@@ -2705,6 +2705,12 @@
if (!multi->locked_original_username
&& strcmp(multi->locked_username, options->override_username) != 0)
{
+ /* Check if the username length is acceptable */
+ if (!ssl_verify_username_length(session, options->override_username))
+ {
+ return false;
+ }
+
multi->locked_original_username = multi->locked_username;
multi->locked_username = strdup(options->override_username);
@@ -7875,10 +7875,10 @@
else if (streq(p[0], "override-username") && p[1] && !p[2])
{
VERIFY_PERMISSION(OPT_P_INSTANCE);
- if (strlen(p[1]) > TLS_USERNAME_LEN)
+ if (strlen(p[1]) > USER_PASS_LEN)
{
msg(msglevel, "override-username exceeds the maximum length of %d "
- "characters", TLS_USERNAME_LEN);
+ "characters", USER_PASS_LEN);
/* disable the connection since ignoring the request to
* set another username might cause serious problems */
@@ -1568,6 +1568,24 @@
}
}
+bool
+ssl_verify_username_length(struct tls_session *session, const char *username)
+{
+ if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME)
+ && strlen(username) > TLS_USERNAME_LEN)
+ {
+ msg(D_TLS_ERRORS,
+ "TLS Auth Error: --username-as-common name specified and "
+ "username is longer than the maximum permitted Common Name "
+ "length of %d characters", TLS_USERNAME_LEN);
+ return false;
+ }
+ else
+ {
+ return true;
+ }
+}
+
/**
* Main username/password verification entry point
*
@@ -1689,15 +1707,12 @@
}
/* check sizing of username if it will become our common name */
- if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME)
- && strlen(up->username)>TLS_USERNAME_LEN)
+ if (!ssl_verify_username_length(session, up->username))
{
- msg(D_TLS_ERRORS,
- "TLS Auth Error: --username-as-common name specified and username is longer than the maximum permitted Common Name length of %d characters",
- TLS_USERNAME_LEN);
plugin_status = OPENVPN_PLUGIN_FUNC_ERROR;
script_status = OPENVPN_PLUGIN_FUNC_ERROR;
}
+
/* auth succeeded? */
bool plugin_ok = plugin_status == OPENVPN_PLUGIN_FUNC_SUCCESS
|| plugin_status == OPENVPN_PLUGIN_FUNC_DEFERRED;
@@ -192,6 +192,20 @@
struct tls_session *session);
+/**
+ * Checks if the username length is valid to use. This checks when
+ * username-as-common-name is active if the username is shorter than
+ * the maximum TLS common name length (64).
+ *
+ * It will also display an error message if the name is too long
+ *
+ * @param session current TLS session
+ * @param username username to check
+ * @return true if name is under limit or username-as-common-name
+ * is not active
+ */
+bool ssl_verify_username_length(struct tls_session *session,
+ const char *username);
/**
* Runs the --client-crresponse script if one is defined.