Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix overlapping pinsets #200

Merged
merged 2 commits into from
Jun 3, 2019
Merged

Fix overlapping pinsets #200

merged 2 commits into from
Jun 3, 2019

Conversation

jportner
Copy link
Contributor

@jportner jportner commented Apr 26, 2019

I noticed that TrustKit behaves unpredictably in a particular corner case--
If there are two overlapping pinsets that include subdomains (say, "foo.com" and "bar.foo.com"), and a host matches both pinsets (say, "baz.bar.foo.com"), the selected pinset cannot be predicted. It's simply determined by which of those two keys shows up first while TrustKit is iterating over its dictionary of domains.

The best example of industry best practice I could find was from Google.
As far as I know, Android is the only platform that provides cert pinning functionality out-of-the-box.
And, TrustKit-Android relies on the base Android pinning implementation.

Google has chosen to handle this corner case by choosing the "most specific (longest) matching domain rule".
See the following links for references:

This is the behavior I had originally expected TrustKit to adhere to.

I modified the selection code to use this approach, and wrote a unit test to validate it.

This test had an outdated pinset which caused it to fail.
Updated the pinset to include a pin from the current intermediate
CA certificate (Let's Encrypt Authority X3)
Observed behavior of TrustKit showed that, when a domain did not
have an exact match for a pinset, the first matching pinset config
with the IncludeSubdomains flag was selected. This led to
unpredictable behavior because of the nature of iterating through
dictionary keys. The change in this commit modifies TrustKit's
selection algorithm to iterate through all pinset configs and then
select the one that is the closest match (e.g, longest domain).
This matches the industry best practice set by Google in their
native Android pinning implementation, and brings TrustKit's
behavior in line with that of TrustKit-Android.
@jportner
Copy link
Contributor Author

@nabla-c0d3 have you had a chance to look at this? I'm happy to elaborate if that would be helpful. Thanks!

@nabla-c0d3 nabla-c0d3 merged commit 3ac15d1 into datatheorem:master Jun 3, 2019
@nabla-c0d3
Copy link
Member

It looks good - thanks!

@SomeRandomiOSDev
Copy link

@nabla-c0d3 Could a formal release be created for this fix? This fix is something that would help me in my project and I would like to be able to incorporate this without having to reference this merge hash.

Thanks!

@nabla-c0d3
Copy link
Member

@SomeRandomiOSDev I released it just now as v1.6.2. Thanks again for the PR!

@jportner jportner deleted the fix-overlapping-pinsets branch October 4, 2019 17:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants