@@ -52,6 +52,7 @@ type TLSConfig struct {
52
52
MinVersion TLSVersion `yaml:"min_version"`
53
53
MaxVersion TLSVersion `yaml:"max_version"`
54
54
PreferServerCipherSuites bool `yaml:"prefer_server_cipher_suites"`
55
+ ClientAllowedSans []string `yaml:"client_allowed_sans"`
55
56
}
56
57
57
58
type FlagConfig struct {
@@ -67,6 +68,36 @@ func (t *TLSConfig) SetDirectory(dir string) {
67
68
t .ClientCAs = config_util .JoinDir (dir , t .ClientCAs )
68
69
}
69
70
71
+ // VerifyPeerCertificate will check the SAN entries of the client cert if there is configuration for it
72
+ func (t * TLSConfig ) VerifyPeerCertificate (rawCerts [][]byte , _ [][]* x509.Certificate ) error {
73
+ // sender cert comes first, see https://www.rfc-editor.org/rfc/rfc5246#section-7.4.2
74
+ cert , err := x509 .ParseCertificate (rawCerts [0 ])
75
+ if err != nil {
76
+ return fmt .Errorf ("error parsing client certificate: %s" , err )
77
+ }
78
+
79
+ // Build up a slice of strings with all Subject Alternate Name values
80
+ sanValues := append (cert .DNSNames , cert .EmailAddresses ... )
81
+
82
+ for _ , ip := range cert .IPAddresses {
83
+ sanValues = append (sanValues , ip .String ())
84
+ }
85
+
86
+ for _ , uri := range cert .URIs {
87
+ sanValues = append (sanValues , uri .String ())
88
+ }
89
+
90
+ for _ , sanValue := range sanValues {
91
+ for _ , allowedSan := range t .ClientAllowedSans {
92
+ if sanValue == allowedSan {
93
+ return nil
94
+ }
95
+ }
96
+ }
97
+
98
+ return fmt .Errorf ("could not find allowed SANs in client cert, found: %v" , t .ClientAllowedSans )
99
+ }
100
+
70
101
type HTTPConfig struct {
71
102
HTTP2 bool `yaml:"http2"`
72
103
Header map [string ]string `yaml:"headers,omitempty"`
@@ -164,6 +195,11 @@ func ConfigToTLSConfig(c *TLSConfig) (*tls.Config, error) {
164
195
cfg .ClientCAs = clientCAPool
165
196
}
166
197
198
+ if c .ClientAllowedSans != nil {
199
+ // verify that the client cert contains an allowed SAN
200
+ cfg .VerifyPeerCertificate = c .VerifyPeerCertificate
201
+ }
202
+
167
203
switch c .ClientAuth {
168
204
case "RequestClientCert" :
169
205
cfg .ClientAuth = tls .RequestClientCert
0 commit comments