Compare commits
7 Commits
c70eefbf56
...
e0e0e0f7cc
Author | SHA1 | Date | |
---|---|---|---|
e0e0e0f7cc | |||
b1e869e125 | |||
4942285f6d | |||
c4ea32ab1e | |||
f3960c6b76 | |||
cb84c20e73 | |||
b52bdfc813 |
52
README.md
52
README.md
@ -36,19 +36,24 @@ certificate: when prompted for "Common Name", say "Certificate
|
||||
Authority" or something like that
|
||||
|
||||
```
|
||||
openssl genrsa -out ca.key 4096
|
||||
openssl req -addext basicConstraints=critical,CA:TRUE,pathlen:1 --x509 -new -nodes -key ca.key -sha256 -days 3650 -out ca.crt
|
||||
openssl genrsa -out private/ca.key 4096
|
||||
openssl req -addext basicConstraints=critical,CA:TRUE,pathlen:0 --x509 -new -nodes -key private/ca.key -sha256 -days 3650 -out certs/ca.crt
|
||||
```
|
||||
|
||||
### Server key and cert
|
||||
|
||||
The certifix service is exposed over HTTPS, so it needs its own
|
||||
certificate signed by the CA. Use your hostname when prompted for
|
||||
Common Name
|
||||
Common Name. If your server host is reachable using different
|
||||
names from different clients then you need to provide _all_ of them
|
||||
as `subjectAltName` - as in the example below.
|
||||
|
||||
```
|
||||
openssl req -newkey rsa:2048 -nodes -keyout server.key --out server.csr
|
||||
openssl x509 -req -in server.csr -days 365 -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt
|
||||
# it's important to list all the hostnames of your server machine in the
|
||||
# subjectAltName field
|
||||
openssl req -newkey rsa:2048 -addext "subjectAltName = DNS:loaclhost.lan,DNS:localhost,DNS:loaclhost.telent.net" -nodes -keyout private/server.key --out certs/server.csr
|
||||
openssl x509 -req -in certs/server.csr -days 365 -CA certs/ca.crt -CAkey private/ca.key -CAcreateserial -copy_extensions copyall -out certs/server.crt
|
||||
|
||||
```
|
||||
|
||||
### Build and start the server
|
||||
@ -61,9 +66,14 @@ it to check client certificate requests against.
|
||||
echo 'loves labours lost' > psk
|
||||
chmod 0700 psk
|
||||
nix-build
|
||||
result/bin/certifix --challenge-password psk --ca-certificate ca.crt --ca-private-key --server-certificate server.crt --server-private-key server.key localhost:19613
|
||||
result/bin/certifix --challenge-password psk --ca-certificate certs/ca.crt --ca-private-key private/ca.key --server-certificate certs/server.crt --server-private-key private/server.key localhost:19613
|
||||
```
|
||||
|
||||
* To listen on all interfaces, use a wildcard address instead of
|
||||
`localhost` - e.g. `::0:19613' will (at least on my machine) accept
|
||||
IPv4 and IPv6 connections on any interface
|
||||
|
||||
|
||||
### Try it and see if it works
|
||||
|
||||
To set the `challengePassword` attribute in a CSR using OpenSSL, you
|
||||
@ -76,33 +86,37 @@ need to create a configuration file. Copy `openssl.cnf.example` to
|
||||
|
||||
```
|
||||
# make CSR
|
||||
CN=mydevice openssl req -config openssl.cnf -newkey rsa:2048 -nodes -keyout client.key -out client.csr
|
||||
CN=mydevice openssl req -config openssl.cnf -addext "subjectAltName = DNS:mydevice.lan" -newkey rsa:2048 -nodes -keyout client.key -out client.csr
|
||||
|
||||
# send it to certifix, should get a certificate in response
|
||||
curl --cacert ca.crt -v -H 'content-type: application/x-pem-file' --data-binary @client.csr https://localhost:19613/sign
|
||||
curl --cacert certs/ca.crt -v -H 'content-type: application/x-pem-file' --data-binary @client.csr https://localhost:19613/sign
|
||||
```
|
||||
|
||||
|
||||
## Reasons this is not secure
|
||||
|
||||
* the CA key is readable by and present in the memory of the process
|
||||
that reads and parses network requests. Bearing in mind the the whole
|
||||
point is to automate signing we can only do so much about this, but at
|
||||
least we could move the actual signing to a separate process which is
|
||||
only invoked once an acceptable request has been received.
|
||||
that reads and parses network requests. Bearing in mind the the
|
||||
whole point is to automate signing we can only do so much about
|
||||
this, but at least we could move the actual signing to a separate
|
||||
process which is only invoked once an acceptable request has been
|
||||
received.
|
||||
|
||||
* there is no intermediate key - the requests are signed directly by the root CA
|
||||
* on that note, in the setup that this README describes there is no
|
||||
intermediate key - the requests are signed directly by the root
|
||||
CA. For a robust setup you might consider ignoring my instructions
|
||||
for generating a self-signed root cert, and instead create a CA
|
||||
signed by an existing (offline?) root CA
|
||||
|
||||
* I haven't checked that the protocols or the ciphers are restricted
|
||||
to modern and sensible defaults
|
||||
|
||||
* doesn't set 4.2.1.6. Subject Alternative Name
|
||||
* doesn't call SSL shutdown at the end of the response, so you may get
|
||||
"unexpected EOF" errors
|
||||
|
||||
* doesn't set Key Usage extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.3)
|
||||
|
||||
* probably has wrong basicConstraints in CA cert
|
||||
|
||||
* likewise other TLS best practices
|
||||
* it has _not_ been reviewed by anyone who knows about TLS best
|
||||
practices. If you are that person, please look at the new-crt
|
||||
function in [main.fnl](main.fnl) and let me know :-)
|
||||
|
||||
|
||||
## Background
|
||||
|
0
certs/.gitkeep
Normal file
0
certs/.gitkeep
Normal file
40
main.fnl
40
main.fnl
@ -6,6 +6,7 @@
|
||||
(local ctx (require :openssl.ssl.context))
|
||||
(local csr (require :openssl.x509.csr))
|
||||
(local x509 (require :openssl.x509))
|
||||
(local extension (require :openssl.x509.extension))
|
||||
(local pkey (require :openssl.pkey))
|
||||
(local bignum (require :openssl.bignum))
|
||||
|
||||
@ -64,6 +65,8 @@
|
||||
(assoc (parse-args rest) :server-private-key (slurp f))
|
||||
["--challenge-password" f & rest]
|
||||
(assoc (parse-args rest) :challenge-password (read-line f))
|
||||
["--sign-file" f & rest]
|
||||
(assoc (parse-args rest) :sign-and-exit (slurp f))
|
||||
[bind-address] { : bind-address }
|
||||
_ {}))
|
||||
|
||||
@ -71,6 +74,8 @@
|
||||
(doto
|
||||
(parse-args arg)
|
||||
(case
|
||||
{:sign-and-exit pathname }
|
||||
true
|
||||
{: ca-certificate : ca-private-key
|
||||
: server-certificate : server-private-key
|
||||
: challenge-password : bind-address}
|
||||
@ -84,14 +89,21 @@
|
||||
(fn new-crt [csr]
|
||||
(let [crt
|
||||
(doto (x509.new)
|
||||
(: :setVersion 2)
|
||||
(: :setVersion 3)
|
||||
(: :setSerial (make-serial))
|
||||
(: :setIssuer (ca-crt:getSubject))
|
||||
(: :setLifetime (os.time) (+ (* 365 86400) (os.time)))
|
||||
(: :setSubject (csr:getSubject))
|
||||
(: :setPublicKey (csr:getPublicKey))
|
||||
(: :sign ca-key))]
|
||||
(crt:toPEM)))
|
||||
(: :setPublicKey (csr:getPublicKey)))]
|
||||
(for [i 1 (csr:getRequestedExtensionCount) 1]
|
||||
(let [ext (csr:getRequestedExtension i)]
|
||||
(crt:addExtension ext)))
|
||||
;; https://www.golinuxcloud.com/add-x509-extensions-to-certificate-openssl/
|
||||
(doto crt
|
||||
(: :addExtension (extension.new "basicConstraints" "critical,CA:FALSE"))
|
||||
(: :addExtension (extension.new "keyUsage" "digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment")) ;; all of these?
|
||||
(: :addExtension (extension.new "extendedKeyUsage" "clientAuth"))
|
||||
(: :sign ca-key))))
|
||||
|
||||
(fn approve-request? [csr]
|
||||
(let [challengePassword (csr:getAttribute :challengePassword)]
|
||||
@ -105,7 +117,7 @@
|
||||
(if (approve-request? req)
|
||||
(do
|
||||
(out:write_headers (make-headers 200 { :content-type "text/plain" }) false)
|
||||
(out:write_chunk (new-crt req) true))
|
||||
(out:write_chunk (: (new-crt req) :toPEM) true))
|
||||
(send-error out 400 "missing attributes in CSR"))))
|
||||
|
||||
(fn on-stream [sv out]
|
||||
@ -136,7 +148,17 @@
|
||||
:ctx (ssl-context)
|
||||
}))))
|
||||
|
||||
(let [s (new-server)]
|
||||
(ncall (s:listen))
|
||||
(print "server ready")
|
||||
(ncall (s:loop)))
|
||||
(fn run-server []
|
||||
(let [s (new-server)]
|
||||
(ncall (s:listen))
|
||||
(print "server ready")
|
||||
(ncall (s:loop))))
|
||||
|
||||
(fn sign-text [s]
|
||||
(let [crt (new-crt (csr.new s))]
|
||||
(print (crt:toPEM))))
|
||||
|
||||
|
||||
(if options.sign-and-exit
|
||||
(sign-text options.sign-and-exit)
|
||||
(run-server))
|
||||
|
0
private/.gitkeep
Normal file
0
private/.gitkeep
Normal file
Loading…
Reference in New Issue
Block a user