OpenSSL: Secure Communication
(require openssl) |
The openssl library provides glue for the OpenSSL library with the Racket port system. It provides functions nearly identically to the standard TCP subsystem in Racket, plus a generic ports->ssl-ports interface.
To use this library, you will need OpenSSL installed on your machine, but
for Windows, the Racket distribution for Windows includes the necessary DLLs.
for Mac OS X, version 10.2 and later provides the necessary OpenSSL libraries.
for Unix, "libssl.so" and "libcrypto.so" are likely to be installed on your machine, already.
value
value
1 TCP-like Client Procedures
procedure
(ssl-connect hostname port-no [ client-protocol]) →
input-port? output-port? hostname : string? port-no : (integer-in 1 65535)
client-protocol : (or/c ssl-client-context? symbol?) = 'sslv2-or-v3
The optional client-protocol argument determines which encryption protocol is used, whether the server’s certificate is checked, etc. The argument can be either a client context created by ssl-make-client-context, or one of the following symbols: 'sslv2-or-v3 (the default), 'sslv2, 'sslv3, or 'tls; see ssl-make-client-context for further details (including the meanings of the protocol symbols).
Closing the resulting output port does not send a shutdown message to the server. See also ports->ssl-ports.
procedure
(ssl-connect/enable-break hostname port-no [ client-protocol])
→
input-port? output-port? hostname : string? port-no : (integer-in 1 65535)
client-protocol : (or/c ssl-client-context? symbol?) = 'sslv2-or-v3
procedure
(ssl-make-client-context [protocol]) → ssl-client-context?
protocol : symbol? = 'sslv2-or-v3
'sslv2-or-v3 : SSL protocol versions 2 or 3, as appropriate (this is the default)
'sslv2 : SSL protocol version 2
'sslv3 : SSL protocol version 3
'tls : the TLS protocol version 1
Note that SSL protocol version 2 is deprecated on some platforms and may not be present in your system libraries. The use of SSLv2 may also compromise security; thus, using SSLv3 is recommended.
By default, the context returned by ssl-make-client-context does not request verification of a server’s certificate. Use ssl-set-verify! to enable such verification.
procedure
(ssl-client-context? v) → boolean?
v : any/c
2 TCP-like Server Procedures
procedure
(ssl-listen port-no queue-k [ reuse? hostname-or-#f server-protocol]) → ssl-listener? port-no : (integer-in 1 65535) queue-k : exact-nonnegative-integer? reuse? : any/c = #f hostname-or-#f : (or/c string? false/c) = #f
server-protocol : (or/c ssl-server-context? symbol?) = 'sslv2-or-v3
Call ssl-load-certificate-chain! and ssl-load-private-key! to avoid a no shared cipher error on accepting connections. The file "test.pem" in the "openssl" collection is a suitable argument for both calls when testing. Since "test.pem" is public, however, such a test configuration obviously provides no security.
An SSL listener is a synchronizable value (see sync). It is
ready—
procedure
listener : ssl-listener?
procedure
(ssl-listener? v) → boolean?
v : any/c
procedure
(ssl-accept listener) →
input-port? output-port? listener : ssl-listener?
procedure
(ssl-accept/enable-break listener) →
input-port? output-port? listener : ssl-listener?
Closing the resulting output port does not send a shutdown message to the client. See also ports->ssl-ports.
See also ssl-connect about the limitations of reading and writing to an SSL connection (i.e., one direction at a time).
The ssl-accept/enable-break procedure is analogous to tcp-accept/enable-break.
procedure
(ssl-abandon-port in) → void?
in : (and/c ssl-port? output-port?)
procedure
(ssl-addresses p [port-numbers?]) → void?
p : (or/c ssl-port? ssl-listener?) port-numbers? : any/c = #f
procedure
(ssl-make-server-context protocol) → ssl-server-context?
protocol : symbol?
procedure
(ssl-server-context? v) → boolean?
v : any/c
3 SSL-wrapper Interface
procedure
(ports->ssl-ports input-port output-port [ #:mode mode #:context context #:encrypt protocol #:close-original? close-original? #:shutdown-on-close? shutdown-on-close? #:error/ssl error])
→
input-port? output-port? input-port : input-port? output-port : output-port? mode : symbol? = 'accept
context : (or/c ssl-client-context? ssl-server-context?) =
((if (eq? mode 'accept) ssl-make-server-context ssl-make-client-context) protocol) protocol : symbol? = 'sslv2-or-v3 close-original? : boolean? = #f shutdown-on-close? : boolean? = #f error : procedure? = error
The mode argument can be 'connect or 'accept. The mode determines how the SSL protocol is initialized over the ports, either as a client or as a server. As with ssl-listen, in 'accept mode, supply a context that has been initialized with ssl-load-certificate-chain! and ssl-load-private-key! to avoid a no shared cipher error.
The context argument should be a client context for 'connect mode or a server context for 'accept mode. If it is not supplied, a context is created using the protocol specified by a protocol argument.
If the protocol argument is not supplied, it defaults to 'sslv2-or-v3. See ssl-make-client-context for further details (including all options and the meanings of the protocol symbols). This argument is ignored if a context argument is supplied.
If close-original? is true, then when both SSL ports are closed, the given input and output ports are automatically closed.
If shutdown-on-close? is true, then when the output SSL port is closed, it sends a shutdown message to the other end of the SSL connection. When shutdown is enabled, closing the output port can fail if the given output port becomes unwritable (e.g., because the other end of the given port has been closed by another process).
The error argument is an error procedure to use for raising communication errors. The default is error, which raises exn:fail; in contrast, ssl-accept and ssl-connect use an error function that raises exn:fail:network.
See also ssl-connect about the limitations of reading and writing to an SSL connection (i.e., one direction at a time).
4 Context Procedures
procedure
(ssl-load-certificate-chain! context-or-listener pathname) → void?
context-or-listener :
(or/c ssl-client-context? ssl-server-context? ssl-listener?) pathname : path-string?
This chain is used to identify the client or server when it connects or accepts connections. Loading a chain overwrites the old chain. Also call ssl-load-private-key! to load the certificate’s corresponding key.
You can use the file "test.pem" of the "openssl" collection for testing purposes. Since "test.pem" is public, such a test configuration obviously provides no security.
procedure
(ssl-load-private-key! context-or-listener pathname [ rsa? asn1?]) → void?
context-or-listener :
(or/c ssl-client-context? ssl-server-context? ssl-listener?) pathname : path-string? rsa? : boolean? = #t asn1? : boolean? = #f
If rsa? is #t (the default), the first RSA key is read (i.e., non-RSA keys are skipped). If asn1? is #t, the file is parsed as ASN1 format instead of PEM.
You can use the file "test.pem" of the "openssl" collection for testing purposes. Since "test.pem" is public, such a test configuration obviously provides no security.
procedure
(ssl-load-verify-root-certificates! context-or-listener pathname) → void?
context-or-listener :
(or/c ssl-client-context? ssl-server-context? ssl-listener?) pathname : path-string?
You can use the file "test.pem" of the "openssl" collection for testing purposes. Since "test.pem" is public, such a test configuration obviously provides no security.
procedure
(ssl-load-suggested-certificate-authorities! context-or-listener pathname) → void?
context-or-listener :
(or/c ssl-client-context? ssl-server-context? ssl-listener?) pathname : path-string?
Loading the suggested certificates does not imply trust, however; any certificate presented by the client will be checked using the trusted roots loaded by ssl-load-verify-root-certificates!.
You can use the file "test.pem" of the "openssl" collection for testing purposes where the peer identifies itself using "test.pem".
5 Peer Verification
procedure
(ssl-set-verify! clp on?) → void
clp :
(or/c ssl-client-context? ssl-server-context? ssl-listener? ssl-port?) on? : any/c
Enabling verification also requires, at a minimum, designating trusted certificate authorities with ssl-load-verify-root-certificates!.
procedure
(ssl-try-verify! clp on?) → void
clp :
(or/c ssl-client-context? ssl-server-context? ssl-listener? ssl-port?) on? : any/c
procedure
(ssl-peer-verified? p) → boolean?
p : ssl-port?
procedure
(ssl-peer-subject-name p) → (or/c bytes? #f)
p : ssl-port?
procedure
(ssl-peer-issuer-name p) → (or/c bytes? #f)
p : ssl-port?
6 SHA-1 Hashing
The sha1 function composes bytes->hex-string with sha1-bytes.
procedure
(sha1-bytes in) → bytes?
in : input-port
procedure
(bytes->hex-string bstr) → string?
bstr : bytes?
7 Implementation Notes
For Windows, openssl relies on "libeay32.dll" and "ssleay32.dll", where the DLLs are located in the same place as "libmzsch‹vers›.dll" (where ‹vers› is either xxxxxxx or a mangling of Racket’s version number). The DLLs are distributed as part of Racket.
For Unix variants, openssl relies on "libcrypto.so" and "libssl.so", which must be installed in a standard library location, or in a directory listed by LD_LIBRARY_PATH.
For Mac OS X, openssl relies on "libssl.dylib" and "libcrypto.dylib", which are part of the OS distribution for Mac OS X 10.2 and later.