Add submitct program for submitting certs
This commit is contained in:
parent
8846cbcbd9
commit
e7a9ba6e7d
|
@ -0,0 +1,200 @@
|
||||||
|
// Copyright (C) 2017 Opsmate, Inc.
|
||||||
|
//
|
||||||
|
// This Source Code Form is subject to the terms of the Mozilla
|
||||||
|
// Public License, v. 2.0. If a copy of the MPL was not distributed
|
||||||
|
// with this file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
//
|
||||||
|
// This software is distributed WITHOUT A WARRANTY OF ANY KIND.
|
||||||
|
// See the Mozilla Public License for details.
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"software.sslmate.com/src/certspotter"
|
||||||
|
"software.sslmate.com/src/certspotter/ct"
|
||||||
|
"software.sslmate.com/src/certspotter/ct/client"
|
||||||
|
|
||||||
|
"bytes"
|
||||||
|
"crypto/sha256"
|
||||||
|
"encoding/pem"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"sync"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var verbose = flag.Bool("v", false, "Enable verbose output")
|
||||||
|
|
||||||
|
type Chain []*Certificate
|
||||||
|
|
||||||
|
func (c Chain) GetRawCerts() [][]byte {
|
||||||
|
rawCerts := make([][]byte, len(c))
|
||||||
|
for i := range c {
|
||||||
|
rawCerts[i] = c[i].Raw
|
||||||
|
}
|
||||||
|
return rawCerts
|
||||||
|
}
|
||||||
|
|
||||||
|
type Log struct {
|
||||||
|
info certspotter.LogInfo
|
||||||
|
verify *ct.SignatureVerifier
|
||||||
|
client *client.LogClient
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ctlog *Log) SubmitChain(chain Chain) (*ct.SignedCertificateTimestamp, error) {
|
||||||
|
rawCerts := chain.GetRawCerts()
|
||||||
|
sct, err := ctlog.client.AddChain(rawCerts)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
entry := ct.LogEntry{
|
||||||
|
Leaf: ct.MerkleTreeLeaf{
|
||||||
|
Version: 0,
|
||||||
|
LeafType: ct.TimestampedEntryLeafType,
|
||||||
|
TimestampedEntry: ct.TimestampedEntry{
|
||||||
|
Timestamp: sct.Timestamp,
|
||||||
|
EntryType: ct.X509LogEntryType,
|
||||||
|
X509Entry: rawCerts[0],
|
||||||
|
Extensions: sct.Extensions,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ctlog.verify.VerifySCTSignature(*sct, entry); err != nil {
|
||||||
|
return nil, fmt.Errorf("Bad SCT signature: %s", err)
|
||||||
|
}
|
||||||
|
return sct, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type Certificate struct {
|
||||||
|
Subject []byte
|
||||||
|
Issuer []byte
|
||||||
|
Raw []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func parseCertificate(data []byte) (*Certificate, error) {
|
||||||
|
crt, err := certspotter.ParseCertificate(data)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
tbs, err := crt.ParseTBSCertificate()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Certificate{
|
||||||
|
Subject: tbs.Subject.FullBytes,
|
||||||
|
Issuer: tbs.Issuer.FullBytes,
|
||||||
|
Raw: data,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func findCertificate(certs []*Certificate, subject []byte) *Certificate {
|
||||||
|
for _, cert := range certs {
|
||||||
|
if bytes.Equal(cert.Subject, subject) {
|
||||||
|
return cert
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func buildChain(cert *Certificate, certs []*Certificate) Chain {
|
||||||
|
chain := make([]*Certificate, 0)
|
||||||
|
for len(chain) < 16 && cert != nil && !bytes.Equal(cert.Subject, cert.Issuer) {
|
||||||
|
chain = append(chain, cert)
|
||||||
|
cert = findCertificate(certs, cert.Issuer)
|
||||||
|
}
|
||||||
|
return chain
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
log.SetPrefix("submitct: ")
|
||||||
|
|
||||||
|
certsPem, err := ioutil.ReadAll(os.Stdin)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Error reading stdin: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
logs := make([]Log, 0, len(certspotter.OpenLogs))
|
||||||
|
for _, loginfo := range certspotter.OpenLogs {
|
||||||
|
pubkey, err := loginfo.ParsedPublicKey()
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("%s: Failed to parse log public key: %s", loginfo.Url, err)
|
||||||
|
}
|
||||||
|
verify, err := ct.NewSignatureVerifier(pubkey)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("%s: Failed to create signature verifier for log: %s", loginfo.Url, err)
|
||||||
|
}
|
||||||
|
logs = append(logs, Log{
|
||||||
|
info: loginfo,
|
||||||
|
verify: verify,
|
||||||
|
client: client.New(loginfo.FullURI()),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
var certs []*Certificate
|
||||||
|
var parseErrors uint32
|
||||||
|
var submitErrors uint32
|
||||||
|
|
||||||
|
for len(certsPem) > 0 {
|
||||||
|
var pemBlock *pem.Block
|
||||||
|
pemBlock, certsPem = pem.Decode(certsPem)
|
||||||
|
if pemBlock == nil {
|
||||||
|
log.Fatalf("Invalid PEM read from stdin")
|
||||||
|
}
|
||||||
|
if pemBlock.Type != "CERTIFICATE" {
|
||||||
|
log.Printf("Ignoring non-certificate read from stdin")
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
cert, err := parseCertificate(pemBlock.Bytes)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("Ignoring un-parseable certificate read from stdin: %s", err)
|
||||||
|
parseErrors++
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
certs = append(certs, cert)
|
||||||
|
}
|
||||||
|
|
||||||
|
wg := sync.WaitGroup{}
|
||||||
|
for _, cert := range certs {
|
||||||
|
chain := buildChain(cert, certs)
|
||||||
|
if len(chain) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
fingerprint := sha256.Sum256(chain[0].Raw)
|
||||||
|
for _, ctlog := range logs {
|
||||||
|
wg.Add(1)
|
||||||
|
go func(ctlog Log) {
|
||||||
|
sct, err := ctlog.SubmitChain(chain)
|
||||||
|
if err != nil {
|
||||||
|
log.Printf("%x: %s: Submission Error: %s", fingerprint, ctlog.info.Url, err)
|
||||||
|
atomic.AddUint32(&submitErrors, 1)
|
||||||
|
} else if *verbose {
|
||||||
|
timestamp := time.Unix(int64(sct.Timestamp)/1000, int64(sct.Timestamp%1000)*1000000)
|
||||||
|
log.Printf("%x: %s: Submitted at %s", fingerprint, ctlog.info.Url, timestamp)
|
||||||
|
}
|
||||||
|
wg.Done()
|
||||||
|
}(ctlog)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
wg.Wait()
|
||||||
|
|
||||||
|
exitStatus := 0
|
||||||
|
if parseErrors > 0 {
|
||||||
|
log.Printf("%d certificates failed to parse and were ignored", parseErrors)
|
||||||
|
exitStatus |= 4
|
||||||
|
}
|
||||||
|
if submitErrors > 0 {
|
||||||
|
log.Printf("%d submission errors occurred", submitErrors)
|
||||||
|
exitStatus |= 8
|
||||||
|
}
|
||||||
|
os.Exit(exitStatus)
|
||||||
|
}
|
Loading…
Reference in New Issue