143 lines
3.6 KiB
Go
143 lines
3.6 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
"bufio"
|
|
"strings"
|
|
|
|
"golang.org/x/net/idna"
|
|
|
|
"src.agwa.name/ctwatch"
|
|
"src.agwa.name/ctwatch/ct"
|
|
"src.agwa.name/ctwatch/cmd"
|
|
)
|
|
|
|
func DefaultStateDir () string {
|
|
if envVar := os.Getenv("CTWATCH_STATE_DIR"); envVar != "" {
|
|
return envVar
|
|
} else {
|
|
return cmd.DefaultStateDir("ctwatch")
|
|
}
|
|
}
|
|
|
|
var stateDir = flag.String("state_dir", DefaultStateDir(), "Directory for storing state")
|
|
var watchDomains []string
|
|
var watchDomainSuffixes []string
|
|
|
|
func addWatchDomain (asciiDomain string) {
|
|
watchDomains = append(watchDomains, asciiDomain)
|
|
watchDomainSuffixes = append(watchDomainSuffixes, "." + asciiDomain)
|
|
}
|
|
|
|
func setWatchDomains (domains []string) error {
|
|
for _, domain := range domains {
|
|
if domain == "." { // "." as in root zone (matches everything)
|
|
watchDomains = []string{}
|
|
watchDomainSuffixes = []string{""}
|
|
break
|
|
} else {
|
|
asciiDomain, err := idna.ToASCII(strings.ToLower(domain))
|
|
if err != nil {
|
|
return fmt.Errorf("Invalid domain `%s': %s", domain, err)
|
|
}
|
|
|
|
addWatchDomain(asciiDomain)
|
|
|
|
// Also monitor DNS names that _might_ match this domain (wildcards,
|
|
// label redactions, and unparseable labels).
|
|
// For example, if we're monitoring sub.example.com, also monitor:
|
|
// *.example.com
|
|
// ?.example.com
|
|
// <invalid>.example.com
|
|
var parentDomain string
|
|
if dot := strings.IndexRune(asciiDomain, '.'); dot != -1 {
|
|
parentDomain = asciiDomain[dot:]
|
|
}
|
|
addWatchDomain("*" + parentDomain)
|
|
addWatchDomain("?" + parentDomain)
|
|
addWatchDomain(ctwatch.InvalidDNSLabelPlaceholder + parentDomain)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func dnsNameMatches (dnsName string) bool {
|
|
for _, domain := range watchDomains {
|
|
if dnsName == domain {
|
|
return true
|
|
}
|
|
}
|
|
for _, domainSuffix := range watchDomainSuffixes {
|
|
if strings.HasSuffix(dnsName, domainSuffix) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func anyDnsNameMatches (dnsNames []string) bool {
|
|
for _, dnsName := range dnsNames {
|
|
if dnsNameMatches(dnsName) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func processEntry (scanner *ctwatch.Scanner, entry *ct.LogEntry) {
|
|
info := ctwatch.EntryInfo{
|
|
LogUri: scanner.LogUri,
|
|
Entry: entry,
|
|
IsPrecert: ctwatch.IsPrecert(entry),
|
|
FullChain: ctwatch.GetFullChain(entry),
|
|
}
|
|
|
|
info.CertInfo, info.ParseError = ctwatch.MakeCertInfoFromLogEntry(entry)
|
|
|
|
// If there's any sort of parse error related to the identifiers, report
|
|
// the certificate because we can't say for sure it doesn't match a domain
|
|
// we care about (fail safe behavior).
|
|
if info.ParseError != nil ||
|
|
info.CertInfo.IdentifiersParseError != nil ||
|
|
anyDnsNameMatches(info.CertInfo.Identifiers.DNSNames) {
|
|
cmd.LogEntry(&info)
|
|
}
|
|
}
|
|
|
|
func main() {
|
|
flag.Parse()
|
|
|
|
if flag.NArg() == 0 {
|
|
fmt.Fprintf(os.Stderr, "Usage: %s [flags] domain ...\n", os.Args[0])
|
|
fmt.Fprintf(os.Stderr, "\n")
|
|
fmt.Fprintf(os.Stderr, "To read domain list from stdin, use '-'. To monitor all domains, use '.'.\n")
|
|
fmt.Fprintf(os.Stderr, "See '%s -help' for a list of valid flags.\n", os.Args[0])
|
|
os.Exit(2)
|
|
}
|
|
|
|
if flag.NArg() == 1 && flag.Arg(0) == "-" {
|
|
var domains []string
|
|
scanner := bufio.NewScanner(os.Stdin)
|
|
for scanner.Scan() {
|
|
domains = append(domains, scanner.Text())
|
|
}
|
|
if err := scanner.Err(); err != nil {
|
|
fmt.Fprintf(os.Stderr, "%s: Error reading standard input: %s\n", os.Args[0], err)
|
|
os.Exit(1)
|
|
}
|
|
if err := setWatchDomains(domains); err != nil {
|
|
fmt.Fprintf(os.Stderr, "%s: %s\n", os.Args[0], err)
|
|
os.Exit(1)
|
|
}
|
|
} else {
|
|
if err := setWatchDomains(flag.Args()); err != nil {
|
|
fmt.Fprintf(os.Stderr, "%s: %s\n", os.Args[0], err)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
cmd.Main(*stateDir, processEntry)
|
|
}
|