ssl_engine_log.c revision a05afdf697da2b6dd02312aab6465c20fcadb535
/* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/* _ _
* _ __ ___ ___ __| | ___ ___| | mod_ssl
* | '_ ` _ \ / _ \ / _` | / __/ __| | Apache Interface to OpenSSL
* | | | | | | (_) | (_| | \__ \__ \ |
* |_| |_| |_|\___/ \__,_|___|___/___/_|
* |_____|
* Logging Facility
*/
/* ``The difference between a computer
industry job and open-source software
hacking is about 30 hours a week.''
-- Ralf S. Engelschall */
#include "ssl_private.h"
/* _________________________________________________________________
**
** Logfile Support
** _________________________________________________________________
*/
static const struct {
const char *cpPattern;
const char *cpAnnotation;
} ssl_log_annotate[] = {
{ "*envelope*bad*decrypt*", "wrong pass phrase!?" },
{ "*CLIENT_HELLO*unknown*protocol*", "speaking not SSL to HTTPS port!?" },
{ "*CLIENT_HELLO*http*request*", "speaking HTTP to HTTPS port!?" },
{ "*SSL3_READ_BYTES:sslv3*alert*bad*certificate*", "Subject CN in certificate not server name or identical to CA!?" },
{ "*self signed certificate in certificate chain*", "Client certificate signed by CA not known to server?" },
{ "*peer did not return a certificate*", "No CAs known to server for verification?" },
{ "*no shared cipher*", "Too restrictive SSLCipherSuite or using DSA server certificate?" },
{ "*no start line*", "Bad file contents or format - or even just a forgotten SSLCertificateKeyFile?" },
{ "*bad password read*", "You entered an incorrect pass phrase!?" },
{ "*bad mac decode*", "Browser still remembered details of a re-created server certificate?" },
};
static const char *ssl_log_annotation(const char *error)
{
int i = 0;
i++;
return ssl_log_annotate[i].cpAnnotation;
}
void ssl_die(server_rec *s)
{
"Fatal error initialising mod_ssl, exiting. "
"See %s for more information",
s->error_fname));
else
"Fatal error initialising mod_ssl, exiting.");
/*
* This is used for fatal errors and here
* it is common module practice to really
* exit from the complete program.
* XXX: The config hooks should return errors instead of calling exit().
*/
exit(1);
}
/*
* Prints the SSL library error information.
*/
{
unsigned long e;
const char *data;
int flags;
const char *annotation;
char err[256];
if (!(flags & ERR_TXT_STRING)) {
}
"SSL Library Error: %s%s%s%s%s%s",
/* %s */
err,
/* %s%s%s */
/* %s%s */
/* Pop the error off the stack: */
}
}
const conn_rec *c, const request_rec *r,
{
char buf[HUGE_STRING_LEN];
int msglen, n;
char *name;
if (cert) {
if (bio) {
/*
* Limit the maximum length of the subject and issuer DN strings
* in the log message. 300 characters should always be sufficient
* for holding both the timestamp, module name, pid etc. stuff
* at the beginning of the line and the trailing information about
* serial, notbefore and notafter.
*/
maxdnlen);
if (!strIsEmpty(name)) {
} else {
}
maxdnlen);
if (!strIsEmpty(name)) {
} else {
}
if (n > 0)
}
else {
}
}
else {
" [certificate: -not available-]");
}
if (r) {
}
else if (c) {
}
else if (s) {
}
}
/*
* Wrappers for ap_log_error/ap_log_cerror/ap_log_rerror which log additional
* details of the X509 cert. For ssl_log_xerror, a pool needs to be passed in
* in the other cases we use the connection and request pool, respectively).
*/
const char *fmt, ...)
{
if (APLOG_IS_LEVEL(s,level)) {
}
}
{
}
}
{
if (APLOG_R_IS_LEVEL(r,level)) {
}
}