From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH 1/2] vpnmain.cgi: Fix for 2nd part of bug10595 Date: Wed, 11 Dec 2024 12:51:43 +0100 Message-ID: <20241211115144.2837-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0379720755390193244==" List-Id: --===============0379720755390193244== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable - Bug10595 had two parts in it and was closed after the first part was fixed.= The second part was still unfixed at that time. I cam across it when checking out an = open bug on a similar issue with OpenVPN. - I found the section that checks on the CA Name and modified it to also allo= w spaces. - Having modified that then the subroutines getsubjectfromcert and getCNfromc= ert required to have quotation marks put around the parameter that had the CA Name with= spaces in it otherwise the openssl statement only got a filename with the first portion= of the ca name until the first space was encountered. - Tested this change out on my vm and it worked fine. I was able to upload a = ca certificate into IPSec and use spaces in the CA Name. Fixes: Bug10595 part 2 Tested-by: Adolf Belka Signed-off-by: Adolf Belka --- html/cgi-bin/vpnmain.cgi | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) mode change 100755 =3D> 100644 html/cgi-bin/vpnmain.cgi diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi old mode 100755 new mode 100644 index 3541aaa29..694eeed76 --- a/html/cgi-bin/vpnmain.cgi +++ b/html/cgi-bin/vpnmain.cgi @@ -245,7 +245,7 @@ sub callssl ($) { ### sub getCNfromcert ($) { #&General::log("ipsec", "Extracting name from $_[0]..."); - my $temp =3D `/usr/bin/openssl x509 -text -in $_[0]`; + my $temp =3D `/usr/bin/openssl x509 -text -in '$_[0]'`; $temp =3D~ /Subject:.*CN\s*=3D\s*(.*)[\n]/; $temp =3D $1; $temp =3D~ s+/Email+, E+; @@ -259,7 +259,7 @@ sub getCNfromcert ($) { ### sub getsubjectfromcert ($) { #&General::log("ipsec", "Extracting subject from $_[0]..."); - my $temp =3D `/usr/bin/openssl x509 -text -in $_[0]`; + my $temp =3D `/usr/bin/openssl x509 -text -in '$_[0]'`; $temp =3D~ /Subject: (.*)[\n]/; $temp =3D $1; $temp =3D~ s+/Email+, E+; @@ -644,8 +644,8 @@ END } elsif ($cgiparams{'ACTION'} eq $Lang::tr{'upload ca certificate'}) { &General::readhasharray("${General::swroot}/vpn/caconfig", \%cahash); =20 - if ($cgiparams{'CA_NAME'} !~ /^[a-zA-Z0-9]+$/) { - $errormessage =3D $Lang::tr{'name must only contain characters'}; + if ($cgiparams{'CA_NAME'} !~ /^[a-zA-Z0-9 ]*$/) { + $errormessage =3D $Lang::tr{'ca name must only contain characters or space= s'}; goto UPLOADCA_ERROR; } =20 --=20 2.47.1 --===============0379720755390193244==--