| 1: | <?php |
| 2: | declare(strict_types=1); |
| 3: | |
| 4: | |
| 5: | |
| 6: | |
| 7: | |
| 8: | |
| 9: | |
| 10: | |
| 11: | |
| 12: | |
| 13: | |
| 14: | |
| 15: | use Module\Skeleton\Contracts\Hookable; |
| 16: | use Opcenter\Crypto\Ssl; |
| 17: | use Opcenter\SiteConfiguration; |
| 18: | |
| 19: | |
| 20: | |
| 21: | |
| 22: | |
| 23: | |
| 24: | class Ssl_Module extends Module_Skeleton implements Hookable |
| 25: | { |
| 26: | const DEPENDENCY_MAP = [ |
| 27: | 'apache', |
| 28: | 'siteinfo' |
| 29: | ]; |
| 30: | |
| 31: | const CRT_PATH = '/etc/httpd/conf/ssl.crt'; |
| 32: | const KEY_PATH = '/etc/httpd/conf/ssl.key'; |
| 33: | const CSR_PATH = '/etc/httpd/conf/ssl.csr'; |
| 34: | const DEFAULT_CERTIFICATE_NAME = 'server'; |
| 35: | |
| 36: | const X509_DAYS = 1095; |
| 37: | |
| 38: | const USER_RHOOK = 'letsencrypt'; |
| 39: | const SYS_RHOOK = 'ssl'; |
| 40: | |
| 41: | public function __construct() |
| 42: | { |
| 43: | parent::__construct(); |
| 44: | $this->exportedFunctions = array( |
| 45: | 'cert_exists' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 46: | 'generate_csr' => PRIVILEGE_ALL, |
| 47: | 'generate_privatekey' => PRIVILEGE_ALL, |
| 48: | 'get_alternative_names' => PRIVILEGE_ALL, |
| 49: | 'has_certificate' => PRIVILEGE_SITE, |
| 50: | 'get_certificate' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 51: | 'get_certificates' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 52: | 'get_csr' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 53: | 'get_private_key' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 54: | 'get_public_key' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 55: | 'is_self_signed' => PRIVILEGE_ALL, |
| 56: | 'key_exists' => PRIVILEGE_SITE | PRIVILEGE_ADMIN, |
| 57: | 'parse_certificate' => PRIVILEGE_ALL, |
| 58: | 'permitted' => PRIVILEGE_ALL, |
| 59: | 'privkey_info' => PRIVILEGE_ALL, |
| 60: | 'request_info' => PRIVILEGE_ALL, |
| 61: | 'resolve_chain' => PRIVILEGE_ALL, |
| 62: | 'sign_certificate' => PRIVILEGE_ALL, |
| 63: | 'valid' => PRIVILEGE_ALL, |
| 64: | 'verify_certificate_chain' => PRIVILEGE_ALL, |
| 65: | 'verify_key' => PRIVILEGE_ALL, |
| 66: | 'verify_x509_key' => PRIVILEGE_ALL, |
| 67: | 'server_certificate' => PRIVILEGE_ALL, |
| 68: | 'trust_endpoint' => PRIVILEGE_ADMIN, |
| 69: | '*' => PRIVILEGE_SITE, |
| 70: | ); |
| 71: | } |
| 72: | |
| 73: | |
| 74: | |
| 75: | |
| 76: | |
| 77: | |
| 78: | public function cert_exists() |
| 79: | { |
| 80: | if (!IS_CLI) { |
| 81: | return $this->query('ssl_cert_exists'); |
| 82: | } |
| 83: | $conf = $this->get_certificates(); |
| 84: | |
| 85: | return count($conf) > 0; |
| 86: | } |
| 87: | |
| 88: | |
| 89: | |
| 90: | |
| 91: | |
| 92: | |
| 93: | public function get_certificates() |
| 94: | { |
| 95: | if (!IS_CLI) { |
| 96: | return $this->query('ssl_get_certificates'); |
| 97: | } |
| 98: | |
| 99: | |
| 100: | $that = $this; |
| 101: | $parser = static function ($config) use ($that) { |
| 102: | $conf = array(); |
| 103: | $token = strtok($config, "\n \t"); |
| 104: | while ($token !== false) { |
| 105: | switch (strtoupper($token)) { |
| 106: | case 'LISTEN': |
| 107: | $key = 'host'; |
| 108: | break; |
| 109: | case 'SSLCERTIFICATEFILE': |
| 110: | $key = 'crt'; |
| 111: | break; |
| 112: | case 'SSLCERTIFICATEKEYFILE': |
| 113: | $key = 'key'; |
| 114: | break; |
| 115: | case 'SSLCERTIFICATECHAINFILE': |
| 116: | $key = 'chain'; |
| 117: | break; |
| 118: | default: |
| 119: | $key = null; |
| 120: | break; |
| 121: | } |
| 122: | if (!is_null($key)) { |
| 123: | $token = trim(strtok("\t \n")); |
| 124: | |
| 125: | $constant = $key === 'chain' ? 'crt' : $key; |
| 126: | if ($constant == 'key' || $constant == 'crt') { |
| 127: | |
| 128: | if (!file_exists($token)) { |
| 129: | return array(); |
| 130: | } |
| 131: | } |
| 132: | $token = $that->file_canonicalize_site($token); |
| 133: | |
| 134: | $conf[$key] = basename($token); |
| 135: | } |
| 136: | $token = strtok(" \t\n"); |
| 137: | } |
| 138: | if (isset($conf['chain']) && count($conf) === 1) { |
| 139: | |
| 140: | return $conf; |
| 141: | } else { |
| 142: | if (!isset($conf['crt']) || !isset($conf['key'])) { |
| 143: | return array(); |
| 144: | } |
| 145: | } |
| 146: | |
| 147: | return $conf; |
| 148: | }; |
| 149: | if ($this->permission_level & PRIVILEGE_ADMIN) { |
| 150: | return [ |
| 151: | 'host' => $this->common_get_ip_address()[0], |
| 152: | 'crt' => Ssl::systemCertificatePath(), |
| 153: | 'key' => Ssl::systemCertificatePath(), |
| 154: | ]; |
| 155: | } |
| 156: | |
| 157: | $masterconfig = glob('/etc/httpd/conf/virtual/' . $this->site . '{,.*}', GLOB_BRACE); |
| 158: | $sitecerts = array(); |
| 159: | $accountaddr = (array)$this->common_get_ip_address(); |
| 160: | |
| 161: | foreach ($masterconfig as $config) { |
| 162: | $cert = array(); |
| 163: | $site = basename($config); |
| 164: | if (!file_exists('/etc/httpd/conf/' . $site . '.ssl')) { |
| 165: | return $sitecerts; |
| 166: | } |
| 167: | $file = '/etc/httpd/conf/virtual/' . $site; |
| 168: | if (!file_exists($file)) { |
| 169: | continue; |
| 170: | } |
| 171: | $config = file_get_contents($file); |
| 172: | $newcert = $parser($config); |
| 173: | if (!$newcert) { |
| 174: | continue; |
| 175: | } |
| 176: | $cert = array_merge($cert, $newcert); |
| 177: | $sslextra = '/etc/httpd/conf/' . basename($file) . '.ssl/custom'; |
| 178: | if (file_exists($sslextra)) { |
| 179: | $config = file_get_contents($sslextra); |
| 180: | $cert = array_merge($cert, $parser($config)); |
| 181: | } |
| 182: | |
| 183: | if (isset($cert['host'])) { |
| 184: | $tmp = strpos($cert['host'], ':'); |
| 185: | if ($tmp) { |
| 186: | $cert['host'] = substr($cert['host'], 0, $tmp); |
| 187: | } |
| 188: | } else { |
| 189: | $cert['host'] = $accountaddr[0]; |
| 190: | } |
| 191: | $sitecerts[] = $cert; |
| 192: | } |
| 193: | |
| 194: | return $sitecerts; |
| 195: | } |
| 196: | |
| 197: | public function key_exists($key = 'server.key') |
| 198: | { |
| 199: | if (!IS_CLI) { |
| 200: | return $this->query('ssl_key_exists', $key); |
| 201: | } |
| 202: | |
| 203: | $name = basename($key, '.key'); |
| 204: | if ($this->permission_level & PRIVILEGE_SITE) { |
| 205: | $key = $this->domain_fs_path() . self::KEY_PATH . |
| 206: | '/' . $name . '.key'; |
| 207: | } else { |
| 208: | if ($key[0] !== '/') { |
| 209: | $key = self::KEY_PATH . '/' . $name; |
| 210: | } |
| 211: | } |
| 212: | |
| 213: | return file_exists($key); |
| 214: | } |
| 215: | |
| 216: | public function install($key, $cert, $chain = null) |
| 217: | { |
| 218: | if (!IS_CLI) { |
| 219: | return $this->query('ssl_install', $key, $cert, $chain); |
| 220: | } |
| 221: | if (!$this->permitted()) { |
| 222: | return error('SSL not permitted on account'); |
| 223: | } |
| 224: | |
| 225: | if (!$this->valid($cert, $key)) { |
| 226: | return error('certificate is not valid for given key: %s', openssl_error_string()); |
| 227: | } |
| 228: | |
| 229: | |
| 230: | if ($this->is_self_signed($cert)) { |
| 231: | $chain = null; |
| 232: | } else if (!$chain) { |
| 233: | |
| 234: | $supplemental = $this->resolve_chain($cert); |
| 235: | if (!$supplemental) { |
| 236: | return error('certificate chain is irresolvable'); |
| 237: | } |
| 238: | info('downloaded chain certificates to satisfy requirement, one or more additional pathways may be missing'); |
| 239: | $chain = join("\n", $supplemental); |
| 240: | } else if (!$this->verify_certificate_chain($cert, $chain)) { |
| 241: | return error('chain not valid for certificate'); |
| 242: | } |
| 243: | |
| 244: | $this->file_purge(); |
| 245: | $prefix = $this->domain_fs_path(); |
| 246: | $crtfile = $prefix . self::CRT_PATH . '/server.crt'; |
| 247: | $keyfile = $prefix . self::KEY_PATH . '/server.key'; |
| 248: | |
| 249: | $this->file_shadow_buildup_backend( |
| 250: | $prefix . self::CSR_PATH . '/server.csr' |
| 251: | ); |
| 252: | |
| 253: | $overwrite = false; |
| 254: | |
| 255: | foreach (array($crtfile, $keyfile) as $file) { |
| 256: | |
| 257: | |
| 258: | |
| 259: | |
| 260: | |
| 261: | $this->file_shadow_buildup_backend($file); |
| 262: | $dir = dirname($file); |
| 263: | if (!is_dir($dir)) { |
| 264: | \Opcenter\Filesystem::mkdir($dir, 'root', $this->group_id, 0700); |
| 265: | } else if (file_exists($file)) { |
| 266: | $overwrite = true; |
| 267: | $old = file_get_contents($file); |
| 268: | file_put_contents($file . '-old', $old, LOCK_EX); |
| 269: | } |
| 270: | } |
| 271: | $this->file_purge(); |
| 272: | if (!file_put_contents($crtfile, $cert, LOCK_EX) || !file_put_contents($keyfile, $key, LOCK_EX)) { |
| 273: | error("Unable to install certificate. Is account over storage quota?"); |
| 274: | if (!$overwrite) { |
| 275: | return false; |
| 276: | } |
| 277: | |
| 278: | |
| 279: | foreach ([$crtfile, $keyfile] as $file) { |
| 280: | rename($file . '-old', $file); |
| 281: | } |
| 282: | |
| 283: | return false; |
| 284: | } |
| 285: | if (FILESYSTEM_TYPE !== 'xfs') { |
| 286: | |
| 287: | |
| 288: | chgrp($crtfile, $this->group_id); |
| 289: | chgrp($keyfile, $this->group_id); |
| 290: | } |
| 291: | chmod($crtfile, 0600); |
| 292: | chown($crtfile, 'root'); |
| 293: | chmod($keyfile, 0600); |
| 294: | chown($keyfile, 'root'); |
| 295: | |
| 296: | $chainconfig = $this->_getSSLExtraConfig(); |
| 297: | $chainfile = join(DIRECTORY_SEPARATOR, array($prefix, self::CRT_PATH, 'bundle.crt')); |
| 298: | if ($chain) { |
| 299: | if (!file_exists(dirname($chainconfig))) { |
| 300: | mkdir(dirname($chainconfig), 0711); |
| 301: | } |
| 302: | file_put_contents($prefix . self::CRT_PATH . '/bundle.crt', $chain, LOCK_EX); |
| 303: | if (file_exists($chainconfig)) { |
| 304: | $contents = file($chainconfig, FILE_IGNORE_NEW_LINES); |
| 305: | $newcontents = array(); |
| 306: | $directive = 'SSLCertificateChainFile'; |
| 307: | foreach ($contents as $line) { |
| 308: | |
| 309: | if (0 === strpos($line, $directive)) { |
| 310: | continue; |
| 311: | } |
| 312: | $newcontents[] = $line; |
| 313: | } |
| 314: | $newcontents[] = $directive . ' ' . $chainfile; |
| 315: | file_put_contents($chainconfig, join("\n", $newcontents)); |
| 316: | |
| 317: | } else { |
| 318: | file_put_contents($chainconfig, 'SSLCertificateChainFile ' . $chainfile); |
| 319: | } |
| 320: | } else if (file_exists($chainconfig)) { |
| 321: | unlink($chainconfig); |
| 322: | |
| 323: | |
| 324: | if (file_exists($chainfile)) { |
| 325: | unlink($chainfile); |
| 326: | } |
| 327: | } |
| 328: | |
| 329: | |
| 330: | if (!$overwrite || !$this->enabled()) { |
| 331: | $cmd = new Util_Account_Editor($this->getAuthContext()->getAccount(), $this->getAuthContext()); |
| 332: | $cmd->setConfig(SiteConfiguration::getModuleRemap('openssl'), 'enabled', 1); |
| 333: | |
| 334: | $cmd->edit(); |
| 335: | } |
| 336: | $this->file_purge(); |
| 337: | |
| 338: | \Util_Account_Hooks::instantiateContexted($this->getAuthContext())->run('reload', [self::USER_RHOOK]); |
| 339: | info('reloading web server in 2 minutes, stay tuned!'); |
| 340: | |
| 341: | return true; |
| 342: | } |
| 343: | |
| 344: | public function permitted() |
| 345: | { |
| 346: | return true; |
| 347: | } |
| 348: | |
| 349: | |
| 350: | |
| 351: | |
| 352: | |
| 353: | |
| 354: | |
| 355: | |
| 356: | public function valid($cert, $pkey) |
| 357: | { |
| 358: | return openssl_x509_check_private_key($cert, $pkey); |
| 359: | } |
| 360: | |
| 361: | |
| 362: | |
| 363: | |
| 364: | |
| 365: | |
| 366: | |
| 367: | public function is_self_signed($crt) |
| 368: | { |
| 369: | return Ssl::selfSigned($crt); |
| 370: | } |
| 371: | |
| 372: | |
| 373: | |
| 374: | |
| 375: | |
| 376: | |
| 377: | |
| 378: | |
| 379: | public function self_sign(string $cn, array $sans = []): bool |
| 380: | { |
| 381: | if ($this->cert_exists() && !$this->is_self_signed($this->get_certificate())) { |
| 382: | return error('Certificate already exists and is not self-signed'); |
| 383: | } |
| 384: | return serial(function() use($cn, $sans) { |
| 385: | $key = $this->generate_privatekey(2048); |
| 386: | $csr = $this->generate_csr($key, $cn, null, null, null, null, null, null, $sans); |
| 387: | $crt = $this->sign_certificate($csr, $key); |
| 388: | return $this->install($key, $crt); |
| 389: | }) ?? false; |
| 390: | |
| 391: | } |
| 392: | |
| 393: | |
| 394: | |
| 395: | |
| 396: | |
| 397: | |
| 398: | |
| 399: | public function parse_certificate($crt): array |
| 400: | { |
| 401: | return Ssl::parse($crt); |
| 402: | } |
| 403: | |
| 404: | |
| 405: | |
| 406: | |
| 407: | |
| 408: | |
| 409: | |
| 410: | public function resolve_chain($crt) |
| 411: | { |
| 412: | $buffer = Error_Reporter::flush_buffer(); |
| 413: | |
| 414: | $chain = $this->_resolveChain($crt, array()); |
| 415: | $isError = Error_Reporter::is_error(); |
| 416: | Error_Reporter::merge_buffer($buffer); |
| 417: | if ($isError) { |
| 418: | return false; |
| 419: | } |
| 420: | |
| 421: | |
| 422: | |
| 423: | return join("\n", $chain); |
| 424: | |
| 425: | } |
| 426: | |
| 427: | private function _resolveChain($crt, $seen) |
| 428: | { |
| 429: | |
| 430: | |
| 431: | |
| 432: | if (Ssl::isDer($crt)) { |
| 433: | $crt = Ssl::der2Pem($crt); |
| 434: | } |
| 435: | |
| 436: | if ($this->is_self_signed($crt)) { |
| 437: | |
| 438: | return array($crt); |
| 439: | } |
| 440: | $info = $this->parse_certificate($crt); |
| 441: | |
| 442: | if (!isset($info['extensions'])) { |
| 443: | return array(); |
| 444: | } else if (!isset($info['extensions']['subjectKeyIdentifier'])) { |
| 445: | error('missing subjectKeyIdentifier fingerprint!'); |
| 446: | } |
| 447: | $fingerprint = $info['extensions']['subjectKeyIdentifier']; |
| 448: | |
| 449: | if (array_search($fingerprint, $seen, true)) { |
| 450: | return error('chain loop detected, fingerprint: %s', $fingerprint); |
| 451: | } |
| 452: | $seen[] = $fingerprint; |
| 453: | |
| 454: | $extensions = $info['extensions']; |
| 455: | if (!isset($extensions['authorityInfoAccess'])) { |
| 456: | |
| 457: | return array(); |
| 458: | } |
| 459: | |
| 460: | if (!preg_match_all(Regex::SSL_CRT_URI, $extensions['authorityInfoAccess'], $matches)) { |
| 461: | error("can't find URI to match in authorityInfoAccess: %s", |
| 462: | $extensions['authorityInfoAccess']); |
| 463: | |
| 464: | return array(); |
| 465: | } |
| 466: | |
| 467: | |
| 468: | |
| 469: | $url = $matches['url'][0]; |
| 470: | foreach ($matches['url'] as $candidate) { |
| 471: | if (false !== stripos($candidate, 'ocsp')) { |
| 472: | continue; |
| 473: | } |
| 474: | $url = $candidate; |
| 475: | } |
| 476: | |
| 477: | $chainedcrt = $this->_downloadChain($url); |
| 478: | if (!$chainedcrt) { |
| 479: | error('failed to resolve chain!'); |
| 480: | |
| 481: | return array(); |
| 482: | } |
| 483: | info("downloaded extra chain `%s'", $url); |
| 484: | if (Ssl::isDer($chainedcrt)) { |
| 485: | $chainedcrt = Ssl::der2Pem($chainedcrt); |
| 486: | } |
| 487: | return array_merge( |
| 488: | $this->_resolveChain($chainedcrt, $seen), |
| 489: | (array)$chainedcrt |
| 490: | ); |
| 491: | } |
| 492: | |
| 493: | |
| 494: | |
| 495: | |
| 496: | |
| 497: | |
| 498: | |
| 499: | |
| 500: | private function _downloadChain($url) |
| 501: | { |
| 502: | if (extension_loaded('curl')) { |
| 503: | $adapter = new HTTP_Request2_Adapter_Curl(); |
| 504: | } else { |
| 505: | $adapter = new HTTP_Request2_Adapter_Socket(); |
| 506: | } |
| 507: | |
| 508: | $http = new HTTP_Request2( |
| 509: | $url, |
| 510: | HTTP_Request2::METHOD_GET, |
| 511: | array( |
| 512: | 'adapter' => $adapter |
| 513: | ) |
| 514: | ); |
| 515: | |
| 516: | try { |
| 517: | $response = $http->send(); |
| 518: | $code = $response->getStatus(); |
| 519: | switch ($code) { |
| 520: | case 200: |
| 521: | break; |
| 522: | case 403: |
| 523: | return error('URL request forbidden by server'); |
| 524: | case 404: |
| 525: | return error('URL not found on server'); |
| 526: | case 302: |
| 527: | $newLocation = $response->getHeader('location'); |
| 528: | |
| 529: | return $this->_downloadChain($newLocation); |
| 530: | default: |
| 531: | return error("URL request failed, code `%d': %s", |
| 532: | $code, $response->getReasonPhrase()); |
| 533: | } |
| 534: | |
| 535: | $cert = $response->getBody(); |
| 536: | } catch (HTTP_Request2_Exception $e) { |
| 537: | return error("fatal error retrieving URL: `%s'", $e->getMessage()); |
| 538: | } |
| 539: | |
| 540: | return $cert; |
| 541: | } |
| 542: | |
| 543: | |
| 544: | |
| 545: | |
| 546: | |
| 547: | |
| 548: | |
| 549: | |
| 550: | public function verify_certificate_chain($cert1, $cert2) |
| 551: | { |
| 552: | $resp = $this->_verify_certificate_chain_real($cert1, $cert2); |
| 553: | if ($resp || null === $resp) { |
| 554: | return (int)$resp; |
| 555: | } |
| 556: | |
| 557: | return $this->_verify_certificate_chain_real($cert2, $cert1) ? -1 : 0; |
| 558: | } |
| 559: | |
| 560: | |
| 561: | |
| 562: | |
| 563: | |
| 564: | |
| 565: | |
| 566: | |
| 567: | private function _verify_certificate_chain_real($cert1, $cert2) |
| 568: | { |
| 569: | |
| 570: | |
| 571: | |
| 572: | |
| 573: | $icert = $this->parse_certificate($cert1); |
| 574: | $ichain = $this->parse_certificate($cert2); |
| 575: | if (!isset($ichain['extensions'])) { |
| 576: | return null; |
| 577: | } |
| 578: | $keyidentifier = array_get($icert, 'extensions.authorityKeyIdentifier', ''); |
| 579: | if (0 === strncmp($keyidentifier, "keyid:", 6)) { |
| 580: | $keyidentifier = trim(substr($keyidentifier, 6)); |
| 581: | } |
| 582: | if ($keyidentifier == $ichain['extensions']['subjectKeyIdentifier']) { |
| 583: | return 1; |
| 584: | } |
| 585: | |
| 586: | return 0; |
| 587: | } |
| 588: | |
| 589: | private function _getSSLExtraConfig() |
| 590: | { |
| 591: | return $this->web_site_config_dir() . '.ssl/custom'; |
| 592: | } |
| 593: | |
| 594: | public function enabled(): bool |
| 595: | { |
| 596: | return (bool)$this->getServiceValue(SiteConfiguration::getModuleRemap('openssl'), 'enabled'); |
| 597: | } |
| 598: | |
| 599: | public function delete($key, $crt, $chain = null) |
| 600: | { |
| 601: | if (!IS_CLI) { |
| 602: | return $this->query('ssl_delete', $key, $crt, $chain); |
| 603: | } |
| 604: | |
| 605: | if (substr($key, -4) == '.crt' && substr($crt, -4) == '.key') { |
| 606: | $tmp = $crt; |
| 607: | $crt = $key; |
| 608: | $key = $tmp; |
| 609: | } |
| 610: | if (!$this->get_certificate($crt)) { |
| 611: | return error("invalid certificate `%s' specified", $crt); |
| 612: | } else if (!$this->get_private_key($key)) { |
| 613: | return error("invalid private key `%s' specified", $key); |
| 614: | } |
| 615: | if ($chain && !$this->get_certificate($chain)) { |
| 616: | return error("invalid certificate chain `%s' specified", $chain); |
| 617: | } |
| 618: | if (!$this->_delete_wrapper($crt)) { |
| 619: | |
| 620: | |
| 621: | return error("failed to delete certificate `%s'", $crt); |
| 622: | } |
| 623: | |
| 624: | if (!$this->_delete_wrapper($key)) { |
| 625: | warn("failed to remove ssl key `%s'", $key); |
| 626: | } |
| 627: | |
| 628: | if ($chain && !$this->_delete_wrapper($chain)) { |
| 629: | warn("failed to remove ssl chain certficiate `%s'", $chain); |
| 630: | } |
| 631: | $sslextra = $this->_getSSLExtraConfig(); |
| 632: | |
| 633: | if (file_exists($sslextra)) { |
| 634: | $contents = file_get_contents($sslextra); |
| 635: | $newconfig = array(); |
| 636: | foreach (explode("\n", $contents) as $line) { |
| 637: | if (preg_match('!/' . preg_quote($chain, '!') . '$!', $line)) { |
| 638: | info('detected and removed certificate chain from http config'); |
| 639: | continue; |
| 640: | } |
| 641: | $newconfig[] = $line; |
| 642: | } |
| 643: | file_put_contents($sslextra, join("\n", $newconfig)); |
| 644: | } |
| 645: | |
| 646: | $editor = new Util_Account_Editor($this->getAuthContext()->getAccount()); |
| 647: | $editor->setConfig(SiteConfiguration::getModuleRemap('openssl'), 'enabled', 0); |
| 648: | $status = $editor->edit(); |
| 649: | if (!$status) { |
| 650: | return error('failed to deactivate openssl on account'); |
| 651: | } |
| 652: | Util_Account_Hooks::instantiateContexted($this->getAuthContext())->run('reload', [self::USER_RHOOK]); |
| 653: | return true; |
| 654: | } |
| 655: | |
| 656: | |
| 657: | |
| 658: | |
| 659: | |
| 660: | |
| 661: | |
| 662: | public function get_certificate($name = 'server.crt') |
| 663: | { |
| 664: | if (!IS_CLI) { |
| 665: | return $this->query('ssl_get_certificate', $name); |
| 666: | } |
| 667: | $name = basename($name); |
| 668: | if (!str_ends_with($name, '.crt') && !str_ends_with($name, '.pem')) { |
| 669: | $name .= '.crt'; |
| 670: | } |
| 671: | if ($this->permission_level & PRIVILEGE_SITE) { |
| 672: | $file = $this->domain_fs_path() . self::CRT_PATH . |
| 673: | '/' . $name; |
| 674: | } else if ($name[0] != '/') { |
| 675: | $file = Opcenter\Http\Apache::HTTP_HOME . '/conf/' . $name; |
| 676: | } else { |
| 677: | $file = $name . '.crt'; |
| 678: | } |
| 679: | |
| 680: | if (!file_exists($file)) { |
| 681: | return error("certificate `%s' does not exist", $name); |
| 682: | } |
| 683: | |
| 684: | return file_get_contents($file); |
| 685: | } |
| 686: | |
| 687: | public function get_private_key($name = 'server.key') |
| 688: | { |
| 689: | if (!IS_CLI) { |
| 690: | return $this->query('ssl_get_private_key', $name); |
| 691: | } |
| 692: | $name = basename($name, '.key'); |
| 693: | if ($this->permission_level & PRIVILEGE_SITE) { |
| 694: | $file = $this->domain_fs_path() . self::KEY_PATH . |
| 695: | '/' . $name . '.key'; |
| 696: | } else { |
| 697: | if ($name[0] != '/') { |
| 698: | $file = self::KEY_PATH . $name . '.key'; |
| 699: | } else { |
| 700: | $file = $name . '.key'; |
| 701: | } |
| 702: | } |
| 703: | |
| 704: | if (!file_exists($file)) { |
| 705: | return error("private key `%s' does not exist", $name); |
| 706: | } |
| 707: | |
| 708: | return file_get_contents($file); |
| 709: | } |
| 710: | |
| 711: | private function _delete_wrapper($file) |
| 712: | { |
| 713: | $prefix = $this->domain_fs_path(); |
| 714: | $ext = substr($file, -4); |
| 715: | switch ($ext) { |
| 716: | case '.key': |
| 717: | $folder = self::KEY_PATH; |
| 718: | break; |
| 719: | case '.csr': |
| 720: | $folder = self::CSR_PATH; |
| 721: | break; |
| 722: | case '.crt': |
| 723: | $folder = self::CRT_PATH; |
| 724: | break; |
| 725: | default: |
| 726: | return error("cannot delete SSL asset: unknown extension `%s'", $ext); |
| 727: | } |
| 728: | $file = join(DIRECTORY_SEPARATOR, array($prefix, $folder, $file)); |
| 729: | if (!file_exists($file)) { |
| 730: | return false; |
| 731: | } |
| 732: | |
| 733: | return unlink($file); |
| 734: | } |
| 735: | |
| 736: | |
| 737: | |
| 738: | |
| 739: | |
| 740: | |
| 741: | |
| 742: | public function generate_privatekey($bits = 2048) |
| 743: | { |
| 744: | return Ssl::genkey($bits); |
| 745: | } |
| 746: | |
| 747: | |
| 748: | |
| 749: | |
| 750: | |
| 751: | |
| 752: | |
| 753: | |
| 754: | |
| 755: | |
| 756: | |
| 757: | |
| 758: | |
| 759: | |
| 760: | |
| 761: | public function generate_csr( |
| 762: | string $privkey, |
| 763: | string $host, |
| 764: | ?string $country = '', |
| 765: | ?string $state = '', |
| 766: | ?string $locality = '', |
| 767: | ?string $org = '', |
| 768: | ?string $orgunit = '', |
| 769: | ?string $email = '', |
| 770: | array $san = [] |
| 771: | ) { |
| 772: | return Ssl::generate_csr( |
| 773: | $privkey, $host, $country ?? 'US', $state ?? 'GA', $locality ?? 'Atlanta', (string)$org, (string)$orgunit, (string)$email, $san |
| 774: | ); |
| 775: | } |
| 776: | |
| 777: | |
| 778: | |
| 779: | |
| 780: | |
| 781: | |
| 782: | |
| 783: | |
| 784: | |
| 785: | |
| 786: | |
| 787: | |
| 788: | |
| 789: | |
| 790: | |
| 791: | |
| 792: | |
| 793: | |
| 794: | |
| 795: | |
| 796: | |
| 797: | |
| 798: | |
| 799: | |
| 800: | |
| 801: | public function request_info($csr) |
| 802: | { |
| 803: | return Ssl::request_info($csr); |
| 804: | } |
| 805: | |
| 806: | |
| 807: | |
| 808: | |
| 809: | |
| 810: | |
| 811: | |
| 812: | |
| 813: | |
| 814: | |
| 815: | |
| 816: | |
| 817: | |
| 818: | |
| 819: | |
| 820: | public function get_public_key($name) |
| 821: | { |
| 822: | if (!IS_CLI) { |
| 823: | return $this->query('ssl_get_public_key', $name); |
| 824: | } |
| 825: | $name = basename($name, '.key'); |
| 826: | $key = $this->get_certificate($name); |
| 827: | if (!$key) { |
| 828: | return error("unable to get named certificate `%s'", $name); |
| 829: | } |
| 830: | $res = openssl_pkey_get_public($key); |
| 831: | $details = openssl_pkey_get_details($res); |
| 832: | openssl_pkey_free($res); |
| 833: | |
| 834: | return $details; |
| 835: | |
| 836: | } |
| 837: | |
| 838: | |
| 839: | |
| 840: | |
| 841: | |
| 842: | |
| 843: | |
| 844: | public function order_certificates(array $certs) |
| 845: | { |
| 846: | foreach ($certs as $cert) { |
| 847: | |
| 848: | } |
| 849: | } |
| 850: | |
| 851: | public function get_csr($name) |
| 852: | { |
| 853: | if (!IS_CLI) { |
| 854: | return $this->query('ssl_get_csr', $name); |
| 855: | } |
| 856: | $name = basename($name, '.csr'); |
| 857: | if ($this->permission_level & PRIVILEGE_SITE) { |
| 858: | $file = $this->domain_fs_path() . self::CSR_PATH . |
| 859: | '/' . $name . '.csr'; |
| 860: | } else { |
| 861: | if ($name[0] != '/') { |
| 862: | $file = self::CSR_PATH . $name . '.csr'; |
| 863: | } else { |
| 864: | $file = $name . '.csr'; |
| 865: | } |
| 866: | } |
| 867: | |
| 868: | if (!file_exists($file)) { |
| 869: | return error("certificate request `%s' does not exist", $name); |
| 870: | } |
| 871: | |
| 872: | return file_get_contents($file); |
| 873: | |
| 874: | } |
| 875: | |
| 876: | |
| 877: | |
| 878: | |
| 879: | |
| 880: | |
| 881: | |
| 882: | |
| 883: | |
| 884: | |
| 885: | public function sign_certificate( |
| 886: | $csr, |
| 887: | $privkey, |
| 888: | $days = 365, |
| 889: | $serial = null |
| 890: | ) { |
| 891: | |
| 892: | return Ssl::selfsign($csr, $privkey, $days, $serial); |
| 893: | } |
| 894: | |
| 895: | |
| 896: | |
| 897: | |
| 898: | |
| 899: | |
| 900: | |
| 901: | |
| 902: | public function verify_x509_key($crt, $privkey) |
| 903: | { |
| 904: | return openssl_x509_check_private_key($crt, $privkey); |
| 905: | } |
| 906: | |
| 907: | public function verify_key($key) |
| 908: | { |
| 909: | if (!$key) { |
| 910: | return error('no key specified'); |
| 911: | } |
| 912: | $info = $this->privkey_info($key); |
| 913: | if (!$info) { |
| 914: | return error('invalid key detected'); |
| 915: | } |
| 916: | |
| 917: | return true; |
| 918: | } |
| 919: | |
| 920: | |
| 921: | |
| 922: | |
| 923: | |
| 924: | |
| 925: | |
| 926: | public function privkey_info($privkey) |
| 927: | { |
| 928: | $res = openssl_pkey_get_private($privkey); |
| 929: | $details = openssl_pkey_get_details($res); |
| 930: | |
| 931: | return $details; |
| 932: | } |
| 933: | |
| 934: | |
| 935: | |
| 936: | |
| 937: | |
| 938: | |
| 939: | |
| 940: | public function get_alternative_names($certificate): ?array |
| 941: | { |
| 942: | return Ssl::alternativeNames($certificate); |
| 943: | } |
| 944: | |
| 945: | public function _create() |
| 946: | { |
| 947: | $this->_edit(); |
| 948: | } |
| 949: | |
| 950: | |
| 951: | |
| 952: | |
| 953: | |
| 954: | |
| 955: | |
| 956: | public function contains_cn(string $name): bool |
| 957: | { |
| 958: | if (!$this->cert_exists()) { |
| 959: | return false; |
| 960: | } |
| 961: | |
| 962: | $certdata = $this->ssl_get_certificates(); |
| 963: | $certdata = array_pop($certdata); |
| 964: | $cert = $this->ssl_get_certificate($certdata['crt']); |
| 965: | $sans = $this->ssl_get_alternative_names($cert); |
| 966: | $name = strtolower($name); |
| 967: | if (in_array($name, $sans, true)) { |
| 968: | return true; |
| 969: | } |
| 970: | |
| 971: | $offset = 0; |
| 972: | while (false !== ($offset = strpos($name, '.'))) { |
| 973: | $name = substr($name, $offset ? $offset + 1 : 0); |
| 974: | if (in_array("*.{$name}", $sans, true)) { |
| 975: | return true; |
| 976: | } |
| 977: | } |
| 978: | |
| 979: | return false; |
| 980: | } |
| 981: | |
| 982: | |
| 983: | |
| 984: | |
| 985: | |
| 986: | |
| 987: | public function server_certificate(): ?string |
| 988: | { |
| 989: | if (!IS_CLI) { |
| 990: | return $this->query('ssl_server_certificate'); |
| 991: | } |
| 992: | |
| 993: | if (!file_exists(Ssl::systemCertificatePath())) { |
| 994: | return null; |
| 995: | } |
| 996: | |
| 997: | $pem = file_get_contents(Ssl::systemCertificatePath()); |
| 998: | return Ssl::extractCertificate($pem); |
| 999: | } |
| 1000: | |
| 1001: | public function _edit() |
| 1002: | { |
| 1003: | $conf_new = $this->getAuthContext()->getAccount()->new; |
| 1004: | $conf_old = $this->getAuthContext()->getAccount()->old; |
| 1005: | $domainprefix = $this->domain_fs_path(); |
| 1006: | $renameWrapper = function ($mode) use ($domainprefix) { |
| 1007: | $certdir = $domainprefix . self::CRT_PATH; |
| 1008: | if ($mode === 'disable') { |
| 1009: | foreach (glob($certdir . '/*.crt') as $cert) { |
| 1010: | rename($cert, $cert . '-disabled'); |
| 1011: | info('disabled certificate ' . basename($cert)); |
| 1012: | } |
| 1013: | |
| 1014: | return; |
| 1015: | } |
| 1016: | $pkeyfile = $domainprefix . self::KEY_PATH . '/server.key'; |
| 1017: | if (!file_exists($pkeyfile)) { |
| 1018: | |
| 1019: | return false; |
| 1020: | } |
| 1021: | $pkey = file_get_contents($pkeyfile); |
| 1022: | foreach (glob($certdir . '/*.crt-disabled') as $cert) { |
| 1023: | $crt = file_get_contents($cert); |
| 1024: | $file = basename($cert); |
| 1025: | |
| 1026: | if ($file === 'server.crt' && !$this->valid($crt, $pkey)) { |
| 1027: | info("removing dangling certificate `%s' that does not match pkey modulus", $cert); |
| 1028: | unlink($cert); |
| 1029: | |
| 1030: | continue; |
| 1031: | } |
| 1032: | rename($cert, substr($cert, 0, -9)); |
| 1033: | info('enabled certificate ' . substr(basename($cert), 0, -9)); |
| 1034: | } |
| 1035: | }; |
| 1036: | |
| 1037: | $ssl = SiteConfiguration::getModuleRemap('openssl'); |
| 1038: | |
| 1039: | if (!$conf_new[$ssl]['enabled']) { |
| 1040: | $renameWrapper('disable'); |
| 1041: | } else if ($conf_new[$ssl]['enabled'] && !($conf_old[$ssl]['enabled'] ?? false)) { |
| 1042: | $renameWrapper('enable'); |
| 1043: | } |
| 1044: | } |
| 1045: | |
| 1046: | |
| 1047: | |
| 1048: | |
| 1049: | |
| 1050: | |
| 1051: | |
| 1052: | |
| 1053: | |
| 1054: | public function trust_endpoint(string $uri, bool $verify_name = false): bool |
| 1055: | { |
| 1056: | $components = parse_url($uri, -1); |
| 1057: | if (empty($components['scheme'])) { |
| 1058: | return error("Protocol unknown for supplied URI %s", $uri); |
| 1059: | } |
| 1060: | |
| 1061: | $port = $components['port'] ?? \Opcenter\Net\Port::fromService($components['scheme']); |
| 1062: | if (!$port) { |
| 1063: | return error("Port unknown for supplied scheme %s", $components['scheme']); |
| 1064: | } |
| 1065: | |
| 1066: | if (empty($components['host'])) { |
| 1067: | return error("Host unknown for supplied URI %s", $uri); |
| 1068: | } |
| 1069: | |
| 1070: | $certificate = null; |
| 1071: | foreach (['ssl', 'tls'] as $transport) { |
| 1072: | debug("Querying %(scheme)s://%(host)s:%(port)s using %(transport)s", [ |
| 1073: | 'scheme' => $components['scheme'], |
| 1074: | 'host' => $components['host'], |
| 1075: | 'port' => $port, |
| 1076: | 'transport' => $transport |
| 1077: | ]); |
| 1078: | $ctx = stream_context_create([$transport => [ |
| 1079: | 'SNI_enabled' => true, |
| 1080: | 'capture_peer_cert' => true, |
| 1081: | 'verify_peer' => false, |
| 1082: | 'verify_peer_name' => $verify_name |
| 1083: | ]]); |
| 1084: | |
| 1085: | $handler = \Error_Reporter::silence(fn() => stream_socket_client("{$transport}://{$components['host']}:{$port}" . ($components['path'] ?? '/'), flags: STREAM_CLIENT_CONNECT, context: $ctx)); |
| 1086: | if ($handler) { |
| 1087: | $cert = array_get(stream_context_get_options($handler), "{$transport}.peer_certificate"); |
| 1088: | $certificate = openssl_x509_read($cert); |
| 1089: | fclose($handler); |
| 1090: | break; |
| 1091: | } |
| 1092: | } |
| 1093: | |
| 1094: | if (!$certificate) { |
| 1095: | return error("Failed to detect certificate on %(uri)s", ['uri' => $uri]); |
| 1096: | } |
| 1097: | |
| 1098: | $serverFeature = array_first(array_get(openssl_x509_parse($certificate), 'purposes', []), static fn($p) => $p[2] === 'sslserver'); |
| 1099: | if (empty($serverFeature[0])) { |
| 1100: | return error("Certificate cannot be used for service authentication"); |
| 1101: | } |
| 1102: | |
| 1103: | if (openssl_x509_verify($certificate, file_get_contents(Ssl::SYSTEM_CERT_PATH . '/ca-bundle.crt'))) { |
| 1104: | return warn("Certificate already trusted"); |
| 1105: | } |
| 1106: | |
| 1107: | $path = Ssl::SYSTEM_ANCHOR_PATH . '/' . $components['scheme'] . ':' . $components['host'] . ':' . $port . '.pem'; |
| 1108: | openssl_x509_export($certificate, $str); |
| 1109: | if (file_exists($path) && file_get_contents($path) !== $str) { |
| 1110: | return error("Certificate exists in `%(path)s' and is different. Remove before updating.", ['path' => $path]); |
| 1111: | } |
| 1112: | |
| 1113: | file_put_contents($path, $str); |
| 1114: | |
| 1115: | $ret = \Util_Process::exec(['update-ca-trust', 'extract']); |
| 1116: | return $ret['success'] ? info("Certificate stored in `%(path)s'", ['path' => $path]) : |
| 1117: | error("Failed to add certificate in `%(path)s': %(err)s", ['path' => $path, 'err' => coalesce($ret['stderr'], $ret['stdout'])]); |
| 1118: | } |
| 1119: | |
| 1120: | public function _verify_conf(\Opcenter\Service\ConfigurationContext $ctx): bool |
| 1121: | { |
| 1122: | return true; |
| 1123: | } |
| 1124: | |
| 1125: | public function _delete() |
| 1126: | { |
| 1127: | |
| 1128: | } |
| 1129: | |
| 1130: | public function _create_user(string $user) |
| 1131: | { |
| 1132: | |
| 1133: | } |
| 1134: | |
| 1135: | public function _delete_user(string $user) |
| 1136: | { |
| 1137: | |
| 1138: | } |
| 1139: | |
| 1140: | public function _edit_user(string $userold, string $usernew, array $oldpwd) |
| 1141: | { |
| 1142: | |
| 1143: | } |
| 1144: | |
| 1145: | } |