2024-01-17 18:32:44 +08:00
|
|
|
---
|
2024-02-28 18:28:10 +08:00
|
|
|
c: Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
2024-01-17 18:32:44 +08:00
|
|
|
SPDX-License-Identifier: curl
|
|
|
|
Title: CURLOPT_SSL_VERIFYHOST
|
|
|
|
Section: 3
|
|
|
|
Source: libcurl
|
|
|
|
See-also:
|
|
|
|
- CURLOPT_CAINFO (3)
|
|
|
|
- CURLOPT_PINNEDPUBLICKEY (3)
|
|
|
|
- CURLOPT_SSL_VERIFYPEER (3)
|
|
|
|
---
|
|
|
|
|
|
|
|
# NAME
|
|
|
|
|
|
|
|
CURLOPT_SSL_VERIFYHOST - verify the certificate's name against host
|
|
|
|
|
|
|
|
# SYNOPSIS
|
|
|
|
|
|
|
|
~~~c
|
2014-06-18 20:38:24 +08:00
|
|
|
#include <curl/curl.h>
|
|
|
|
|
|
|
|
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSL_VERIFYHOST, long verify);
|
2024-01-17 18:32:44 +08:00
|
|
|
~~~
|
|
|
|
|
|
|
|
# DESCRIPTION
|
|
|
|
|
|
|
|
Pass a long as parameter specifying what to *verify*.
|
2014-06-18 20:38:24 +08:00
|
|
|
|
|
|
|
This option determines whether libcurl verifies that the server cert is for
|
|
|
|
the server it is known as.
|
|
|
|
|
|
|
|
When negotiating TLS and SSL connections, the server sends a certificate
|
|
|
|
indicating its identity.
|
|
|
|
|
2024-01-17 18:32:44 +08:00
|
|
|
When CURLOPT_SSL_VERIFYHOST(3) is 2, that certificate must indicate that
|
2014-06-18 20:38:24 +08:00
|
|
|
the server is the server to which you meant to connect, or the connection
|
|
|
|
fails. Simply put, it means it has to have the same name in the certificate as
|
|
|
|
is in the URL you operate against.
|
|
|
|
|
|
|
|
Curl considers the server the intended one when the Common Name field or a
|
2024-01-23 22:12:09 +08:00
|
|
|
Subject Alternate Name field in the certificate matches the hostname in the
|
2014-06-18 20:38:24 +08:00
|
|
|
URL to which you told Curl to connect.
|
|
|
|
|
2024-01-17 18:32:44 +08:00
|
|
|
If *verify* value is set to 1:
|
2019-08-20 15:13:55 +08:00
|
|
|
|
|
|
|
In 7.28.0 and earlier: treated as a debug option of some sorts, not supported
|
|
|
|
anymore due to frequently leading to programmer mistakes.
|
|
|
|
|
2024-01-17 18:32:44 +08:00
|
|
|
From 7.28.1 to 7.65.3: setting it to 1 made curl_easy_setopt(3) return
|
2023-09-27 17:36:03 +08:00
|
|
|
an error and leaving the flag untouched.
|
2019-08-20 15:13:55 +08:00
|
|
|
|
|
|
|
From 7.66.0: treats 1 and 2 the same.
|
2014-06-18 20:38:24 +08:00
|
|
|
|
2024-01-17 18:32:44 +08:00
|
|
|
When the *verify* value is 0, the connection succeeds regardless of the
|
2014-06-18 20:38:24 +08:00
|
|
|
names in the certificate. Use that ability with caution!
|
|
|
|
|
|
|
|
The default value for this option is 2.
|
|
|
|
|
|
|
|
This option controls checking the server's certificate's claimed identity.
|
2024-01-17 18:32:44 +08:00
|
|
|
The server could be lying. To control lying, see CURLOPT_SSL_VERIFYPEER(3).
|
2022-12-22 06:36:57 +08:00
|
|
|
|
|
|
|
WARNING: disabling verification of the certificate allows bad guys to
|
|
|
|
man-in-the-middle the communication without you knowing it. Disabling
|
|
|
|
verification makes the communication insecure. Just having encryption on a
|
|
|
|
transfer is not enough as you cannot be sure that you are communicating with
|
|
|
|
the correct end-point.
|
|
|
|
|
|
|
|
When libcurl uses secure protocols it trusts responses and allows for example
|
|
|
|
HSTS and Alt-Svc information to be stored and used subsequently. Disabling
|
|
|
|
certificate verification can make libcurl trust and use such information from
|
|
|
|
malicious servers.
|
2024-01-17 18:32:44 +08:00
|
|
|
|
|
|
|
# LIMITATIONS
|
|
|
|
|
|
|
|
Secure Transport: If *verify* value is 0, then SNI is also disabled. SNI is
|
2020-07-16 16:11:10 +08:00
|
|
|
a TLS extension that sends the hostname to the server. The server may use that
|
2017-02-03 05:40:16 +08:00
|
|
|
information to do such things as sending back a specific certificate for the
|
|
|
|
hostname, or forwarding the request to a specific origin server. Some hostnames
|
|
|
|
may be inaccessible if SNI is not sent.
|
2024-01-17 18:32:44 +08:00
|
|
|
|
|
|
|
# DEFAULT
|
|
|
|
|
2014-06-18 20:38:24 +08:00
|
|
|
2
|
2024-01-17 18:32:44 +08:00
|
|
|
|
|
|
|
# PROTOCOLS
|
|
|
|
|
2015-11-08 06:11:04 +08:00
|
|
|
All TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
|
2024-01-17 18:32:44 +08:00
|
|
|
|
|
|
|
# EXAMPLE
|
|
|
|
|
|
|
|
~~~c
|
2023-12-04 17:50:42 +08:00
|
|
|
int main(void)
|
|
|
|
{
|
|
|
|
CURL *curl = curl_easy_init();
|
|
|
|
if(curl) {
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, "https://example.com");
|
2015-03-17 15:03:46 +08:00
|
|
|
|
2023-12-04 17:50:42 +08:00
|
|
|
/* Set the default value: strict name check please */
|
|
|
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 2L);
|
2015-03-17 15:03:46 +08:00
|
|
|
|
2023-12-04 17:50:42 +08:00
|
|
|
curl_easy_perform(curl);
|
|
|
|
}
|
2015-03-17 15:03:46 +08:00
|
|
|
}
|
2024-01-17 18:32:44 +08:00
|
|
|
~~~
|
|
|
|
|
|
|
|
# AVAILABILITY
|
|
|
|
|
2014-06-18 20:38:24 +08:00
|
|
|
If built TLS enabled.
|
2024-01-17 18:32:44 +08:00
|
|
|
|
|
|
|
# RETURN VALUE
|
|
|
|
|
2014-06-18 20:38:24 +08:00
|
|
|
Returns CURLE_OK if TLS is supported, and CURLE_UNKNOWN_OPTION if not.
|
|
|
|
|
2024-01-17 18:32:44 +08:00
|
|
|
If 1 is set as argument, *CURLE_BAD_FUNCTION_ARGUMENT* is returned.
|