summaryrefslogtreecommitdiffhomepage
path: root/src/event
diff options
context:
space:
mode:
authorMaxim Dounin <mdounin@mdounin.ru>2024-05-06 00:06:15 +0300
committerAleksei Bavshin <a.bavshin@f5.com>2026-04-14 11:26:42 -0600
commit06c9d63fc8a2510a0568cc8b83147add987748cb (patch)
tree0a6dacd8d8e64f56177b76c8c44b333ec9e4b950 /src/event
parentbbaac1d43fdd20e3e42f72e2ed48f325ff8dd873 (diff)
downloadnginx-06c9d63fc8a2510a0568cc8b83147add987748cb.tar.gz
nginx-06c9d63fc8a2510a0568cc8b83147add987748cb.tar.bz2
SSL: logging level of all "SSL alert number N" errors.
Errors about alerts received from peers are generated by OpenSSL by adding peer-provided alert description (from 0 to 255) to SSL_AD_REASON_OFFSET. All such errors, including ones for unknown alerts, are now logged at the "info" level, as these can be caused by a misbehaving client. Signed-off-by: Aleksei Bavshin <a.bavshin@nginx.com> Origin: <https://freenginx.org/hg/nginx/rev/f5423ee155fe>
Diffstat (limited to 'src/event')
-rw-r--r--src/event/ngx_event_openssl.c29
1 files changed, 2 insertions, 27 deletions
diff --git a/src/event/ngx_event_openssl.c b/src/event/ngx_event_openssl.c
index 99ec65444..a466ec2b9 100644
--- a/src/event/ngx_event_openssl.c
+++ b/src/event/ngx_event_openssl.c
@@ -3993,33 +3993,8 @@ ngx_ssl_connection_error(ngx_connection_t *c, int sslerr, ngx_err_t err,
#ifdef SSL_R_BAD_RECORD_TYPE
|| n == SSL_R_BAD_RECORD_TYPE /* 443 */
#endif
- || n == 1000 /* SSL_R_SSLV3_ALERT_CLOSE_NOTIFY */
-#ifdef SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE
- || n == SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE /* 1010 */
- || n == SSL_R_SSLV3_ALERT_BAD_RECORD_MAC /* 1020 */
- || n == SSL_R_TLSV1_ALERT_DECRYPTION_FAILED /* 1021 */
- || n == SSL_R_TLSV1_ALERT_RECORD_OVERFLOW /* 1022 */
- || n == SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE /* 1030 */
- || n == SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE /* 1040 */
- || n == SSL_R_SSLV3_ALERT_NO_CERTIFICATE /* 1041 */
- || n == SSL_R_SSLV3_ALERT_BAD_CERTIFICATE /* 1042 */
- || n == SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE /* 1043 */
- || n == SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED /* 1044 */
- || n == SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED /* 1045 */
- || n == SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN /* 1046 */
- || n == SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER /* 1047 */
- || n == SSL_R_TLSV1_ALERT_UNKNOWN_CA /* 1048 */
- || n == SSL_R_TLSV1_ALERT_ACCESS_DENIED /* 1049 */
- || n == SSL_R_TLSV1_ALERT_DECODE_ERROR /* 1050 */
- || n == SSL_R_TLSV1_ALERT_DECRYPT_ERROR /* 1051 */
- || n == SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION /* 1060 */
- || n == SSL_R_TLSV1_ALERT_PROTOCOL_VERSION /* 1070 */
- || n == SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY /* 1071 */
- || n == SSL_R_TLSV1_ALERT_INTERNAL_ERROR /* 1080 */
- || n == SSL_R_TLSV1_ALERT_USER_CANCELLED /* 1090 */
- || n == SSL_R_TLSV1_ALERT_NO_RENEGOTIATION /* 1100 */
-#endif
- || n == 1121 /* SSL_R_TLSV1_ALERT_ECH_REQUIRED */
+ || (n >= SSL_AD_REASON_OFFSET /* 1000 */
+ && n <= SSL_AD_REASON_OFFSET + 255)
)
{
switch (c->log_error) {