Projekt

Obecné

Profil

Stáhnout (18.3 KB) Statistiky
| Větev: | Tag: | Revize:
1
import re
2
import subprocess
3
import time
4
import random
5

    
6
from src.constants import CRL_CONFIG
7
from src.model.certificate import Certificate
8
from src.model.private_key import PrivateKey
9
from src.model.subject import Subject
10
from src.utils.temporary_file import TemporaryFile
11

    
12
# encryption method to be used when generating private keys
13
PRIVATE_KEY_ENCRYPTION_METHOD = "-aes256"
14

    
15
# openssl executable name
16
OPENSSL_EXECUTABLE = "openssl"
17

    
18
# format of NOT_BEFORE NOT_AFTER date fields
19
NOT_AFTER_BEFORE_DATE_FORMAT = "%b %d %H:%M:%S %Y %Z"
20

    
21
# minimal configuration file to be used for openssl req command
22
# specifies distinguished_name that references empty section only
23
# openssl requires this option to be present
24
MINIMAL_CONFIG_FILE = "[req]\ndistinguished_name = req_distinguished_name\n[req_distinguished_name]\n\n"
25

    
26
# section to be used to specify extensions when creating a SSCRT
27
SSCRT_SECTION = "sscrt_ext"
28

    
29
CA_EXTENSIONS = "basicConstraints=critical,CA:TRUE"
30

    
31
# upper bound of the range of random serial numbers to be generated
32
MAX_SN = 4294967296
33

    
34

    
35
class CryptographyService:
36

    
37
    @staticmethod
38
    def __subject_to_param_format(subject):
39
        """
40
        Converts the given subject to a dictionary containing openssl field names mapped to subject's fields
41
        :param subject: subject to be converted
42
        :return: a dictionary containing openssl field names mapped to subject's fields
43
        """
44
        subj_dict = {}
45
        if subject.common_name is not None:
46
            subj_dict["CN"] = subject.common_name
47
        if subject.country is not None:
48
            subj_dict["C"] = subject.country
49
        if subject.locality is not None:
50
            subj_dict["L"] = subject.locality
51
        if subject.state is not None:
52
            subj_dict["ST"] = subject.state
53
        if subject.organization is not None:
54
            subj_dict["O"] = subject.organization
55
        if subject.organization_unit is not None:
56
            subj_dict["OU"] = subject.organization_unit
57
        if subject.email_address is not None:
58
            subj_dict["emailAddress"] = subject.email_address
59

    
60
        # merge the subject into a "subj" parameter format
61
        return "".join([f"/{key}={value}" for key, value in subj_dict.items()])
62

    
63
    @staticmethod
64
    def __run_for_output(args=None, proc_input=None, executable=OPENSSL_EXECUTABLE):
65
        """
66
        Launches a new process in which the given executable is run. STDIN and process arguments can be set.
67
        If the process ends with a non-zero then <CryptographyException> is raised.
68

    
69
        :param args: Arguments to be passed to the program.
70
        :param proc_input: String input to be passed to the stdin of the created process.
71
        :param executable: Executable to be run (defaults to openssl)
72
        :return: If the process ends with a zero return code then the STDOUT of the process is returned as a byte array.
73
        """
74
        if args is None:
75
            args = []
76
        try:
77
            # prepend the name of the executable
78
            args.insert(0, executable)
79

    
80
            # create a new process
81
            proc = subprocess.Popen(args, stdin=subprocess.PIPE if proc_input is not None else None,
82
                                    stdout=subprocess.PIPE,
83
                                    stderr=subprocess.PIPE)
84

    
85
            out, err = proc.communicate(proc_input)
86

    
87
            if proc.returncode != 0:
88
                # if the process did not result in zero result code, then raise an exception
89
                if err is not None and len(err) > 0:
90
                    raise CryptographyException(executable, args, err.decode())
91
                else:
92
                    raise CryptographyException(executable, args,
93
                                                f""""Execution resulted in non-zero argument""")
94

    
95
            return out
96
        except FileNotFoundError:
97
            raise CryptographyException(executable, args, f""""{executable}" not found in the current PATH.""")
98

    
99
    def create_private_key(self, passphrase=None):
100
        """
101
        Creates a private key with the option to encrypt it using a passphrase.
102
        :param passphrase: A passphrase to be used when encrypting the key (if none is passed then the key is not
103
        encrypted at all). Empty passphrase ("") also results in a key that is not encrypted.
104
        :return: string containing the generated private key in PEM format
105
        """
106
        if passphrase is None or len(passphrase) == 0:
107
            return self.__run_for_output(["genrsa", "2048"]).decode()
108
        else:
109
            return self.__run_for_output(
110
                ["genrsa", PRIVATE_KEY_ENCRYPTION_METHOD, "-passout", f"pass:{passphrase}", "2048"]).decode()
111

    
112
    def create_sscrt(self, subject, key, config="", extensions="", key_pass=None, days=30, sn: int = None):
113
        """
114
        Creates a root CA
115

    
116
        :param subject: an instance of <Subject> representing the subject to be added to the certificate
117
        :param key: private key of the CA to be used
118
        :param config: string containing the configuration to be used
119
        :param extensions: name of the section in the configuration representing extensions
120
        :param key_pass: passphrase of the private key
121
        :param days: number of days for which the certificate will be valid
122
        :param sn: serial number to be set, when "None" is set a random serial number is generated
123

    
124
        :return: string containing the generated certificate in PEM format
125
        """
126
        assert key is not None
127
        assert subject is not None
128

    
129
        subj = self.__subject_to_param_format(subject)
130

    
131
        # To specify extension for creating a SSCRT, one has to use a configuration
132
        # file instead of an extension file. Therefore the following code creates
133
        # the most basic configuration file with sscrt_ext section, that is later
134
        # reference in openssl req command using -extensions option.
135
        extensions += "\n" + CA_EXTENSIONS
136
        if len(config) == 0:
137
            config += MINIMAL_CONFIG_FILE
138
        config += "\n[ " + SSCRT_SECTION + " ]" + "\n" + extensions
139

    
140
        with TemporaryFile("openssl.conf", config) as conf_path:
141
            args = ["req", "-x509", "-new", "-subj", subj, "-days", f"{days}",
142
                    "-key", "-"]
143

    
144
            # serial number passed, use it when generating the certificate,
145
            # without passing it openssl generates a random one
146
            if sn is not None:
147
                args.extend(["-set_serial", str(sn)])
148

    
149
            if len(config) > 0:
150
                args.extend(["-config", conf_path])
151
            if len(extensions) > 0:
152
                args.extend(["-extensions", SSCRT_SECTION])  # when creating SSCRT, section references section in config
153

    
154
            # it would be best to not send the pass phrase at all, but for some reason pytest then prompts for
155
            # the pass phrase (this does not happen when run from pycharm)
156

    
157
            #  add the passphrase even when None is passed. Otherwise when running tests with pytest some tests freeze
158
            # waiting for the passphrase to be typed in
159
            args.extend(["-passin", f"pass:{key_pass}"])
160

    
161
            return self.__run_for_output(args, proc_input=bytes(key, encoding="utf-8")).decode()
162

    
163
    def __create_csr(self, subject, key, key_pass=""):
164
        """
165
        Creates a CSR (Certificate Signing Request)
166

    
167
        :param subject: an instance of <Subject> representing the subject to be added to the CSR
168
        :param key: the private key of the subject to be used to generate the CSR
169
        :param key_pass: passphrase of the subject's private key
170
        :return: string containing the generated certificate signing request in PEM format
171
        """
172

    
173
        subj_param = self.__subject_to_param_format(subject)
174

    
175
        args = ["req", "-new", "-subj", subj_param, "-key", "-"]
176

    
177
        # add the passphrase even when None is passed. Otherwise when running tests with pytest some tests freeze
178
        # waiting for the passphrase to be typed in
179
        args.extend(["-passin", f"pass:{key_pass}"])
180

    
181
        return self.__run_for_output(args, proc_input=bytes(key, encoding="utf-8")).decode()
182

    
183
    def __sign_csr(self, csr, issuer_pem, issuer_key, issuer_key_pass=None, extensions="", days=30, sn: int = None):
184
        """
185
        Signs the given CSR by the given issuer CA
186

    
187
        :param csr: a string containing the CSR to be signed
188
        :param issuer_pem: string containing the certificate of the issuer that will sign this CSR in PEM format
189
        :param issuer_key: string containing the private key of the issuer's certificate in PEM format
190
        :param issuer_key_pass: string containing the passphrase of the private key of the issuer's certificate in PEM
191
        format
192
        :param extensions: extensions to be applied when signing the CSR
193
        :param days: number of days for which the certificate will be valid
194
        :param sn: serial number to be set, when "None" is set a random serial number is generated
195
        :return: string containing the generated and signed certificate in PEM format
196
        """
197

    
198
        # concatenate CSR, issuer certificate and issuer's key (will be used in the openssl call)
199
        proc_input = csr + issuer_pem + issuer_key
200

    
201
        # TODO find a better way to generate a random serial number or let openssl generate a .srl file
202
        # when serial number is not passed generate a random one
203
        if sn is None:
204
            sn = random.randint(0, MAX_SN)
205

    
206
        # prepare openssl parameters...
207
        # CSR, CA and CA's private key will be passed via stdin (that's the meaning of the '-' symbol)
208
        params = ["x509", "-req", "-in", "-", "-CA", "-", "-CAkey", "-", "-CAcreateserial", "-days", str(days),
209
                  "-set_serial", str(sn)]
210

    
211
        with TemporaryFile("extensions.conf", extensions) as ext_path:
212
            # add the passphrase even when None is passed. Otherwise when running tests with pytest some tests freeze
213
            # waiting for the passphrase to be typed in
214
            params.extend(["-passin", f"pass:{issuer_key_pass}"])
215

    
216
            if len(extensions) > 0:
217
                params.extend(["-extfile", ext_path])
218

    
219
            return self.__run_for_output(params, proc_input=(bytes(proc_input, encoding="utf-8"))).decode()
220

    
221
    def create_crt(self, subject, subject_key, issuer_pem, issuer_key, subject_key_pass=None, issuer_key_pass=None,
222
                   extensions="",
223
                   days=30,
224
                   sn: int = None):
225
        """
226
        Creates a certificate by using the given subject, subject's key, issuer and its key.
227

    
228
        :param subject: subject to be added to the created certificate
229
        :param subject_key: string containing the private key to be used when creating the certificate in PEM format
230
        :param issuer_key: string containing the private key of the issuer's certificate in PEM format
231
        :param issuer_pem: string containing the certificate of the issuer that will sign this CSR in PEM format
232
        :param subject_key_pass: string containing the passphrase of the private key used when creating the certificate
233
        in PEM format
234
        :param issuer_key_pass: string containing the passphrase of the private key of the issuer's certificate in PEM
235
        format
236
        :param extensions: extensions to be applied when creating the certificate
237
        :param days: number of days for which the certificate will be valid
238
        :param sn: serial number to be set, when "None" is set a random serial number is generated
239
        :return: string containing the generated certificate in PEM format
240
        """
241
        csr = self.__create_csr(subject, subject_key, key_pass=subject_key_pass)
242
        return self.__sign_csr(csr, issuer_pem, issuer_key, issuer_key_pass=issuer_key_pass, extensions=extensions,
243
                               days=days, sn=sn)
244

    
245
    @staticmethod
246
    def verify_cert(certificate):
247
        """
248
        Verifies whether the given certificate is not expired.
249

    
250
        :param certificate: certificate to be verified in PEM format
251
        :return: Returns `true` if the certificate is not expired, `false` when expired.
252
        """
253
        # call openssl to check whether the certificate is valid to this date
254
        args = [OPENSSL_EXECUTABLE, "x509", "-checkend", "0", "-noout", "-text", "-in", "-"]
255

    
256
        # create a new process
257
        proc = subprocess.Popen(args, stdin=subprocess.PIPE,
258
                                stdout=subprocess.PIPE,
259
                                stderr=subprocess.PIPE)
260

    
261
        out, err = proc.communicate(bytes(certificate, encoding="utf-8"))
262

    
263
        # zero return code means that the certificate is valid
264
        if proc.returncode == 0:
265
            return True
266
        elif proc.returncode == 1 and "Certificate will expire" in out.decode():
267
            # 1 return code means that the certificate is invalid but such message has to be present in the proc output
268
            return False
269
        else:
270
            # the process failed because of some other reason (incorrect cert format)
271
            raise CryptographyException(OPENSSL_EXECUTABLE, args, err.decode())
272

    
273
    def extract_public_key_from_private_key(self, private_key_pem: str, passphrase=None) -> str:
274
        """
275
        Extracts a public key from the given private key passed in PEM format
276
        :param private_key_pem: PEM data representing the private key from which a public key should be extracted
277
        :param passphrase: passphrase to be provided when the supplied private key is encrypted
278
        :return: a string containing the extracted public key in PEM format
279
        """
280
        args = ["rsa", "-in", "-", "-pubout"]
281
        if passphrase is not None:
282
            args.extend(["-passin", f"pass:{passphrase}"])
283
        return self.__run_for_output(args, proc_input=bytes(private_key_pem, encoding="utf-8")).decode()
284

    
285
    def extract_public_key_from_certificate(self, cert_pem: str) -> str:
286
        """
287
        Extracts a public key from the given certificate passed in PEM format
288
        :param cert_pem: PEM data representing a certificate from which a public key should be extracted
289
        :return: a string containing the extracted public key in PEM format
290
        """
291
        # extracting public key from a certificate does not seem to require a passphrase even when
292
        # signed using an encrypted PK
293
        args = ["x509", "-in", "-", "-noout", "-pubkey"]
294
        return self.__run_for_output(args, proc_input=bytes(cert_pem, encoding="utf-8")).decode()
295

    
296
    def parse_cert_pem(self, cert_pem):
297
        """
298
        Parses the given certificate in PEM format and returns the subject of the certificate and it's NOT_BEFORE
299
        and NOT_AFTER field
300
        :param cert_pem: a certificated in a PEM format to be parsed
301
        :return: a tuple containing a subject, NOT_BEFORE and NOT_AFTER dates
302
        """
303
        # run openssl x509 to view certificate content
304
        args = ["x509", "-noout", "-subject", "-startdate", "-enddate", "-in", "-"]
305

    
306
        cert_info_raw = self.__run_for_output(args, proc_input=bytes(cert_pem, encoding="utf-8")).decode()
307

    
308
        # split lines
309
        results = re.split("\n", cert_info_raw)
310
        subj_line = results[0].strip()
311
        not_before_line = results[1].strip()
312
        not_after_line = results[2].strip()
313

    
314
        # attempt to extract subject via regex
315
        match = re.search(r"subject=(.*)", subj_line)
316
        if match is None:
317
            # TODO use logger
318
            print(f"Could not find subject to parse: {subj_line}")
319
            return None
320
        else:
321
            # find all attributes (key = value)
322
            found = re.findall(r"\s?([^c=\s]+)\s?=\s?([^,\n]+)", match.group(1))
323
            subj = Subject()
324
            for key, value in found:
325
                if key == "C":
326
                    subj.country = value.strip()
327
                elif key == "ST":
328
                    subj.state = value.strip()
329
                elif key == "L":
330
                    subj.locality = value.strip()
331
                elif key == "O":
332
                    subj.organization = value.strip()
333
                elif key == "OU":
334
                    subj.organization_unit = value.strip()
335
                elif key == "CN":
336
                    subj.common_name = value.strip()
337
                elif key == "emailAddress":
338
                    subj.email_address = value.strip()
339

    
340
        # extract notBefore and notAfter date fields
341
        not_before = re.search(r"notBefore=(.*)", not_before_line)
342
        not_after = re.search(r"notAfter=(.*)", not_after_line)
343

    
344
        # if date fields are found parse them into date objects
345
        if not_before is not None:
346
            not_before = time.strptime(not_before.group(1).strip(), NOT_AFTER_BEFORE_DATE_FORMAT)
347
        if not_after is not None:
348
            not_after = time.strptime(not_after.group(1).strip(), NOT_AFTER_BEFORE_DATE_FORMAT)
349

    
350
        # TODO wrapper class?
351
        # return it as a tuple
352
        return subj, not_before, not_after
353

    
354
    def get_openssl_version(self) -> str:
355
        """
356
        Get version of the OpenSSL installed on the system
357
        :return: version of the OpenSSL as returned from the process
358
        """
359
        return self.__run_for_output(["version"]).decode("utf-8")
360

    
361
    def generate_crl(self, cert: Certificate, key: PrivateKey, index_file_path: str) -> str:
362
        """
363
        Generate a CertificateRevocationList for a specified
364
        certificate authority.
365

    
366
        :param key: key that is used to sign the CRL (must belong to the given certificate)
367
        :param cert: Certificate of the certificate authority that issue the CRL
368
        :param index_file_path: path to a file that contains the openssl index with all revoked certificates
369
        :return: CRL encoded in PEM format string
370
        """
371
        with TemporaryFile("serial.srl", "0") as serial_file, \
372
             TemporaryFile("crl.conf", CRL_CONFIG % (index_file_path, serial_file)) as config_file, \
373
             TemporaryFile("certificate.pem", cert.pem_data) as cert_file, \
374
             TemporaryFile("private_key.pem", key.private_key) as key_file:
375

    
376
            args = ["ca", "-config", config_file, "-gencrl", "-keyfile", key_file, "-cert", cert_file, "-outdir", "."]
377
            return self.__run_for_output(args).decode("utf-8")
378

    
379

    
380
class CryptographyException(Exception):
381

    
382
    def __init__(self, executable, args, message):
383
        self.executable = executable
384
        self.args = args
385
        self.message = message
386

    
387
    def __str__(self):
388
        return f"""
389
        EXECUTABLE: {self.executable}
390
        ARGS: {self.args}
391
        MESSAGE: {self.message}
392
        """
(3-3/4)