diff options
author | Junio C Hamano <gitster@pobox.com> | 2015-04-20 15:28:31 -0700 |
---|---|---|
committer | Junio C Hamano <gitster@pobox.com> | 2015-04-20 15:28:31 -0700 |
commit | 268d5bc2b2a6f261c6da99c3c9557426468a765b (patch) | |
tree | d7787ad5d04e74439f65bfe72542b44d97599511 | |
parent | Merge branch 'ma/bash-completion-leaking-x' (diff) | |
parent | push --signed: tighten what the receiving end can ask to sign (diff) | |
download | tgif-268d5bc2b2a6f261c6da99c3c9557426468a765b.tar.xz |
Merge branch 'jc/push-cert'
The "git push --signed" protocol extension did not limit what the
"nonce" that is a server-chosen string can contain or how long it
can be, which was unnecessarily lax. Limit both the length and the
alphabet to a reasonably small space that can still have enough
entropy.
* jc/push-cert:
push --signed: tighten what the receiving end can ask to sign
-rw-r--r-- | send-pack.c | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/send-pack.c b/send-pack.c index 189bdde0c2..2e07ac3339 100644 --- a/send-pack.c +++ b/send-pack.c @@ -308,6 +308,28 @@ static int atomic_push_failure(struct send_pack_args *args, failing_ref->name, failing_ref->status); } +#define NONCE_LEN_LIMIT 256 + +static void reject_invalid_nonce(const char *nonce, int len) +{ + int i = 0; + + if (NONCE_LEN_LIMIT <= len) + die("the receiving end asked to sign an invalid nonce <%.*s>", + len, nonce); + + for (i = 0; i < len; i++) { + int ch = nonce[i] & 0xFF; + if (isalnum(ch) || + ch == '-' || ch == '.' || + ch == '/' || ch == '+' || + ch == '=' || ch == '_') + continue; + die("the receiving end asked to sign an invalid nonce <%.*s>", + len, nonce); + } +} + int send_pack(struct send_pack_args *args, int fd[], struct child_process *conn, struct ref *remote_refs, @@ -354,6 +376,7 @@ int send_pack(struct send_pack_args *args, push_cert_nonce = server_feature_value("push-cert", &len); if (!push_cert_nonce) die(_("the receiving end does not support --signed push")); + reject_invalid_nonce(push_cert_nonce, len); push_cert_nonce = xmemdupz(push_cert_nonce, len); } |