annotate urllib3/util/ssl_match_hostname.py @ 16:dc2c003078e9 tip

planemo upload for repository https://toolrepo.galaxytrakr.org/view/jpayne/bioproject_to_srr_2/556cac4fb538
author jpayne
date Tue, 21 May 2024 01:09:25 -0400
parents 5eb2d5e3bf22
children
rev   line source
jpayne@7 1 """The match_hostname() function from Python 3.5, essential when using SSL."""
jpayne@7 2
jpayne@7 3 # Note: This file is under the PSF license as the code comes from the python
jpayne@7 4 # stdlib. http://docs.python.org/3/license.html
jpayne@7 5 # It is modified to remove commonName support.
jpayne@7 6
jpayne@7 7 from __future__ import annotations
jpayne@7 8
jpayne@7 9 import ipaddress
jpayne@7 10 import re
jpayne@7 11 import typing
jpayne@7 12 from ipaddress import IPv4Address, IPv6Address
jpayne@7 13
jpayne@7 14 if typing.TYPE_CHECKING:
jpayne@7 15 from .ssl_ import _TYPE_PEER_CERT_RET_DICT
jpayne@7 16
jpayne@7 17 __version__ = "3.5.0.1"
jpayne@7 18
jpayne@7 19
jpayne@7 20 class CertificateError(ValueError):
jpayne@7 21 pass
jpayne@7 22
jpayne@7 23
jpayne@7 24 def _dnsname_match(
jpayne@7 25 dn: typing.Any, hostname: str, max_wildcards: int = 1
jpayne@7 26 ) -> typing.Match[str] | None | bool:
jpayne@7 27 """Matching according to RFC 6125, section 6.4.3
jpayne@7 28
jpayne@7 29 http://tools.ietf.org/html/rfc6125#section-6.4.3
jpayne@7 30 """
jpayne@7 31 pats = []
jpayne@7 32 if not dn:
jpayne@7 33 return False
jpayne@7 34
jpayne@7 35 # Ported from python3-syntax:
jpayne@7 36 # leftmost, *remainder = dn.split(r'.')
jpayne@7 37 parts = dn.split(r".")
jpayne@7 38 leftmost = parts[0]
jpayne@7 39 remainder = parts[1:]
jpayne@7 40
jpayne@7 41 wildcards = leftmost.count("*")
jpayne@7 42 if wildcards > max_wildcards:
jpayne@7 43 # Issue #17980: avoid denials of service by refusing more
jpayne@7 44 # than one wildcard per fragment. A survey of established
jpayne@7 45 # policy among SSL implementations showed it to be a
jpayne@7 46 # reasonable choice.
jpayne@7 47 raise CertificateError(
jpayne@7 48 "too many wildcards in certificate DNS name: " + repr(dn)
jpayne@7 49 )
jpayne@7 50
jpayne@7 51 # speed up common case w/o wildcards
jpayne@7 52 if not wildcards:
jpayne@7 53 return bool(dn.lower() == hostname.lower())
jpayne@7 54
jpayne@7 55 # RFC 6125, section 6.4.3, subitem 1.
jpayne@7 56 # The client SHOULD NOT attempt to match a presented identifier in which
jpayne@7 57 # the wildcard character comprises a label other than the left-most label.
jpayne@7 58 if leftmost == "*":
jpayne@7 59 # When '*' is a fragment by itself, it matches a non-empty dotless
jpayne@7 60 # fragment.
jpayne@7 61 pats.append("[^.]+")
jpayne@7 62 elif leftmost.startswith("xn--") or hostname.startswith("xn--"):
jpayne@7 63 # RFC 6125, section 6.4.3, subitem 3.
jpayne@7 64 # The client SHOULD NOT attempt to match a presented identifier
jpayne@7 65 # where the wildcard character is embedded within an A-label or
jpayne@7 66 # U-label of an internationalized domain name.
jpayne@7 67 pats.append(re.escape(leftmost))
jpayne@7 68 else:
jpayne@7 69 # Otherwise, '*' matches any dotless string, e.g. www*
jpayne@7 70 pats.append(re.escape(leftmost).replace(r"\*", "[^.]*"))
jpayne@7 71
jpayne@7 72 # add the remaining fragments, ignore any wildcards
jpayne@7 73 for frag in remainder:
jpayne@7 74 pats.append(re.escape(frag))
jpayne@7 75
jpayne@7 76 pat = re.compile(r"\A" + r"\.".join(pats) + r"\Z", re.IGNORECASE)
jpayne@7 77 return pat.match(hostname)
jpayne@7 78
jpayne@7 79
jpayne@7 80 def _ipaddress_match(ipname: str, host_ip: IPv4Address | IPv6Address) -> bool:
jpayne@7 81 """Exact matching of IP addresses.
jpayne@7 82
jpayne@7 83 RFC 9110 section 4.3.5: "A reference identity of IP-ID contains the decoded
jpayne@7 84 bytes of the IP address. An IP version 4 address is 4 octets, and an IP
jpayne@7 85 version 6 address is 16 octets. [...] A reference identity of type IP-ID
jpayne@7 86 matches if the address is identical to an iPAddress value of the
jpayne@7 87 subjectAltName extension of the certificate."
jpayne@7 88 """
jpayne@7 89 # OpenSSL may add a trailing newline to a subjectAltName's IP address
jpayne@7 90 # Divergence from upstream: ipaddress can't handle byte str
jpayne@7 91 ip = ipaddress.ip_address(ipname.rstrip())
jpayne@7 92 return bool(ip.packed == host_ip.packed)
jpayne@7 93
jpayne@7 94
jpayne@7 95 def match_hostname(
jpayne@7 96 cert: _TYPE_PEER_CERT_RET_DICT | None,
jpayne@7 97 hostname: str,
jpayne@7 98 hostname_checks_common_name: bool = False,
jpayne@7 99 ) -> None:
jpayne@7 100 """Verify that *cert* (in decoded format as returned by
jpayne@7 101 SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125
jpayne@7 102 rules are followed, but IP addresses are not accepted for *hostname*.
jpayne@7 103
jpayne@7 104 CertificateError is raised on failure. On success, the function
jpayne@7 105 returns nothing.
jpayne@7 106 """
jpayne@7 107 if not cert:
jpayne@7 108 raise ValueError(
jpayne@7 109 "empty or no certificate, match_hostname needs a "
jpayne@7 110 "SSL socket or SSL context with either "
jpayne@7 111 "CERT_OPTIONAL or CERT_REQUIRED"
jpayne@7 112 )
jpayne@7 113 try:
jpayne@7 114 # Divergence from upstream: ipaddress can't handle byte str
jpayne@7 115 #
jpayne@7 116 # The ipaddress module shipped with Python < 3.9 does not support
jpayne@7 117 # scoped IPv6 addresses so we unconditionally strip the Zone IDs for
jpayne@7 118 # now. Once we drop support for Python 3.9 we can remove this branch.
jpayne@7 119 if "%" in hostname:
jpayne@7 120 host_ip = ipaddress.ip_address(hostname[: hostname.rfind("%")])
jpayne@7 121 else:
jpayne@7 122 host_ip = ipaddress.ip_address(hostname)
jpayne@7 123
jpayne@7 124 except ValueError:
jpayne@7 125 # Not an IP address (common case)
jpayne@7 126 host_ip = None
jpayne@7 127 dnsnames = []
jpayne@7 128 san: tuple[tuple[str, str], ...] = cert.get("subjectAltName", ())
jpayne@7 129 key: str
jpayne@7 130 value: str
jpayne@7 131 for key, value in san:
jpayne@7 132 if key == "DNS":
jpayne@7 133 if host_ip is None and _dnsname_match(value, hostname):
jpayne@7 134 return
jpayne@7 135 dnsnames.append(value)
jpayne@7 136 elif key == "IP Address":
jpayne@7 137 if host_ip is not None and _ipaddress_match(value, host_ip):
jpayne@7 138 return
jpayne@7 139 dnsnames.append(value)
jpayne@7 140
jpayne@7 141 # We only check 'commonName' if it's enabled and we're not verifying
jpayne@7 142 # an IP address. IP addresses aren't valid within 'commonName'.
jpayne@7 143 if hostname_checks_common_name and host_ip is None and not dnsnames:
jpayne@7 144 for sub in cert.get("subject", ()):
jpayne@7 145 for key, value in sub:
jpayne@7 146 if key == "commonName":
jpayne@7 147 if _dnsname_match(value, hostname):
jpayne@7 148 return
jpayne@7 149 dnsnames.append(value)
jpayne@7 150
jpayne@7 151 if len(dnsnames) > 1:
jpayne@7 152 raise CertificateError(
jpayne@7 153 "hostname %r "
jpayne@7 154 "doesn't match either of %s" % (hostname, ", ".join(map(repr, dnsnames)))
jpayne@7 155 )
jpayne@7 156 elif len(dnsnames) == 1:
jpayne@7 157 raise CertificateError(f"hostname {hostname!r} doesn't match {dnsnames[0]!r}")
jpayne@7 158 else:
jpayne@7 159 raise CertificateError("no appropriate subjectAltName fields were found")