gmid/utils.c

499 lines
10 KiB
C

/*
* Copyright (c) 2021, 2023 Omar Polo <op@omarpolo.com>
* Copyright (c) 2019 Renaud Allard <renaud@allard.it>
* Copyright (c) 2016 Kristaps Dzonsons <kristaps@bsd.lv>
* Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
* Copyright (c) 2008 Reyk Floeter <reyk@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include "gmid.h"
#include <errno.h>
#include <string.h>
#include <openssl/ec.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/obj_mac.h>
#include <openssl/pem.h>
#include <openssl/rsa.h>
#include <openssl/x509_vfy.h>
#include <openssl/x509v3.h>
#include "log.h"
/*
* Default number of bits when creating a new RSA key.
*/
#define KBITS 4096
const char *
strip_path(const char *path, int strip)
{
char *t;
while (strip > 0) {
if ((t = strchr(path, '/')) == NULL) {
path = strchr(path, '\0');
break;
}
path = t;
strip--;
}
return path;
}
int
ends_with(const char *str, const char *sufx)
{
size_t i, j;
i = strlen(str);
j = strlen(sufx);
if (j > i)
return 0;
i -= j;
for (j = 0; str[i] != '\0'; i++, j++)
if (str[i] != sufx[j])
return 0;
return 1;
}
char *
absolutify_path(const char *path)
{
char wd[PATH_MAX], *r;
if (*path == '/') {
if ((r = strdup(path)) == NULL)
fatal("strdup");
return r;
}
if (getcwd(wd, sizeof(wd)) == NULL)
fatal("getcwd");
if (asprintf(&r, "%s/%s", wd, path) == -1)
fatal("asprintf");
return r;
}
char *
xstrdup(const char *s)
{
char *d;
if ((d = strdup(s)) == NULL)
fatal("strdup");
return d;
}
void *
xcalloc(size_t nmemb, size_t size)
{
void *d;
if ((d = calloc(nmemb, size)) == NULL)
fatal("calloc");
return d;
}
static EVP_PKEY *
rsa_key_create(FILE *f, const char *fname)
{
EVP_PKEY_CTX *ctx = NULL;
EVP_PKEY *pkey = NULL;
int ret = -1;
/* First, create the context and the key. */
if ((ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL)) == NULL) {
log_warnx("EVP_PKEY_CTX_new_id failed");
ssl_error("EVP_PKEY_CTX_new_id");
goto done;
}
if (EVP_PKEY_keygen_init(ctx) <= 0) {
log_warnx("EVP_PKEY_keygen_init failed");
ssl_error("EVP_PKEY_keygen_init");
goto done;
}
if (EVP_PKEY_CTX_set_rsa_keygen_bits(ctx, KBITS) <= 0) {
log_warnx("EVP_PKEY_CTX_set_rsa_keygen_bits failed");
ssl_error("EVP_PKEY_CTX_set_rsa_keygen_bits");
goto done;
}
if (EVP_PKEY_keygen(ctx, &pkey) <= 0) {
log_warnx("EVP_PKEY_keygen failed");
ssl_error("EVP_PKEY_keygen");
goto done;
}
/* Serialize the key to the disc. */
if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) {
log_warnx("PEM_write_PrivateKey failed");
ssl_error("PEM_write_PrivateKey");
goto done;
}
ret = 0;
done:
if (ret == -1) {
EVP_PKEY_free(pkey);
pkey = NULL;
}
EVP_PKEY_CTX_free(ctx);
return pkey;
}
static EVP_PKEY *
ec_key_create(FILE *f, const char *fname)
{
EC_KEY *eckey = NULL;
EVP_PKEY *pkey = NULL;
int ret = -1;
if ((eckey = EC_KEY_new_by_curve_name(NID_secp384r1)) == NULL) {
log_warnx("EC_KEY_new_by_curve_name failed");
ssl_error("EC_KEY_new_by_curve_name");
goto done;
}
if (!EC_KEY_generate_key(eckey)) {
log_warnx("EC_KEY_generate_key failed");
ssl_error("EC_KEY_generate_key");
goto done;
}
/* Serialise the key to the disc in EC format */
if (!PEM_write_ECPrivateKey(f, eckey, NULL, NULL, 0, NULL, NULL)) {
log_warnx("PEM_write_ECPrivateKey failed");
ssl_error("PEM_write_ECPrivateKey");
goto done;
}
/* Convert the EC key into a PKEY structure */
if ((pkey = EVP_PKEY_new()) == NULL) {
log_warnx("EVP_PKEY_new failed");
ssl_error("EVP_PKEY_new");
goto done;
}
if (!EVP_PKEY_set1_EC_KEY(pkey, eckey)) {
log_warnx("EVP_PKEY_set1_EC_KEY failed");
ssl_error("EVP_PKEY_set1_EC_KEY");
goto done;
}
ret = 0;
done:
if (ret == -1) {
EVP_PKEY_free(pkey);
pkey = NULL;
log_warnx("WOOOPS");
}
EC_KEY_free(eckey);
return pkey;
}
void
gencert(const char *hostname, const char *certpath, const char *keypath,
int eckey)
{
EVP_PKEY *pkey;
X509 *x509;
X509_NAME *name;
FILE *f;
const unsigned char *host = (const unsigned char*)hostname;
log_info("Generating new %s key for %s (it could take a while)",
eckey ? "EC" : "RSA", host);
if ((f = fopen(keypath, "w")) == NULL) {
log_warn("can't open %s", keypath);
goto err;
}
if (eckey)
pkey = ec_key_create(f, keypath);
else
pkey = rsa_key_create(f, keypath);
if (pkey == NULL) {
log_warnx("failed to generate a private key");
goto err;
}
if (fflush(f) == EOF || fclose(f) == EOF) {
log_warn("failed to flush or close the private key");
goto err;
}
if ((x509 = X509_new()) == NULL) {
log_warnx("couldn't generate the X509 certificate");
ssl_error("X509_new");
goto err;
}
ASN1_INTEGER_set(X509_get_serialNumber(x509), 0);
X509_gmtime_adj(X509_get_notBefore(x509), 0);
X509_gmtime_adj(X509_get_notAfter(x509), 315360000L); /* 10 years */
X509_set_version(x509, 2); // v3
if (!X509_set_pubkey(x509, pkey)) {
log_warnx("couldn't set the public key");
ssl_error("X509_set_pubkey");
goto err;
}
if ((name = X509_NAME_new()) == NULL) {
log_warnx("X509_NAME_new failed");
ssl_error("X509_NAME_new");
goto err;
}
if (!X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC, host,
-1, -1, 0)) {
log_warnx("couldn't add CN to cert");
ssl_error("X509_NAME_add_entry_by_txt");
goto err;
}
X509_set_subject_name(x509, name);
X509_set_issuer_name(x509, name);
if (!X509_sign(x509, pkey, EVP_sha256())) {
log_warnx("failed to sign the certificate");
ssl_error("X509_sign");
goto err;
}
if ((f = fopen(certpath, "w")) == NULL) {
log_warn("can't open %s", certpath);
goto err;
}
if (!PEM_write_X509(f, x509)) {
log_warnx("couldn't write cert");
ssl_error("PEM_write_X509");
goto err;
}
if (fflush(f) == EOF || fclose(f) == EOF) {
log_warn("failed to flush or close the private key");
goto err;
}
X509_free(x509);
EVP_PKEY_free(pkey);
log_info("Certificate for %s successfully generated", host);
return;
err:
(void) unlink(certpath);
(void) unlink(keypath);
exit(1);
}
X509_STORE *
load_ca(uint8_t *d, size_t len)
{
BIO *in;
X509 *x = NULL;
X509_STORE *store;
if ((store = X509_STORE_new()) == NULL) {
log_warnx("%s: X509_STORE_new failed", __func__);
return NULL;
}
if ((in = BIO_new_mem_buf(d, len)) == NULL) {
log_warnx("%s: BIO_new_mem_buf failed", __func__);
goto err;
}
if ((x = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL) {
log_warnx("%s: PEM_read_bio_X509 failed", __func__);
ssl_error("PEM_read_bio_X509");
goto err;
}
if (X509_check_ca(x) == 0) {
ssl_error("X509_check_ca");
goto err;
}
if (!X509_STORE_add_cert(store, x)) {
ssl_error("X509_STORE_add_cert");
goto err;
}
X509_free(x);
BIO_free(in);
return store;
err:
X509_STORE_free(store);
if (x != NULL)
X509_free(x);
if (in != NULL)
BIO_free(in);
return NULL;
}
int
validate_against_ca(X509_STORE *ca, const uint8_t *chain, size_t len)
{
X509 *client;
BIO *m;
X509_STORE_CTX *ctx = NULL;
int ret = 0;
if ((m = BIO_new_mem_buf(chain, len)) == NULL)
return 0;
if ((client = PEM_read_bio_X509(m, NULL, NULL, NULL)) == NULL)
goto end;
if ((ctx = X509_STORE_CTX_new()) == NULL)
goto end;
if (!X509_STORE_CTX_init(ctx, ca, client, NULL))
goto end;
ret = X509_verify_cert(ctx);
end:
BIO_free(m);
if (client != NULL)
X509_free(client);
if (ctx != NULL)
X509_STORE_CTX_free(ctx);
return ret;
}
void
ssl_error(const char *where)
{
unsigned long code;
char errbuf[128];
while ((code = ERR_get_error()) != 0) {
ERR_error_string_n(code, errbuf, sizeof(errbuf));
log_debug("debug: SSL library error: %s: %s", where, errbuf);
}
}
char *
ssl_pubkey_hash(const uint8_t *buf, size_t len)
{
static const char hex[] = "0123456789abcdef";
BIO *in;
X509 *x509 = NULL;
char *hash = NULL;
size_t off;
unsigned char digest[EVP_MAX_MD_SIZE];
unsigned int dlen, i;
if ((in = BIO_new_mem_buf(buf, len)) == NULL) {
log_warnx("%s: BIO_new_mem_buf failed", __func__);
return NULL;
}
if ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL) {
log_warnx("%s: PEM_read_bio_X509 failed", __func__);
ssl_error("PEM_read_bio_X509");
goto fail;
}
if ((hash = malloc(TLS_CERT_HASH_SIZE)) == NULL) {
log_warn("%s: malloc", __func__);
goto fail;
}
if (X509_pubkey_digest(x509, EVP_sha256(), digest, &dlen) != 1) {
log_warnx("%s: X509_pubkey_digest failed", __func__);
ssl_error("X509_pubkey_digest");
free(hash);
hash = NULL;
goto fail;
}
if (TLS_CERT_HASH_SIZE < 2 * dlen + sizeof("SHA256:"))
fatalx("%s: hash buffer too small", __func__);
off = strlcpy(hash, "SHA256:", TLS_CERT_HASH_SIZE);
for (i = 0; i < dlen; ++i) {
hash[off++] = hex[(digest[i] >> 4) & 0xf];
hash[off++] = hex[digest[i] & 0xf];
}
hash[off] = '\0';
fail:
BIO_free(in);
if (x509)
X509_free(x509);
return hash;
}
EVP_PKEY *
ssl_load_pkey(const uint8_t *buf, size_t len)
{
BIO *in;
EVP_PKEY *pkey;
if ((in = BIO_new_mem_buf(buf, len)) == NULL) {
log_warnx("%s: BIO_new_mem_buf failed", __func__);
return NULL;
}
if ((pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, NULL)) == NULL) {
log_warnx("%s: PEM_read_bio_PrivateKey failed", __func__);
ssl_error("PEM_read_bio_PrivateKey");
}
BIO_free(in);
return pkey;
}
struct vhost *
new_vhost(void)
{
struct vhost *h;
h = xcalloc(1, sizeof(*h));
TAILQ_INIT(&h->addrs);
TAILQ_INIT(&h->locations);
TAILQ_INIT(&h->aliases);
TAILQ_INIT(&h->proxies);
return h;
}
struct location *
new_location(void)
{
struct location *l;
l = xcalloc(1, sizeof(*l));
l->dirfd = -1;
l->fcgi = -1;
TAILQ_INIT(&l->params);
return l;
}
struct proxy *
new_proxy(void)
{
struct proxy *p;
p = xcalloc(1, sizeof(*p));
p->protocols = TLS_PROTOCOLS_DEFAULT;
return p;
}