mirror of
https://github.com/rclone/rclone.git
synced 2024-12-11 09:41:47 +01:00
170 lines
5.5 KiB
Go
170 lines
5.5 KiB
Go
|
// Copyright (C) 2019 Storj Labs, Inc.
|
||
|
// See LICENSE for copying information.
|
||
|
|
||
|
package peertls
|
||
|
|
||
|
import (
|
||
|
"bytes"
|
||
|
"crypto"
|
||
|
"crypto/rand"
|
||
|
"crypto/tls"
|
||
|
"crypto/x509"
|
||
|
"io"
|
||
|
|
||
|
"github.com/zeebo/errs"
|
||
|
|
||
|
"storj.io/common/pkcrypto"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
// LeafIndex is the index of the leaf certificate in a cert chain (0)
|
||
|
LeafIndex = iota
|
||
|
// CAIndex is the index of the CA certificate in a cert chain (1)
|
||
|
CAIndex
|
||
|
)
|
||
|
|
||
|
var (
|
||
|
// ErrNotExist is used when a file or directory doesn't exist.
|
||
|
ErrNotExist = errs.Class("file or directory not found error")
|
||
|
// ErrGenerate is used when an error occurred during cert/key generation.
|
||
|
ErrGenerate = errs.Class("tls generation error")
|
||
|
// ErrTLSTemplate is used when an error occurs during tls template generation.
|
||
|
ErrTLSTemplate = errs.Class("tls template error")
|
||
|
// ErrVerifyPeerCert is used when an error occurs during `VerifyPeerCertificate`.
|
||
|
ErrVerifyPeerCert = errs.Class("tls peer certificate verification error")
|
||
|
// ErrVerifyCertificateChain is used when a certificate chain can't be verified from leaf to root
|
||
|
// (i.e.: each cert in the chain should be signed by the preceding cert and the root should be self-signed).
|
||
|
ErrVerifyCertificateChain = errs.Class("certificate chain signature verification failed")
|
||
|
// ErrVerifyCAWhitelist is used when a signature wasn't produced by any CA in the whitelist.
|
||
|
ErrVerifyCAWhitelist = errs.Class("not signed by any CA in the whitelist")
|
||
|
)
|
||
|
|
||
|
// PeerCertVerificationFunc is the signature for a `*tls.Config{}`'s
|
||
|
// `VerifyPeerCertificate` function.
|
||
|
type PeerCertVerificationFunc func([][]byte, [][]*x509.Certificate) error
|
||
|
|
||
|
// VerifyPeerFunc combines multiple `*tls.Config#VerifyPeerCertificate`
|
||
|
// functions and adds certificate parsing.
|
||
|
func VerifyPeerFunc(next ...PeerCertVerificationFunc) PeerCertVerificationFunc {
|
||
|
return func(chain [][]byte, _ [][]*x509.Certificate) error {
|
||
|
c, err := pkcrypto.CertsFromDER(chain)
|
||
|
if err != nil {
|
||
|
return NewNonTemporaryError(ErrVerifyPeerCert.Wrap(err))
|
||
|
}
|
||
|
|
||
|
for _, n := range next {
|
||
|
if n != nil {
|
||
|
if err := n(chain, [][]*x509.Certificate{c}); err != nil {
|
||
|
return NewNonTemporaryError(ErrVerifyPeerCert.Wrap(err))
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// VerifyPeerCertChains verifies that the first certificate chain contains certificates
|
||
|
// which are signed by their respective parents, ending with a self-signed root.
|
||
|
func VerifyPeerCertChains(_ [][]byte, parsedChains [][]*x509.Certificate) error {
|
||
|
return verifyChainSignatures(parsedChains[0])
|
||
|
}
|
||
|
|
||
|
// VerifyCAWhitelist verifies that the peer identity's CA was signed by any one
|
||
|
// of the (certificate authority) certificates in the provided whitelist.
|
||
|
func VerifyCAWhitelist(cas []*x509.Certificate) PeerCertVerificationFunc {
|
||
|
if cas == nil {
|
||
|
return nil
|
||
|
}
|
||
|
return func(_ [][]byte, parsedChains [][]*x509.Certificate) error {
|
||
|
for _, ca := range cas {
|
||
|
err := verifyCertSignature(ca, parsedChains[0][CAIndex])
|
||
|
if err == nil {
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
return ErrVerifyCAWhitelist.New("CA cert")
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TLSCert creates a tls.Certificate from chains, key and leaf.
|
||
|
func TLSCert(chain [][]byte, leaf *x509.Certificate, key crypto.PrivateKey) (*tls.Certificate, error) {
|
||
|
var err error
|
||
|
if leaf == nil {
|
||
|
leaf, err = pkcrypto.CertFromDER(chain[LeafIndex])
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return &tls.Certificate{
|
||
|
Leaf: leaf,
|
||
|
Certificate: chain,
|
||
|
PrivateKey: key,
|
||
|
}, nil
|
||
|
}
|
||
|
|
||
|
// WriteChain writes the certificate chain (leaf-first) and extensions to the writer, PEM-encoded.
|
||
|
func WriteChain(w io.Writer, chain ...*x509.Certificate) error {
|
||
|
if len(chain) < 1 {
|
||
|
return errs.New("expected at least one certificate for writing")
|
||
|
}
|
||
|
|
||
|
var extErrs errs.Group
|
||
|
for _, c := range chain {
|
||
|
if err := pkcrypto.WriteCertPEM(w, c); err != nil {
|
||
|
return errs.Wrap(err)
|
||
|
}
|
||
|
}
|
||
|
return extErrs.Err()
|
||
|
}
|
||
|
|
||
|
// ChainBytes returns bytes of the certificate chain (leaf-first) to the writer, PEM-encoded.
|
||
|
func ChainBytes(chain ...*x509.Certificate) ([]byte, error) {
|
||
|
var data bytes.Buffer
|
||
|
err := WriteChain(&data, chain...)
|
||
|
return data.Bytes(), err
|
||
|
}
|
||
|
|
||
|
// CreateSelfSignedCertificate creates a new self-signed X.509v3 certificate
|
||
|
// using fields from the given template.
|
||
|
//
|
||
|
// A part of the errors that CreateCertificate can return it can return
|
||
|
// pkcrypto.ErrUnsuportedKey error.
|
||
|
func CreateSelfSignedCertificate(key crypto.PrivateKey, template *x509.Certificate) (*x509.Certificate, error) {
|
||
|
pubKey, err := pkcrypto.PublicKeyFromPrivate(key)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
return CreateCertificate(pubKey, key, template, template)
|
||
|
}
|
||
|
|
||
|
// CreateCertificate creates a new X.509v3 certificate based on a template.
|
||
|
// The new certificate:
|
||
|
//
|
||
|
// * will have the public key given as 'signee'
|
||
|
// * will be signed by 'signer' (which should be the private key of 'issuer')
|
||
|
// * will be issued by 'issuer'
|
||
|
// * will have metadata fields copied from 'template'
|
||
|
//
|
||
|
// Returns the new Certificate object.
|
||
|
func CreateCertificate(signee crypto.PublicKey, signer crypto.PrivateKey, template, issuer *x509.Certificate) (*x509.Certificate, error) {
|
||
|
if _, ok := signer.(crypto.Signer); !ok {
|
||
|
// x509.CreateCertificate will panic in this case, so check here and make debugging easier
|
||
|
return nil, errs.New("can't sign certificate with signer key of type %T", signer)
|
||
|
}
|
||
|
|
||
|
// TODO: should we check for uniqueness?
|
||
|
template.ExtraExtensions = append(template.ExtraExtensions, template.Extensions...)
|
||
|
cb, err := x509.CreateCertificate(
|
||
|
rand.Reader,
|
||
|
template,
|
||
|
issuer,
|
||
|
signee,
|
||
|
signer,
|
||
|
)
|
||
|
if err != nil {
|
||
|
return nil, errs.Wrap(err)
|
||
|
}
|
||
|
return pkcrypto.CertFromDER(cb)
|
||
|
}
|