mikaela.github.io/_posts/2015-02-24-znc160-ssl.md

3.2 KiB
Raw Blame History

TL;DR: if you dont verify SSL certificates, dont use SSL!

ZNC 1.6.0 was released on 2015-02-12 21:05:48Z. It brings multiple improvements such as taking IP addresses from round-robins randomly instead of always resolving them into same IP and most notably it actually verifies SSL certificates.

ZNC 1.6.0 also doesnt have option to blindly accept certificates, which would be stupid, but sadly Quakenet is right about most of people just accepting certificates blindly as people are asking how to disable the SSL certificate verification on #znc at freenode a lot.

Some people even wrote a patch and scripts to disable the verification.

And to the subject

If you dont verify SSL certificates, you only have a false sense of security as you let anyone between your ZNC and the IRC network. This is called as Man-in the middle (or shortly MITM) attack. There are also people asking for ZNC to trust the certificate for the first time and then be alerted if the certificate changes. What if the MITM is there during your first connection attempt and then you are alerted when the real IRC server gives you wrong certificate?

So what is the correct way?

  • Check the website of your IRC network in case the fingerprints are listed on their website.
  • Try asking the operators of your IRC network somewhere else if you know them (like another network or email).
  • This might not be so recommended, but also check the fingerprints from multiple locations.

But the IRC network has hundreds of servers with different certificates!

In this case do what was recommened before ZNC 1.6.0, check some of the servers that are geographically close to you and use them.

Checking the fingerprint from multiple locations

I have shell function (which you can find later on this page) which I run from multiple places:

  • my home, Kotka, Finland
  • Kapsi (shell), somewhere in Finland
  • my VPS, DigitalOcean, London, the UK
# Get server SSL certificate fingerprint in MD5, SHA1 and SHA256.
# Note that OpenSSL doesn't support IPv6 at time of writing (2015-01-13).
serversslcertfp () {
    SSSLCFFN=$(openssl s_client -showcerts -connect $1 < /dev/null)
    # To see all validity information
    echo $SSSLCFFN
    # For getting the fingerprints
    echo $SSSLCFFN | openssl x509 -md5 -fingerprint -noout
    echo $SSSLCFFN | openssl x509 -sha1 -fingerprint -noout
    echo $SSSLCFFN | openssl x509 -sha256 -fingerprint -noout
    unset SSSLCFFN
}

I hope this article has helped you to understand the issues with blindly accepting SSL certificates or at least to understand that if you dont want to verify SSL certificates, dont use SSL.

Updated on 2015-02-26 10:43Z: just use environment variables in the function like suggested by @DarthGandalf on #znc.