123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256 |
- package v1
- import (
- "bytes"
- "crypto"
- "crypto/x509"
- "fmt"
- "io/ioutil"
- "net/http"
- "net/url"
- "time"
- "github.com/gin-gonic/gin"
- "github.com/pkg/errors"
- log "github.com/sirupsen/logrus"
- "golang.org/x/crypto/ocsp"
- )
- type TLSAuth struct {
- AllowedOUs []string
- CrlPath string
- revokationCache map[string]cacheEntry
- cacheExpiration time.Duration
- logger *log.Entry
- }
- type cacheEntry struct {
- revoked bool
- err error
- timestamp time.Time
- }
- func (ta *TLSAuth) ocspQuery(server string, cert *x509.Certificate, issuer *x509.Certificate) (*ocsp.Response, error) {
- req, err := ocsp.CreateRequest(cert, issuer, &ocsp.RequestOptions{Hash: crypto.SHA256})
- if err != nil {
- ta.logger.Errorf("TLSAuth: error creating OCSP request: %s", err)
- return nil, err
- }
- httpRequest, err := http.NewRequest(http.MethodPost, server, bytes.NewBuffer(req))
- if err != nil {
- ta.logger.Error("TLSAuth: cannot create HTTP request for OCSP")
- return nil, err
- }
- ocspURL, err := url.Parse(server)
- if err != nil {
- ta.logger.Error("TLSAuth: cannot parse OCSP URL")
- return nil, err
- }
- httpRequest.Header.Add("Content-Type", "application/ocsp-request")
- httpRequest.Header.Add("Accept", "application/ocsp-response")
- httpRequest.Header.Add("host", ocspURL.Host)
- httpClient := &http.Client{}
- httpResponse, err := httpClient.Do(httpRequest)
- if err != nil {
- ta.logger.Error("TLSAuth: cannot send HTTP request to OCSP")
- return nil, err
- }
- defer httpResponse.Body.Close()
- output, err := ioutil.ReadAll(httpResponse.Body)
- if err != nil {
- ta.logger.Error("TLSAuth: cannot read HTTP response from OCSP")
- return nil, err
- }
- ocspResponse, err := ocsp.ParseResponseForCert(output, cert, issuer)
- return ocspResponse, err
- }
- func (ta *TLSAuth) isExpired(cert *x509.Certificate) bool {
- now := time.Now().UTC()
- if cert.NotAfter.UTC().Before(now) {
- ta.logger.Errorf("TLSAuth: client certificate is expired (NotAfter: %s)", cert.NotAfter.UTC())
- return true
- }
- if cert.NotBefore.UTC().After(now) {
- ta.logger.Errorf("TLSAuth: client certificate is not yet valid (NotBefore: %s)", cert.NotBefore.UTC())
- return true
- }
- return false
- }
- func (ta *TLSAuth) isOCSPRevoked(cert *x509.Certificate, issuer *x509.Certificate) (bool, error) {
- if cert.OCSPServer == nil || (cert.OCSPServer != nil && len(cert.OCSPServer) == 0) {
- ta.logger.Infof("TLSAuth: no OCSP Server present in client certificate, skipping OCSP verification")
- return false, nil
- }
- for _, server := range cert.OCSPServer {
- ocspResponse, err := ta.ocspQuery(server, cert, issuer)
- if err != nil {
- ta.logger.Errorf("TLSAuth: error querying OCSP server %s: %s", server, err)
- continue
- }
- switch ocspResponse.Status {
- case ocsp.Good:
- return false, nil
- case ocsp.Revoked:
- return true, fmt.Errorf("client certificate is revoked by server %s", server)
- case ocsp.Unknown:
- log.Debugf("unknow OCSP status for server %s", server)
- continue
- }
- }
- log.Infof("Could not get any valid OCSP response, assuming the cert is revoked")
- return true, nil
- }
- func (ta *TLSAuth) isCRLRevoked(cert *x509.Certificate) (bool, error) {
- if ta.CrlPath == "" {
- ta.logger.Warn("no crl_path, skipping CRL check")
- return false, nil
- }
- crlContent, err := ioutil.ReadFile(ta.CrlPath)
- if err != nil {
- ta.logger.Warnf("could not read CRL file, skipping check: %s", err)
- return false, nil
- }
- crl, err := x509.ParseCRL(crlContent)
- if err != nil {
- ta.logger.Warnf("could not parse CRL file, skipping check: %s", err)
- return false, nil
- }
- if crl.HasExpired(time.Now().UTC()) {
- ta.logger.Warn("CRL has expired, will still validate the cert against it.")
- }
- for _, revoked := range crl.TBSCertList.RevokedCertificates {
- if revoked.SerialNumber.Cmp(cert.SerialNumber) == 0 {
- return true, fmt.Errorf("client certificate is revoked by CRL")
- }
- }
- return false, nil
- }
- func (ta *TLSAuth) isRevoked(cert *x509.Certificate, issuer *x509.Certificate) (bool, error) {
- sn := cert.SerialNumber.String()
- if cacheValue, ok := ta.revokationCache[sn]; ok {
- if time.Now().UTC().Sub(cacheValue.timestamp) < ta.cacheExpiration {
- ta.logger.Debugf("TLSAuth: using cached value for cert %s: %t | %s", sn, cacheValue.revoked, cacheValue.err)
- return cacheValue.revoked, cacheValue.err
- } else {
- ta.logger.Debugf("TLSAuth: cached value expired, removing from cache")
- delete(ta.revokationCache, sn)
- }
- } else {
- ta.logger.Tracef("TLSAuth: no cached value for cert %s", sn)
- }
- revoked, err := ta.isOCSPRevoked(cert, issuer)
- if err != nil {
- ta.revokationCache[sn] = cacheEntry{
- revoked: revoked,
- err: err,
- timestamp: time.Now().UTC(),
- }
- return true, err
- }
- if revoked {
- ta.revokationCache[sn] = cacheEntry{
- revoked: revoked,
- err: err,
- timestamp: time.Now().UTC(),
- }
- return true, nil
- }
- revoked, err = ta.isCRLRevoked(cert)
- ta.revokationCache[sn] = cacheEntry{
- revoked: revoked,
- err: err,
- timestamp: time.Now().UTC(),
- }
- return revoked, err
- }
- func (ta *TLSAuth) isInvalid(cert *x509.Certificate, issuer *x509.Certificate) (bool, error) {
- if ta.isExpired(cert) {
- return true, nil
- }
- revoked, err := ta.isRevoked(cert, issuer)
- if err != nil {
- //Fail securely, if we can't check the revokation status, let's consider the cert invalid
- //We may change this in the future based on users feedback, but this seems the most sensible thing to do
- return true, errors.Wrap(err, "could not check for client certification revokation status")
- }
- return revoked, nil
- }
- func (ta *TLSAuth) SetAllowedOu(allowedOus []string) error {
- for _, ou := range allowedOus {
- //disallow empty ou
- if ou == "" {
- return fmt.Errorf("empty ou isn't allowed")
- }
- //drop & warn on duplicate ou
- ok := true
- for _, validOu := range ta.AllowedOUs {
- if validOu == ou {
- ta.logger.Warningf("dropping duplicate ou %s", ou)
- ok = false
- }
- }
- if ok {
- ta.AllowedOUs = append(ta.AllowedOUs, ou)
- }
- }
- return nil
- }
- func (ta *TLSAuth) ValidateCert(c *gin.Context) (bool, string, error) {
- //Checks cert validity, Returns true + CN if client cert matches requested OU
- var clientCert *x509.Certificate
- if c.Request.TLS == nil || len(c.Request.TLS.PeerCertificates) == 0 {
- //do not error if it's not TLS or there are no peer certs
- return false, "", nil
- }
- if len(c.Request.TLS.VerifiedChains) > 0 {
- validOU := false
- clientCert = c.Request.TLS.VerifiedChains[0][0]
- for _, ou := range clientCert.Subject.OrganizationalUnit {
- for _, allowedOu := range ta.AllowedOUs {
- if allowedOu == ou {
- validOU = true
- break
- }
- }
- }
- if !validOU {
- return false, "", fmt.Errorf("client certificate OU (%v) doesn't match expected OU (%v)",
- clientCert.Subject.OrganizationalUnit, ta.AllowedOUs)
- }
- revoked, err := ta.isInvalid(clientCert, c.Request.TLS.VerifiedChains[0][1])
- if err != nil {
- ta.logger.Errorf("TLSAuth: error checking if client certificate is revoked: %s", err)
- return false, "", errors.Wrap(err, "could not check for client certification revokation status")
- }
- if revoked {
- return false, "", fmt.Errorf("client certificate is revoked")
- }
- ta.logger.Debugf("client OU %v is allowed vs required OU %v", clientCert.Subject.OrganizationalUnit, ta.AllowedOUs)
- return true, clientCert.Subject.CommonName, nil
- }
- return false, "", fmt.Errorf("no verified cert in request")
- }
- func NewTLSAuth(allowedOus []string, crlPath string, cacheExpiration time.Duration, logger *log.Entry) (*TLSAuth, error) {
- ta := &TLSAuth{
- revokationCache: map[string]cacheEntry{},
- cacheExpiration: cacheExpiration,
- CrlPath: crlPath,
- logger: logger,
- }
- err := ta.SetAllowedOu(allowedOus)
- if err != nil {
- return nil, err
- }
- return ta, nil
- }
|