Merge pull request #1779 from explody/improved_verify

Improved verify
This commit is contained in:
Curtis 2018-10-04 11:27:13 -07:00 committed by GitHub
commit 318527223b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 70 additions and 35 deletions

View File

@ -363,6 +363,9 @@ def check_revoked():
else: else:
status = verify_string(cert.body, "") status = verify_string(cert.body, "")
if status is None:
cert.status = 'unknown'
else:
cert.status = 'valid' if status else 'revoked' cert.status = 'valid' if status else 'revoked'
except Exception as e: except Exception as e:

View File

@ -7,6 +7,7 @@
""" """
import requests import requests
import subprocess import subprocess
from flask import current_app
from requests.exceptions import ConnectionError, InvalidSchema from requests.exceptions import ConnectionError, InvalidSchema
from cryptography import x509 from cryptography import x509
from cryptography.hazmat.backends import default_backend from cryptography.hazmat.backends import default_backend
@ -14,13 +15,16 @@ from cryptography.hazmat.backends import default_backend
from lemur.utils import mktempfile from lemur.utils import mktempfile
from lemur.common.utils import parse_certificate from lemur.common.utils import parse_certificate
crl_cache = {}
def ocsp_verify(cert_path, issuer_chain_path):
def ocsp_verify(cert, cert_path, issuer_chain_path):
""" """
Attempts to verify a certificate via OCSP. OCSP is a more modern version Attempts to verify a certificate via OCSP. OCSP is a more modern version
of CRL in that it will query the OCSP URI in order to determine if the of CRL in that it will query the OCSP URI in order to determine if the
certificate has been revoked certificate has been revoked
:param cert:
:param cert_path: :param cert_path:
:param issuer_chain_path: :param issuer_chain_path:
:return bool: True if certificate is valid, False otherwise :return bool: True if certificate is valid, False otherwise
@ -29,8 +33,14 @@ def ocsp_verify(cert_path, issuer_chain_path):
p1 = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE) p1 = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
url, err = p1.communicate() url, err = p1.communicate()
if not url:
current_app.logger.debug("No OCSP URL in certificate {}".format(cert.serial_number))
return None
p2 = subprocess.Popen(['openssl', 'ocsp', '-issuer', issuer_chain_path, p2 = subprocess.Popen(['openssl', 'ocsp', '-issuer', issuer_chain_path,
'-cert', cert_path, "-url", url.strip()], stdout=subprocess.PIPE, stderr=subprocess.PIPE) '-cert', cert_path, "-url", url.strip()],
stdout=subprocess.PIPE,
stderr=subprocess.PIPE)
message, err = p2.communicate() message, err = p2.communicate()
@ -40,7 +50,8 @@ def ocsp_verify(cert_path, issuer_chain_path):
raise Exception("Got error when parsing OCSP url") raise Exception("Got error when parsing OCSP url")
elif 'revoked' in p_message: elif 'revoked' in p_message:
return current_app.logger.debug("OCSP reports certificate revoked: {}".format(cert.serial_number))
return False
elif 'good' not in p_message: elif 'good' not in p_message:
raise Exception("Did not receive a valid response") raise Exception("Did not receive a valid response")
@ -48,22 +59,28 @@ def ocsp_verify(cert_path, issuer_chain_path):
return True return True
def crl_verify(cert_path): def crl_verify(cert, cert_path):
""" """
Attempts to verify a certificate using CRL. Attempts to verify a certificate using CRL.
:param cert:
:param cert_path: :param cert_path:
:return: True if certificate is valid, False otherwise :return: True if certificate is valid, False otherwise
:raise Exception: If certificate does not have CRL :raise Exception: If certificate does not have CRL
""" """
with open(cert_path, 'rt') as c: try:
cert = parse_certificate(c.read()) distribution_points = cert.extensions.get_extension_for_oid(
x509.OID_CRL_DISTRIBUTION_POINTS
distribution_points = cert.extensions.get_extension_for_oid(x509.OID_CRL_DISTRIBUTION_POINTS).value ).value
except x509.ExtensionNotFound:
current_app.logger.debug("No CRLDP extension in certificate {}".format(cert.serial_number))
return None
for p in distribution_points: for p in distribution_points:
point = p.full_name[0].value point = p.full_name[0].value
if point not in crl_cache:
current_app.logger.debug("Retrieving CRL: {}".format(point))
try: try:
response = requests.get(point) response = requests.get(point)
@ -75,20 +92,27 @@ def crl_verify(cert_path):
except ConnectionError: except ConnectionError:
raise Exception("Unable to retrieve CRL: {0}".format(point)) raise Exception("Unable to retrieve CRL: {0}".format(point))
crl = x509.load_der_x509_crl(response.content, backend=default_backend()) crl_cache[point] = x509.load_der_x509_crl(response.content,
backend=default_backend())
else:
current_app.logger.debug("CRL point is cached {}".format(point))
for r in crl: for r in crl_cache[point]:
if cert.serial == r.serial_number: if cert.serial_number == r.serial_number:
try: try:
reason = r.extensions.get_extension_for_class(x509.CRLReason).value reason = r.extensions.get_extension_for_class(x509.CRLReason).value
# Handle "removeFromCRL" revoke reason as unrevoked; continue with the next distribution point. # Handle "removeFromCRL" revoke reason as unrevoked;
# Per RFC 5280 section 6.3.3 (k): https://tools.ietf.org/html/rfc5280#section-6.3.3 # continue with the next distribution point.
# Per RFC 5280 section 6.3.3 (k):
# https://tools.ietf.org/html/rfc5280#section-6.3.3
if reason == x509.ReasonFlags.remove_from_crl: if reason == x509.ReasonFlags.remove_from_crl:
break break
except x509.ExtensionNotFound: except x509.ExtensionNotFound:
pass pass
return current_app.logger.debug("CRL reports certificate "
"revoked: {}".format(cert.serial_number))
return False
return True return True
@ -101,15 +125,24 @@ def verify(cert_path, issuer_chain_path):
:param issuer_chain_path: :param issuer_chain_path:
:return: True if valid, False otherwise :return: True if valid, False otherwise
""" """
with open(cert_path, 'rt') as c:
try:
cert = parse_certificate(c.read())
except ValueError as e:
current_app.logger.error(e)
return None
# OCSP is our main source of truth, in a lot of cases CRLs # OCSP is our main source of truth, in a lot of cases CRLs
# have been deprecated and are no longer updated # have been deprecated and are no longer updated
try: verify_result = ocsp_verify(cert, cert_path, issuer_chain_path)
return ocsp_verify(cert_path, issuer_chain_path)
except Exception as e: if verify_result is None:
try: verify_result = crl_verify(cert, cert_path)
return crl_verify(cert_path)
except Exception as e: if verify_result is None:
raise Exception("Failed to verify") current_app.logger.debug("Failed to verify {}".format(cert.serial_number))
return verify_result
def verify_string(cert_string, issuer_string): def verify_string(cert_string, issuer_string):

View File

@ -12,9 +12,8 @@ from .vectors import INTERMEDIATE_CERT_STR
def test_verify_simple_cert(): def test_verify_simple_cert():
"""Simple certificate without CRL or OCSP.""" """Simple certificate without CRL or OCSP."""
# Verification raises an exception for "unknown" if there are no means to verify it # Verification returns None if there are no means to verify a cert
with pytest.raises(Exception, match="Failed to verify"): assert verify_string(INTERMEDIATE_CERT_STR, '') is None
verify_string(INTERMEDIATE_CERT_STR, '')
def test_verify_crl_unknown_scheme(cert_builder, private_key): def test_verify_crl_unknown_scheme(cert_builder, private_key):
@ -31,7 +30,7 @@ def test_verify_crl_unknown_scheme(cert_builder, private_key):
f.write(cert.public_bytes(serialization.Encoding.PEM)) f.write(cert.public_bytes(serialization.Encoding.PEM))
# Must not raise exception # Must not raise exception
crl_verify(cert_tmp) crl_verify(cert, cert_tmp)
def test_verify_crl_unreachable(cert_builder, private_key): def test_verify_crl_unreachable(cert_builder, private_key):
@ -48,4 +47,4 @@ def test_verify_crl_unreachable(cert_builder, private_key):
f.write(cert.public_bytes(serialization.Encoding.PEM)) f.write(cert.public_bytes(serialization.Encoding.PEM))
with pytest.raises(Exception, match="Unable to retrieve CRL:"): with pytest.raises(Exception, match="Unable to retrieve CRL:"):
crl_verify(cert_tmp) crl_verify(cert, cert_tmp)