tAdd support for TLS client certificate verification. - tlstun - simple go program to add tls support to other listeners HTML git clone https://git.parazyd.org/tlstun DIR Log DIR Files DIR Refs DIR README DIR LICENSE --- DIR commit 48ad34fd00cc54697ce8c1768c904b607a7f0a49 DIR parent d96f89b04770e586b53e5d03c96b808b0be887cc HTML Author: parazyd <parazyd@dyne.org> Date: Tue, 9 Jul 2019 15:23:20 +0200 Add support for TLS client certificate verification. Diffstat: M tlstun.go | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) --- DIR diff --git a/tlstun.go b/tlstun.go t@@ -21,18 +21,23 @@ package main import ( "crypto/tls" + "crypto/x509" + "errors" "flag" "io" + "io/ioutil" "log" "net" "os" ) var ( + cacert = flag.String("ca", "ca.pem", "Path for CA certificate file") cert = flag.String("c", "server.pem", "Path for Certificate file") key = flag.String("k", "server-key.pem", "Path for Key file") listen = flag.String("l", "127.0.0.1:7443", "Listen address") forward = flag.String("f", "127.0.0.1:72", "Forward address") + client = flag.Bool("vc", false, "Do client verification") verbose = flag.Bool("v", false, "Verbose mode") ) t@@ -42,10 +47,25 @@ func tlsConfig(cert, key string) (*tls.Config, error) { return nil, err } - return &tls.Config{ + tlscfg := &tls.Config{ Certificates: []tls.Certificate{creds}, MinVersion: tls.VersionTLS13, }, nil + + if *client { + certpool := x509.NewCertPool() + pem, err := ioutil.ReadFile(*cacert) + if err != nil { + return nil, err + } + if !certpool.AppendCertsFromPEM(pem) { + return nil, errors.New("Cannot parse client certificate authority") + } + tlscfg.ClientCAs = certpool + tlscfg.ClientAuth = tls.RequireAndVerifyClientCert + } + + return tlscfg, nil } func tunnel(conn net.Conn) { t@@ -87,6 +107,12 @@ func server() (net.Listener, error) { func main() { flag.Parse() + if *client { + if _, err := os.Stat(*cacert); os.IsNotExist(err) { + log.Fatal("Cannot find CA certificate.") + } + } + if _, err := os.Stat(*cert); os.IsNotExist(err) { log.Fatal("Cannot find certificate.") }