Partially revert previous commit. That solved self signed, but

broke certs signed by other controllers.
This commit is contained in:
Kees Bos 2015-06-24 08:00:50 +02:00
commit 9e1a384edf

View file

@ -286,11 +286,28 @@ void Network::addMembershipCertificate(const CertificateOfMembership &cert,bool
return; return;
} }
// We are the controller: RR->identity.address() == controller() == cert.signedBy() if (cert.signedBy() == RR->identity.address()) {
// So, verify that we signed th cert ourself // We are the controller: RR->identity.address() == controller() == cert.signedBy()
if (!cert.verify(RR->identity)) { // So, verify that we signed th cert ourself
TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str()); if (!cert.verify(RR->identity)) {
return; TRACE("rejected network membership certificate for %.16llx self signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
return;
}
} else {
SharedPtr<Peer> signer(RR->topology->getPeer(cert.signedBy()));
if (!signer) {
// This would be rather odd, since this is our controller... could happen
// if we get packets before we've gotten config.
RR->sw->requestWhois(cert.signedBy());
return;
}
if (!cert.verify(signer->identity())) {
TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
return;
}
} }
} }