2016-10-09 02:04:54 +02:00
|
|
|
import re
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
from cryptography import x509
|
2018-06-20 17:42:34 +02:00
|
|
|
from cryptography.exceptions import UnsupportedAlgorithm, InvalidSignature
|
2016-05-09 20:00:16 +02:00
|
|
|
from cryptography.hazmat.backends import default_backend
|
2017-08-17 04:24:49 +02:00
|
|
|
from cryptography.x509 import NameOID
|
|
|
|
from flask import current_app
|
2016-10-15 09:04:35 +02:00
|
|
|
from marshmallow.exceptions import ValidationError
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
from lemur.auth.permissions import SensitiveDomainPermission
|
2018-06-20 17:42:34 +02:00
|
|
|
from lemur.common.utils import check_cert_signature, is_weekend
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
|
2017-08-17 04:24:49 +02:00
|
|
|
def common_name(value):
|
|
|
|
"""If the common name could be a domain name, apply domain validation rules."""
|
|
|
|
# Common name could be a domain name, or a human-readable name of the subject (often used in CA names or client
|
|
|
|
# certificates). As a simple heuristic, we assume that human-readable names always include a space.
|
|
|
|
# However, to avoid confusion for humans, we also don't count spaces at the beginning or end of the string.
|
2019-05-16 16:57:02 +02:00
|
|
|
if " " not in value.strip():
|
2017-08-17 04:24:49 +02:00
|
|
|
return sensitive_domain(value)
|
|
|
|
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
def sensitive_domain(domain):
|
|
|
|
"""
|
2020-10-10 03:04:16 +02:00
|
|
|
Checks if user has the admin role, the domain does not match sensitive domains and allowed domain patterns.
|
2017-08-17 04:24:49 +02:00
|
|
|
:param domain: domain name (str)
|
2016-05-09 20:00:16 +02:00
|
|
|
:return:
|
|
|
|
"""
|
2017-08-17 04:24:49 +02:00
|
|
|
if SensitiveDomainPermission().can():
|
|
|
|
# User has permission, no need to check anything
|
|
|
|
return
|
|
|
|
|
2020-10-10 03:04:16 +02:00
|
|
|
allowlist = current_app.config.get("LEMUR_ALLOWED_DOMAINS", [])
|
|
|
|
if allowlist and not any(re.match(pattern, domain) for pattern in allowlist):
|
2019-05-16 16:57:02 +02:00
|
|
|
raise ValidationError(
|
2020-10-10 03:04:16 +02:00
|
|
|
"Domain {0} does not match allowed domain patterns. "
|
2019-05-16 16:57:02 +02:00
|
|
|
"Contact an administrator to issue the certificate.".format(domain)
|
|
|
|
)
|
2017-08-17 04:24:49 +02:00
|
|
|
|
2018-06-20 17:42:34 +02:00
|
|
|
# Avoid circular import.
|
|
|
|
from lemur.domains import service as domain_service
|
|
|
|
|
2019-05-30 19:21:44 +02:00
|
|
|
if domain_service.is_domain_sensitive(domain):
|
2019-05-16 16:57:02 +02:00
|
|
|
raise ValidationError(
|
|
|
|
"Domain {0} has been marked as sensitive. "
|
|
|
|
"Contact an administrator to issue the certificate.".format(domain)
|
|
|
|
)
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
|
2016-06-09 01:41:31 +02:00
|
|
|
def encoding(oid_encoding):
|
2016-05-09 20:00:16 +02:00
|
|
|
"""
|
|
|
|
Determines if the specified oid type is valid.
|
2016-06-09 01:41:31 +02:00
|
|
|
:param oid_encoding:
|
2016-05-09 20:00:16 +02:00
|
|
|
:return:
|
|
|
|
"""
|
2019-05-16 16:57:02 +02:00
|
|
|
valid_types = ["b64asn1", "string", "ia5string"]
|
2016-06-09 01:41:31 +02:00
|
|
|
if oid_encoding.lower() not in [o_type.lower() for o_type in valid_types]:
|
2019-05-16 16:57:02 +02:00
|
|
|
raise ValidationError(
|
|
|
|
"Invalid Oid Encoding: {0} choose from {1}".format(
|
|
|
|
oid_encoding, ",".join(valid_types)
|
|
|
|
)
|
|
|
|
)
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
|
|
|
|
def sub_alt_type(alt_type):
|
|
|
|
"""
|
|
|
|
Determines if the specified subject alternate type is valid.
|
|
|
|
:param alt_type:
|
|
|
|
:return:
|
|
|
|
"""
|
2019-05-16 16:57:02 +02:00
|
|
|
valid_types = [
|
|
|
|
"DNSName",
|
|
|
|
"IPAddress",
|
|
|
|
"uniFormResourceIdentifier",
|
|
|
|
"directoryName",
|
|
|
|
"rfc822Name",
|
|
|
|
"registrationID",
|
|
|
|
"otherName",
|
|
|
|
"x400Address",
|
|
|
|
"EDIPartyName",
|
|
|
|
]
|
2016-05-09 20:00:16 +02:00
|
|
|
if alt_type.lower() not in [a_type.lower() for a_type in valid_types]:
|
2019-05-16 16:57:02 +02:00
|
|
|
raise ValidationError(
|
|
|
|
"Invalid SubAltName Type: {0} choose from {1}".format(
|
|
|
|
type, ",".join(valid_types)
|
|
|
|
)
|
|
|
|
)
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
|
|
|
|
def csr(data):
|
|
|
|
"""
|
2017-08-17 04:24:49 +02:00
|
|
|
Determines if the CSR is valid and allowed.
|
2016-05-09 20:00:16 +02:00
|
|
|
:param data:
|
|
|
|
:return:
|
|
|
|
"""
|
|
|
|
try:
|
2019-05-16 16:57:02 +02:00
|
|
|
request = x509.load_pem_x509_csr(data.encode("utf-8"), default_backend())
|
2016-05-09 20:00:16 +02:00
|
|
|
except Exception:
|
2019-05-16 16:57:02 +02:00
|
|
|
raise ValidationError("CSR presented is not valid.")
|
2016-05-09 20:00:16 +02:00
|
|
|
|
2017-08-17 04:24:49 +02:00
|
|
|
# Validate common name and SubjectAltNames
|
2020-07-01 15:44:06 +02:00
|
|
|
try:
|
|
|
|
for name in request.subject.get_attributes_for_oid(NameOID.COMMON_NAME):
|
|
|
|
common_name(name.value)
|
|
|
|
except ValueError as err:
|
|
|
|
current_app.logger.info("Error parsing Subject from CSR: %s", err)
|
|
|
|
raise ValidationError("Invalid Subject value in supplied CSR")
|
2017-08-17 04:24:49 +02:00
|
|
|
|
|
|
|
try:
|
2019-05-16 16:57:02 +02:00
|
|
|
alt_names = request.extensions.get_extension_for_class(
|
|
|
|
x509.SubjectAlternativeName
|
|
|
|
)
|
2017-08-17 04:24:49 +02:00
|
|
|
|
|
|
|
for name in alt_names.value.get_values_for_type(x509.DNSName):
|
|
|
|
sensitive_domain(name)
|
|
|
|
except x509.ExtensionNotFound:
|
|
|
|
pass
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
|
|
|
|
def dates(data):
|
2019-05-16 16:57:02 +02:00
|
|
|
if not data.get("validity_start") and data.get("validity_end"):
|
|
|
|
raise ValidationError("If validity start is specified so must validity end.")
|
|
|
|
|
|
|
|
if not data.get("validity_end") and data.get("validity_start"):
|
|
|
|
raise ValidationError("If validity end is specified so must validity start.")
|
|
|
|
|
|
|
|
if data.get("validity_start") and data.get("validity_end"):
|
|
|
|
if not current_app.config.get("LEMUR_ALLOW_WEEKEND_EXPIRATION", True):
|
|
|
|
if is_weekend(data.get("validity_end")):
|
|
|
|
raise ValidationError("Validity end must not land on a weekend.")
|
|
|
|
|
|
|
|
if not data["validity_start"] < data["validity_end"]:
|
|
|
|
raise ValidationError("Validity start must be before validity end.")
|
|
|
|
|
|
|
|
if data.get("authority"):
|
|
|
|
if (
|
|
|
|
data.get("validity_start").date()
|
|
|
|
< data["authority"].authority_certificate.not_before.date()
|
|
|
|
):
|
|
|
|
raise ValidationError(
|
|
|
|
"Validity start must not be before {0}".format(
|
|
|
|
data["authority"].authority_certificate.not_before
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
if (
|
|
|
|
data.get("validity_end").date()
|
|
|
|
> data["authority"].authority_certificate.not_after.date()
|
|
|
|
):
|
|
|
|
raise ValidationError(
|
|
|
|
"Validity end must not be after {0}".format(
|
|
|
|
data["authority"].authority_certificate.not_after
|
|
|
|
)
|
|
|
|
)
|
2016-05-09 20:00:16 +02:00
|
|
|
|
2016-10-15 09:04:35 +02:00
|
|
|
return data
|
2018-06-20 17:42:34 +02:00
|
|
|
|
|
|
|
|
|
|
|
def verify_private_key_match(key, cert, error_class=ValidationError):
|
|
|
|
"""
|
|
|
|
Checks that the supplied private key matches the certificate.
|
|
|
|
|
|
|
|
:param cert: Parsed certificate
|
|
|
|
:param key: Parsed private key
|
|
|
|
:param error_class: Exception class to raise on error
|
|
|
|
"""
|
|
|
|
if key.public_key().public_numbers() != cert.public_key().public_numbers():
|
|
|
|
raise error_class("Private key does not match certificate.")
|
2018-06-20 17:42:34 +02:00
|
|
|
|
|
|
|
|
|
|
|
def verify_cert_chain(certs, error_class=ValidationError):
|
|
|
|
"""
|
|
|
|
Verifies that the certificates in the chain are correct.
|
|
|
|
|
|
|
|
We don't bother with full cert validation but just check that certs in the chain are signed by the next, to avoid
|
|
|
|
basic human errors -- such as pasting the wrong certificate.
|
|
|
|
|
|
|
|
:param certs: List of parsed certificates, use parse_cert_chain()
|
|
|
|
:param error_class: Exception class to raise on error
|
|
|
|
"""
|
|
|
|
cert = certs[0]
|
|
|
|
for issuer in certs[1:]:
|
|
|
|
# Use the current cert's public key to verify the previous signature.
|
|
|
|
# "certificate validation is a complex problem that involves much more than just signature checks"
|
|
|
|
try:
|
|
|
|
check_cert_signature(cert, issuer.public_key())
|
|
|
|
|
|
|
|
except InvalidSignature:
|
|
|
|
# Avoid circular import.
|
|
|
|
from lemur.common import defaults
|
|
|
|
|
2019-05-16 16:57:02 +02:00
|
|
|
raise error_class(
|
|
|
|
"Incorrect chain certificate(s) provided: '%s' is not signed by '%s'"
|
|
|
|
% (
|
|
|
|
defaults.common_name(cert) or "Unknown",
|
|
|
|
defaults.common_name(issuer),
|
|
|
|
)
|
|
|
|
)
|
2018-06-20 17:42:34 +02:00
|
|
|
|
|
|
|
except UnsupportedAlgorithm as err:
|
|
|
|
current_app.logger.warning("Skipping chain validation: %s", err)
|
|
|
|
|
|
|
|
# Next loop will validate that *this issuer* cert is signed by the next chain cert.
|
|
|
|
cert = issuer
|