this in tree.
General agreement at d2k17.

show more ...


# 910da3cf 06-Apr-2017 gsoares <gsoares@openbsd.org>

fix format string found by clang -Wformat-security
OK deraadt millert


# f9b0f55c 28-Sep-2016 reyk <reyk@openbsd.org>

Add -Wcast-qual and cast away one false positive where we use a const
u_char * variable for an iovec from within the libcrypto engine callback.

OK millert@


# 3d6ff6ed 03-Sep-2016 reyk <reyk@openbsd.org>

Use the fork+exec privsep model in relayd; based on rzalamena@'s work
for httpd with some (current and previous) changes for relayd. Once
again, both daemons now share the same proc.c where most of

Use the fork+exec privsep model in relayd; based on rzalamena@'s work
for httpd with some (current and previous) changes for relayd. Once
again, both daemons now share the same proc.c where most of the
privsep "magic" happens.

OK benno@ rzalamena@

show more ...


# 586b5f8a 02-Sep-2016 reyk <reyk@openbsd.org>

Split "struct relayd" into two structs: "struct relayd" and "struct
relayd_config". This way we can send all the relevant global
configuration to the children, not just the flags and the opts.

With

Split "struct relayd" into two structs: "struct relayd" and "struct
relayd_config". This way we can send all the relevant global
configuration to the children, not just the flags and the opts.

With input from and
OK claudio@ benno@

show more ...


12