tls - binding to the OpenSSL library for encrypted socket and I/O channel communications
This extension provides TCL script access to secure socket communications using the Transport Layer Security (TLS) protocol. It provides a generic binding to OpenSSL, utilizing the Tcl_StackChannel API in TCL 8.4 and higher. These sockets behave exactly the same as channels created using the built-in socket command, but provide additional options for controlling the SSL/TLS session.
The following are the commands provided by the TcLTLS package. See the Examples for example usage and the "demos" directory for more example usage.
Optional function to set the default options used by tls::socket. If you call tls::import directly, the values set by this command have no effect. This command supports all of the same options as the tls::socket command, though you should limit your options to only TLS related ones.
This is a helper function that utilizes the underlying commands socket and tls::import to create the connection. It behaves the same as the native TCL socket command, but also supports the tls:import command options with one additional option. It returns the channel handle id for the new socket.
Same as previous, but instead creates a server socket for clients to connect to just like the Tcl socket -server command. It returns the channel handle id for the new socket.
Start TLS encryption on TCL channel channel via a stacked channel. It need not be a socket, but must provide bi-directional flow. Also sets session parameters for SSL handshake. Valid options are:
Compliment to tls::import. Used to remove the top level stacked channel from channel. This unstacks the encryption of a regular TCL channel. An error is thrown if TLS is not the top stacked channel type.
Forces the TLS negotiation handshake to take place immediately, and returns 0 if handshake is still in progress (non-blocking), or 1 if the handshake was successful. If the handshake failed, an error will be returned.
Returns the current status of an SSL channel. The result is a list of key-value pairs describing the SSL, certificate, and certificate verification status. If the SSL handshake has not yet completed, an empty list is returned. If the -local option is specified, then the local certificate is used. Returned values include:
SSL Status
The protocol selected after Application-Layer Protocol Negotiation (ALPN). This value is new for TclTLS 1.8.
The current cipher in use for the session.
The peername from the certificate. This value is new for TclTLS 1.8.
The protocol version used for the connection: SSL2, SSL3, TLS1, TLS1.1, TLS1.2, TLS1.3, or unknown. This value is new for TclTLS 1.8.
The number of bits used for the session key.
The signature hash algorithm. This value is new for TclTLS 1.8.
The signature type value. This value is new for TclTLS 1.8.
Maximum depth for the certificate chain verification. Default is -1, to check all. This value is new for TclTLS 1.8.
List of certificate verification modes. This value is new for TclTLS 1.8.
Certificate verification result. This value is new for TclTLS 1.8.
List of the Certificate Authorities used to create the certificate. This value is new for TclTLS 1.8.
Certificate Status
Dump of all certificate info. This value is new for TclTLS 1.8.
The certificate version.
The serial number of the certificate as a hex string. This value was changed from serial in TclTLS 1.8.
Cipher algorithm used for certificate signature. This value is new for TclTLS 1.8.
The distinguished name (DN) of the certificate issuer.
The beginning date of the certificate validity.
The expiration date of the certificate validity.
The distinguished name (DN) of the certificate subject. Fields include: Common Name (CN), Organization (O), Locality or City (L), State or Province (S), and Country Name (C).
The issuer unique id. This value is new for TclTLS 1.8.
The subject unique id. This value is new for TclTLS 1.8.
Number of certificate extensions. This value is new for TclTLS 1.8.
List of certificate extension names. This value is new for TclTLS 1.8.
Authority Key Identifier (AKI) of the Issuing CA certificate that signed the SSL certificate as a hex string. This value matches the SKI value of the Intermediate CA certificate. This value is new for TclTLS 1.8.
Subject Key Identifier (SKI) hash of the public key inside the certificate as a hex string. Used to identify certificates that contain a particular public key. This value is new for TclTLS 1.8.
List of all of the Subject Alternative Names (SAN) including domain names, sub domains, and IP addresses that are secured by the certificate. This value is new for TclTLS 1.8.
List of all Online Certificate Status Protocol (OCSP) URLs that can be used to check the validity of this certificate. This value is new for TclTLS 1.8.
The PEM encoded certificate.
Cipher algorithm used for the certificate signature. This value is new for TclTLS 1.8.
Certificate signature as a hex string. This value is new for TclTLS 1.8.
Certificate signing digest as a hex string. This value is new for TclTLS 1.8.
Certificate signature public key algorithm. This value is new for TclTLS 1.8.
Certificate signature public key as a hex string. This value is new for TclTLS 1.8.
Number of bits used for certificate signature key. This value is new for TclTLS 1.8.
Whether the certificate signature is self signed. This value is new for TclTLS 1.8.
The SHA1 hash of the certificate as a hex string. This value is new for TclTLS 1.8.
The SHA256 hash of the certificate as a hex string. This value is new for TclTLS 1.8.
Returns the current connection status of an SSL channel. The result is a list of key-value pairs describing the connection. This command is new for TclTLS 1.8. Returned values include:
SSL Status
State of the connection.
The name of the connected to server.
The protocol version used for the connection: SSL2, SSL3, TLS1, TLS1.1, TLS1.2, TLS1.3, or unknown.
Whether protocol renegotiation is supported or not.
The security level used for selection of ciphers, key size, etc.
Whether the session has been reused or not.
Whether the connection is configured as a server (1) or client (0).
Compression method.
Expansion method.
List of Certificate Authorities (CA) for X.509 certificate.
Cipher Info
The current cipher in use for the connection.
The standard RFC name of cipher.
The number of processed bits used for cipher.
The number of secret bits used for cipher.
The minimum protocol version for cipher.
Whether the cipher is Authenticated Encryption with Associated Data (AEAD).
The OpenSSL cipher id.
A text description of the cipher.
Digest used during handshake.
Session Info
The protocol selected after Application-Layer Protocol Negotiation (ALPN).
Whether the session can be resumed or not.
Time since session started in seconds since epoch.
Max duration of session in seconds before time-out.
Session ticket lifetime hint in seconds.
Unique session id for use in resuming the session.
Unique session ticket for use in resuming the session.
Unique session ticket application data.
Unique session master key.
Server cache mode (client, server, or both).
Without any options, it returns a list of all symmetric ciphers for use with the -cipher option. With protocol, only the ciphers supported for that protocol are returned. See the tls::protocols command for the supported protocols. If verbose is specified as true then a verbose, human readable list is returned with additional information on the cipher. If supported is specified as true, then only the ciphers supported for protocol will be listed. The supported arg is new for TclTLS 1.8.
Returns a list of the supported SSL/TLS protocols. Valid values are: ssl2, ssl3, tls1, tls1.1, tls1.2, and tls1.3. Exact list depends on OpenSSL version and compile time flags. This command is new for TclTLS 1.8.
Returns the OpenSSL version string.
Using the Public Key Infrastructure (PKI), each user creates a private key that only they know about and a public key they can exchange with others for use in encrypting and decrypting data. The process is the sender encrypts their data using their private key and the receiver's public key. The data is then sent to the receiver. In a similar manner, the receiver uses their private key and the sender's public key to decrypt the data. This provides data integrity, to ensure the data can't be viewed or altered during transport. See the -key and -keyfile options for how to specify the private key. Also see the -password option for how to provide the password.
In order to provide authentication, i.e. ensuring someone is who they say they are, the public key and user identification info is stored in a X.509 certificate and that certificate is authenticated (i.e. signed) by a Certificate Authority (CA). Users can then exchange these certificates during the TLS initialization process and check them against the root CA certificates to ensure they are valid. This is handled by OpenSSL via the -request and -require options. See the -cadir, -cadir, and -castore options for how tp specify where to find the CA certificates. Optionally, in a future release, they can also be checked against the Certificate Revocation List (CRL) of revoked certificates. Certificates can also be self-signed, but they are by default not trusted unless you add them to your certificate store.
Typically when visiting web sites, only the client needs to check the server's certificate to ensure it is valid. The server doesn't need to check the client certificate unless you need to authenticate with them to login, etc. See the -cert and -certfile options if you need to provide a certificate.
The following options are used for peer certificate validation:
In TclTLS 1.8 and earlier versions, certificate validation is NOT enabled by default. This limitation is due to the lack of a common cross platform database of Certificate Authority (CA) provided certificates to validate against. Many Linux systems natively support OpenSSL and thus have these certificates installed as part of the OS, but MacOS and MS Windows do not. Staring in TclTLS 2.0, this has been changed to require certificate validation by default. In order to use the -require option, one of the following must be true:
On Linux and Unix systems with OpenSSL already installed or if the CA certificates are available in PEM format, and if they are stored in the standard locations, or if the SSL_CERT_DIR or SSL_CERT_FILE environment variables are set, then -cadir, -cadir, and -castore aren't needed.
If OpenSSL is not installed in the default location, or when using Mac OS or MS Windows and OpenSSL is installed, the SSL_CERT_DIR and/or SSL_CERT_FILE environment variables or the one of the -cadir, -cadir, or -castore options must be defined.
On MS Windows, starting in OpenSSL 3.2, it is now possible to access the built-in Windows Certificate Store from OpenSSL. This can utilized by setting the -castore option to "org.openssl.winstore://". In TclTLS 2.0, this is the default value if -cadir, -cadir, and -castore are not specified.
If OpenSSL is not installed or the CA certificates are not available in PEM format, the CA certificates must be downloaded and installed with the user software. The CURL team makes them available at CA certificates extracted from Mozilla in the "cacert.pem" file. You must then either set the SSL_CERT_DIR and/or SSL_CERT_FILE environment variables or the -cadir or -cafile options to the CA cert file's install location. It is your responsibility to keep this file up to date.
As previously described, each channel can be given their own callbacks to handle intermediate processing by the OpenSSL library, using the -command, -password, and -validate_command options passed to either of tls::socket or tls::import. Unlike previous versions of TclTLS, only if the callback generates an error, will the bgerror command be invoked with the error information.
The callback for the -command option is invoked at several points during the OpenSSL handshake and during routine operations. See below for the possible arguments passed to the callback script. Values returned from the callback are ignored.
The callback for the -password option is invoked by TclTLS whenever OpenSSL needs to obtain a password. See below for the possible arguments passed to the callback script. The user provided password is expected to be returned by the callback.
The callback for the -validatecommand option is invoked during the handshake process in order for the application to validate the provided value(s). See below for the possible arguments passed to the callback script. If not specified, OpenSSL will accept all valid certificates and extensions. To reject the value and abort the connection, the callback should return 0. To accept the value and continue the connection, it should return 1. To reject the value, but continue the connection, it should return 2. This callback is new for TclTLS 1.8.
Reference implementations of these callbacks are provided in "tls.tcl" as tls::callback, tls::password, and tls::validate_command respectively. Note that these are only sample implementations. In a more realistic deployment you would specify your own callback scripts on each TLS channel using the -command, -password, and -validate_command options.
The default behavior when the -command and -validate_command options are not specified, is for TclTLS to process the associated library callbacks internally. The default behavior when the -password option is not specified is for TclTLS to process the associated library callbacks by attempting to call tls::password. The difference between these two behaviors is a consequence of maintaining compatibility with earlier implementations.
The use of the reference callbacks tls::callback, tls::password, and tls::validate_command is not recommended. They may be removed from future releases.
For most debugging needs, the -callback option can be used to provide sufficient insight and information on the TLS handshake and progress. If further troubleshooting insight is needed, the compile time option --enable-debug can be used to get detailed execution flow status.
TLS key logging can be enabled by setting the environment variable SSLKEYLOGFILE to the name of the file to log to. Then whenever TLS key material is generated or received it will be logged to the file. This is useful for logging key data for network logging tools to use to decrypt the data.
The tls::debug variable provides some additional control over the debug logging in the tls::callback, tls::password, and tls::validate_command default handlers in "tls.tcl". The default value is 0 with higher values producing more diagnostic output, and will also force the verify method in tls::callback to accept the certificate, even if it is invalid when the -validatecommand option is set to tls::validate_command.
The use of the variable tls::debug is not recommended. It may be removed from future releases.
The following are example scripts to download a webpage and file using the http package. See Certificate Validation for when the -cadir, -cafile, and -castore options are also needed. See the "demos" directory for more example scripts.
Example #1: Download a web page
package require http package require tls set url "https://www.tcl.tk/" http::register https 443 [list ::tls::socket -autoservername 1 -require 1] # Get URL set token [http::geturl $url] # Check for error if {[http::status $token] ne "ok"} { puts [format "Error %s" [http::status $token]] } # Save web page to file set ch [open example.html wb] puts $ch [http::data $token] close $ch # Cleanup ::http::cleanup $token
Example #2: Download a file
package require http package require tls set url "https://wiki.tcl-lang.org/sitemap.xml" http::register https 443 [list ::tls::socket -autoservername 1 -require 1] # Open output file set filename [file tail $url] set ch [open $filename wb] # Get file set token [::http::geturl $url -blocksize 65536 -channel $ch] # Check for error if {[http::status $token] ne "ok"} { puts [format "Error %s" [http::status $token]] } # Cleanup close $ch ::http::cleanup $token
The capabilities of this package can vary enormously based upon how the linked to OpenSSL library was configured and built. New versions may obsolete older protocol versions, add or remove ciphers, change default values, etc. Use the tls::protocols commands to obtain the supported protocol versions.
I/O, IP Address, OpenSSL, SSL, TCP, TLS, TclTLS, asynchronous I/O, bind, certificate, channel, connection, domain name, host, https, network, network address, socket, tls
tls
Copyright © 1999 Matt Newman
Copyright © 2004 Starfish Systems
Copyright © 2024 Brian O'Hagan