blob: f245ea17308895aec8dac73338e8f56bf15f1416 [file] [log] [blame] [view]
Simon Butcherdf819242015-08-19 19:33:27 +01001# HTTPS File Download Example/ TLS Client
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +02002
Simon Butcherdf819242015-08-19 19:33:27 +01003This application downloads a file from an HTTPS server (developer.mbed.org) and looks for a specific string in that file.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +02004
5This example is implemented as a logic class (HelloHTTPS) wrapping a TCP socket and a TLS context. The logic class handles all events, leaving the main loop to just check if the process has finished.
6
7## Pre-requisites
8
Simon Butcherdf819242015-08-19 19:33:27 +01009To build and run this example the following requirements are necessary:
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020010
11* A computer with the following software installed:
12 * [CMake](http://www.cmake.org/download/).
13 * [yotta](https://github.com/ARMmbed/yotta). Please note that **yotta has its own set of dependencies**, listed in the [installation instructions](http://armmbed.github.io/yotta/#installing-on-windows).
14 * [Python](https://www.python.org/downloads/).
15 * [ARM GCC toolchain](https://launchpad.net/gcc-arm-embedded).
16 * A serial terminal emulator (e.g. screen, pySerial, cu).
Simon Butcherdf819242015-08-19 19:33:27 +010017* An [FRDM-K64F](http://developer.mbed.org/platforms/FRDM-K64F/) development board, or another board that has an ethernet port and is supported by mbed OS (in which case you'll have to substitute frdm-k64f-gcc with the appropriate target in the instructions below).
18* An ethernet connection to the internet.
19* An ethernet cable.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020020* A micro-USB cable.
21* If your OS is Windows, please follow the installation instructions [for the serial port driver](https://developer.mbed.org/handbook/Windows-serial-configuration).
22
23## Getting started
24
251. Connect the FRDM-K64F to the internet using the ethernet cable.
26
Simon Butcherdf819242015-08-19 19:33:27 +0100272. Connect the FRDM-K64F to the computer with the micro-USB cable, being careful to use the "OpenSDA" connector on the target board.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020028
293. Navigate to the mbedtls directory supplied with your release and open a terminal.
30
314. Set the yotta target:
32
33 ```
34 yotta target frdm-k64f-gcc
35 ```
36
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +0200375. Build mbedtls and the examples. This will take a long time if it is the first time:
38
39 ```
Simon Butcherdf819242015-08-19 19:33:27 +010040 $ yotta build
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020041 ```
42
Brian Daniels3c405ae2015-08-18 10:52:57 -0700436. Copy `build/frdm-k64f-gcc/test/mbedtls-test-example-tls-client.bin` to your mbed board and wait until the LED next to the USB port stops blinking.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020044
Brian Daniels3c405ae2015-08-18 10:52:57 -0700457. Start the serial terminal emulator and connect to the virtual serial port presented by FRDM-K64F. For settings, use 115200 baud, 8N1, no flow control. **Warning:** for this example, the baud rate is not the default 9600, it is 115200.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020046
Brian Daniels3c405ae2015-08-18 10:52:57 -0700478. Press the reset button on the board.
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020048
Simon Butchera1500502015-08-19 20:29:31 +0100499. The output in the terminal window should look similar to this:
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020050
51 ```
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020052 {{timeout;120}}
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020053 {{host_test_name;default}}
54 {{description;mbed TLS example HTTPS client}}
55 {{test_id;MBEDTLS_EX_HTTPS_CLIENT}}
56 {{start}}
57
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020058 Client IP Address is 192.168.0.2
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020059 Starting DNS lookup for developer.mbed.org
60 DNS Response Received:
61 developer.mbed.org: 217.140.101.30
62 Connecting to 217.140.101.30:443
63 Connected to 217.140.101.30:443
64 Starting the TLS handshake...
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020065 TLS connection to developer.mbed.org established
66 Server certificate:
67 cert. version : 3
68 serial number : 11:21:4E:4B:13:27:F0:89:21:FB:70:EC:3B:B5:73:5C:FF:B9
69 issuer name : C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2
70 subject name : C=GB, ST=Cambridgeshire, L=Cambridge, O=ARM Ltd, CN=*.mbed.com
71 issued on : 2015-03-05 10:31:02
72 expires on : 2016-03-05 10:31:02
73 signed using : RSA with SHA-256
74 RSA key size : 2048 bits
75 basic constraints : CA=false
76 subject alt name : *.mbed.com, *.mbed.org, mbed.org, mbed.com
77 key usage : Digital Signature, Key Encipherment
78 ext key usage : TLS Web Server Authentication, TLS Web Client Authentication
79 Certificate verification passed
80
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020081 HTTPS: Received 473 chars from server
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020082 HTTPS: Received 200 OK status ... [OK]
83 HTTPS: Received 'Hello world!' status ... [OK]
84 HTTPS: Received message:
85
86 HTTP/1.1 200 OK
87 Server: nginx/1.7.10
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020088 Date: Tue, 18 Aug 2015 18:34:04 GMT
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020089 Content-Type: text/plain
90 Content-Length: 14
91 Connection: keep-alive
92 Last-Modified: Fri, 27 Jul 2012 13:30:34 GMT
93 Accept-Ranges: bytes
94 Cache-Control: max-age=36000
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020095 Expires: Wed, 19 Aug 2015 04:34:04 GMT
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +020096 X-Upstream-L3: 172.17.42.1:8080
Manuel Pégourié-Gonnard1a18aae2015-08-18 20:38:22 +020097 X-Upstream-L2: developer-sjc-indigo-2-nginx
98 X-Upstream-L1-next-hop: 217.140.101.86:8001
99 X-Upstream-L1: developer-sjc-indigo-border-nginx
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +0200100
101 Hello world!
102 {{success}}
103 {{end}}
104 ```
105
106## Debugging the TLS connection
107
108If you are experiencing problems with this example, you should first rule out network issues by making sure the [simple HTTP file downloader example](https://github.com/ARMmbed/mbed-example-network-private/tree/maste r/test/helloworld-tcpclient) for the TCP module works as expected. If not, please follow the debug instructions for this example.
109
110To print out more debug information about the TLS connection, edit the file `source/main.cpp` and change the definition of `DEBUG_LEVEL` near the top of the file from 0 to a positive number:
111
112* Level 1 only prints non-zero return codes from SSL functions and information about the full certificate chain being verified.
113
114* Level 2 prints more information about internal state updates.
115
116* Level 3 is intermediate.
117
118* Level 4 (the maximum) includes full binary dumps of the packets.
119
Simon Butcherdf819242015-08-19 19:33:27 +0100120
Manuel Pégourié-Gonnard63e7eba2015-07-28 14:17:48 +0200121If the TLS connection is failing with an error similar to:
122
123 ```
124 mbedtls_ssl_write() failed: -0x2700 (-9984): X509 - Certificate verification failed, e.g. CRL, CA or signature check failed
125 Failed to fetch /media/uploads/mbed_official/hello.txt from developer.mbed.org:443
126 ```
127
Simon Butcherdf819242015-08-19 19:33:27 +0100128it probably means you need to update the contents of the `SSL_CA_PEM` constant (this can happen if you modify `HTTPS_SERVER_NAME`, or when `developer.mbed.org` switches to a new CA when updating its certificate). Another reason for this error may be a proxy providing a different certificate. Proxys can be used in some network configurations or for performing man-in-the-middle attacks. If you choose to ignore this error and proceed with the connection anyway, you can change the definition of `UNSAFE` near the top of the file from 0 to 1. **Warning:** this removes all security against a possible attacker, therefore use at your own risk, or for debugging only!