mirror of
https://github.com/caddyserver/caddy.git
synced 2024-11-29 20:24:11 +08:00
140 lines
4.4 KiB
Go
140 lines
4.4 KiB
Go
package setup
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"log"
|
|
"strings"
|
|
|
|
"github.com/mholt/caddy/middleware"
|
|
)
|
|
|
|
func TLS(c *Controller) (middleware.Middleware, error) {
|
|
c.TLS.Enabled = true
|
|
if c.Port == "http" {
|
|
c.TLS.Enabled = false
|
|
log.Printf("Warning: TLS disabled for %s://%s. To force TLS over the plaintext HTTP port, "+
|
|
"specify port 80 explicitly (https://%s:80).", c.Port, c.Host, c.Host)
|
|
}
|
|
|
|
for c.Next() {
|
|
if !c.NextArg() {
|
|
return nil, c.ArgErr()
|
|
}
|
|
c.TLS.Certificate = c.Val()
|
|
|
|
if !c.NextArg() {
|
|
return nil, c.ArgErr()
|
|
}
|
|
c.TLS.Key = c.Val()
|
|
|
|
// Optional block
|
|
for c.NextBlock() {
|
|
switch c.Val() {
|
|
case "protocols":
|
|
args := c.RemainingArgs()
|
|
if len(args) != 2 {
|
|
return nil, c.ArgErr()
|
|
}
|
|
value, ok := supportedProtocols[strings.ToLower(args[0])]
|
|
if !ok {
|
|
return nil, c.Errf("Wrong protocol name or protocol not supported '%s'", c.Val())
|
|
}
|
|
c.TLS.ProtocolMinVersion = value
|
|
value, ok = supportedProtocols[strings.ToLower(args[1])]
|
|
if !ok {
|
|
return nil, c.Errf("Wrong protocol name or protocol not supported '%s'", c.Val())
|
|
}
|
|
c.TLS.ProtocolMaxVersion = value
|
|
case "ciphers":
|
|
for c.NextArg() {
|
|
value, ok := supportedCiphersMap[strings.ToUpper(c.Val())]
|
|
if !ok {
|
|
return nil, c.Errf("Wrong cipher name or cipher not supported '%s'", c.Val())
|
|
}
|
|
c.TLS.Ciphers = append(c.TLS.Ciphers, value)
|
|
}
|
|
case "clients":
|
|
c.TLS.ClientCerts = c.RemainingArgs()
|
|
if len(c.TLS.ClientCerts) == 0 {
|
|
return nil, c.ArgErr()
|
|
}
|
|
default:
|
|
return nil, c.Errf("Unknown keyword '%s'", c.Val())
|
|
}
|
|
}
|
|
}
|
|
|
|
// If no ciphers provided, use all that Caddy supports for the protocol
|
|
if len(c.TLS.Ciphers) == 0 {
|
|
c.TLS.Ciphers = supportedCiphers
|
|
}
|
|
|
|
// Not a cipher suite, but still important for mitigating protocol downgrade attacks
|
|
c.TLS.Ciphers = append(c.TLS.Ciphers, tls.TLS_FALLBACK_SCSV)
|
|
|
|
// Set default protocol min and max versions - must balance compatibility and security
|
|
if c.TLS.ProtocolMinVersion == 0 {
|
|
c.TLS.ProtocolMinVersion = tls.VersionTLS10
|
|
}
|
|
if c.TLS.ProtocolMaxVersion == 0 {
|
|
c.TLS.ProtocolMaxVersion = tls.VersionTLS12
|
|
}
|
|
|
|
// Prefer server cipher suites
|
|
c.TLS.PreferServerCipherSuites = true
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
// Map of supported protocols
|
|
// SSLv3 will be not supported in future release
|
|
// HTTP/2 only supports TLS 1.2 and higher
|
|
var supportedProtocols = map[string]uint16{
|
|
"ssl3.0": tls.VersionSSL30,
|
|
"tls1.0": tls.VersionTLS10,
|
|
"tls1.1": tls.VersionTLS11,
|
|
"tls1.2": tls.VersionTLS12,
|
|
}
|
|
|
|
// Map of supported ciphers, used only for parsing config.
|
|
//
|
|
// Note that, at time of writing, HTTP/2 blacklists 276 cipher suites,
|
|
// including all but two of the suites below (the two GCM suites).
|
|
// See https://http2.github.io/http2-spec/#BadCipherSuites
|
|
//
|
|
// TLS_FALLBACK_SCSV is not in this list because we manually ensure
|
|
// it is always added (even though it is not technically a cipher suite).
|
|
//
|
|
// This map, like any map, is NOT ORDERED. Do not range over this map.
|
|
var supportedCiphersMap = map[string]uint16{
|
|
"ECDHE-RSA-AES128-GCM-SHA256": tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
"ECDHE-ECDSA-AES128-GCM-SHA256": tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
"ECDHE-RSA-AES128-CBC-SHA": tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
|
"ECDHE-RSA-AES256-CBC-SHA": tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
|
"ECDHE-ECDSA-AES256-CBC-SHA": tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
|
"ECDHE-ECDSA-AES128-CBC-SHA": tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
"RSA-AES128-CBC-SHA": tls.TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
"RSA-AES256-CBC-SHA": tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
"ECDHE-RSA-3DES-EDE-CBC-SHA": tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
"RSA-3DES-EDE-CBC-SHA": tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
}
|
|
|
|
// List of supported cipher suites in descending order of preference.
|
|
// Ordering is very important! Getting the wrong order will break
|
|
// mainstream clients, especially with HTTP/2.
|
|
//
|
|
// Note that TLS_FALLBACK_SCSV is not in this list since it is always
|
|
// added manually.
|
|
var supportedCiphers = []uint16{
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
tls.TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
}
|