]> WPIA git - gigi.git/blob - tests/org/cacert/gigi/pages/account/TestCertificateAdd.java
Update notes about password security
[gigi.git] / tests / org / cacert / gigi / pages / account / TestCertificateAdd.java
1 package org.cacert.gigi.pages.account;
2
3 import static org.hamcrest.CoreMatchers.*;
4 import static org.junit.Assert.*;
5
6 import java.io.ByteArrayInputStream;
7 import java.io.IOException;
8 import java.io.InputStreamReader;
9 import java.io.OutputStream;
10 import java.io.UnsupportedEncodingException;
11 import java.net.HttpURLConnection;
12 import java.net.MalformedURLException;
13 import java.net.URL;
14 import java.net.URLConnection;
15 import java.net.URLEncoder;
16 import java.security.GeneralSecurityException;
17 import java.security.KeyPair;
18 import java.security.Signature;
19 import java.security.cert.Certificate;
20 import java.security.cert.CertificateException;
21 import java.security.cert.CertificateFactory;
22 import java.security.cert.X509Certificate;
23 import java.text.SimpleDateFormat;
24 import java.util.Arrays;
25 import java.util.Base64;
26 import java.util.Calendar;
27 import java.util.Date;
28 import java.util.TimeZone;
29 import java.util.Vector;
30 import java.util.regex.Matcher;
31 import java.util.regex.Pattern;
32
33 import org.cacert.gigi.crypto.SPKAC;
34 import org.cacert.gigi.dbObjects.Digest;
35 import org.cacert.gigi.pages.account.certs.CertificateAdd;
36 import org.cacert.gigi.pages.account.certs.CertificateRequest;
37 import org.cacert.gigi.testUtils.ClientTest;
38 import org.cacert.gigi.testUtils.IOUtils;
39 import org.cacert.gigi.util.PEM;
40 import org.junit.Test;
41
42 import sun.security.pkcs.PKCS7;
43 import sun.security.pkcs.PKCS9Attribute;
44 import sun.security.pkcs10.PKCS10Attribute;
45 import sun.security.pkcs10.PKCS10Attributes;
46 import sun.security.util.ObjectIdentifier;
47 import sun.security.x509.CertificateExtensions;
48 import sun.security.x509.DNSName;
49 import sun.security.x509.ExtendedKeyUsageExtension;
50 import sun.security.x509.GeneralName;
51 import sun.security.x509.GeneralNameInterface;
52 import sun.security.x509.GeneralNames;
53 import sun.security.x509.RFC822Name;
54 import sun.security.x509.SubjectAlternativeNameExtension;
55 import sun.security.x509.X509Key;
56
57 public class TestCertificateAdd extends ClientTest {
58
59     KeyPair kp = generateKeypair();
60
61     String csrf;
62
63     public TestCertificateAdd() throws GeneralSecurityException, IOException {
64         TestDomain.addDomain(cookie, uniq + ".tld");
65
66     }
67
68     @Test
69     public void testSimpleServer() throws IOException, GeneralSecurityException {
70         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
71             CertificateRequest.OID_KEY_USAGE_SSL_SERVER
72         }, new DNSName(uniq + ".tld"));
73
74         String pem = generatePEMCSR(kp, "CN=a." + uniq + ".tld", atts);
75
76         String[] res = fillOutForm("CSR=" + URLEncoder.encode(pem, "UTF-8"));
77         assertArrayEquals(new String[] {
78                 "server", "CAcert WoT User", "dns:a." + uniq + ".tld\ndns:" + uniq + ".tld\n", Digest.SHA256.toString()
79         }, res);
80     }
81
82     @Test
83     public void testSimpleMail() throws IOException, GeneralSecurityException {
84         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
85             CertificateRequest.OID_KEY_USAGE_EMAIL_PROTECTION
86         }, new DNSName("a." + uniq + ".tld"), new DNSName("b." + uniq + ".tld"), new RFC822Name(email));
87
88         String pem = generatePEMCSR(kp, "CN=a b", atts, "SHA384WithRSA");
89
90         String[] res = fillOutForm("CSR=" + URLEncoder.encode(pem, "UTF-8"));
91         assertArrayEquals(new String[] {
92                 "mail", "a b", "email:" + email + "\ndns:a." + uniq + ".tld\ndns:b." + uniq + ".tld\n", Digest.SHA384.toString()
93         }, res);
94     }
95
96     @Test
97     public void testSimpleClient() throws IOException, GeneralSecurityException {
98         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
99             CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
100         }, new RFC822Name(email));
101
102         String pem = generatePEMCSR(kp, "CN=a b,email=" + email, atts, "SHA512WithRSA");
103
104         String[] res = fillOutForm("CSR=" + URLEncoder.encode(pem, "UTF-8"));
105         assertArrayEquals(new String[] {
106                 "client", "a b", "email:" + email + "\n", Digest.SHA512.toString()
107         }, res);
108     }
109
110     @Test
111     public void testSPKAC() throws GeneralSecurityException, IOException {
112         testSPKAC(false);
113         testSPKAC(true);
114     }
115
116     @Test
117     public void testIssue() throws IOException, GeneralSecurityException {
118         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
119             CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
120         }, new RFC822Name(email));
121
122         String pem = generatePEMCSR(kp, "CN=a b,email=" + email, atts, "SHA512WithRSA");
123
124         String[] res = fillOutForm("CSR=" + URLEncoder.encode(pem, "UTF-8"));
125         assertArrayEquals(new String[] {
126                 "client", "a b", "email:" + email + "\n", Digest.SHA512.toString()
127         }, res);
128
129         HttpURLConnection huc = (HttpURLConnection) ncert.openConnection();
130         huc.setRequestProperty("Cookie", cookie);
131         huc.setDoOutput(true);
132         OutputStream out = huc.getOutputStream();
133         out.write(("csrf=" + URLEncoder.encode(csrf, "UTF-8")).getBytes("UTF-8"));
134         out.write(("&CN=CAcert+WoT+User&profile=client&SANs=" + URLEncoder.encode("email:" + email + "\n", "UTF-8")).getBytes("UTF-8"));
135         out.write(("&hash_alg=SHA512&tos_agree=y").getBytes("UTF-8"));
136         URLConnection uc = authenticate(new URL(huc.getHeaderField("Location") + ".crt"));
137         String crt = IOUtils.readURL(new InputStreamReader(uc.getInputStream(), "UTF-8"));
138
139         uc = authenticate(new URL(huc.getHeaderField("Location") + ".cer"));
140         byte[] cer = IOUtils.readURL(uc.getInputStream());
141         assertArrayEquals(cer, PEM.decode("CERTIFICATE", crt));
142
143         uc = authenticate(new URL(huc.getHeaderField("Location") + ".cer?install&chain"));
144         byte[] pkcs7 = IOUtils.readURL(uc.getInputStream());
145         PKCS7 p7 = new PKCS7(pkcs7);
146         byte[] sub = verifyChain(p7.getCertificates());
147         assertArrayEquals(cer, sub);
148         assertEquals("application/x-x509-user-cert", uc.getHeaderField("Content-type"));
149
150         uc = authenticate(new URL(huc.getHeaderField("Location")));
151         String gui = IOUtils.readURL(uc);
152         Pattern p = Pattern.compile("-----BEGIN CERTIFICATE-----[^-]+-----END CERTIFICATE-----");
153         Matcher m = p.matcher(gui);
154         assertTrue(m.find());
155         byte[] cert = PEM.decode("CERTIFICATE", m.group(0));
156         Certificate c = CertificateFactory.getInstance("X509").generateCertificate(new ByteArrayInputStream(cert));
157         gui = c.toString();
158         assertThat(gui, containsString("clientAuth"));
159         assertThat(gui, containsString("CN=CAcert WoT User"));
160         assertThat(gui, containsString("SHA512withRSA"));
161         assertThat(gui, containsString("RFC822Name: " + email));
162
163     }
164
165     private byte[] verifyChain(X509Certificate[] x509Certificates) throws GeneralSecurityException {
166         X509Certificate current = null;
167         nextCert:
168         while (true) {
169             for (int i = 0; i < x509Certificates.length; i++) {
170                 X509Certificate cert = x509Certificates[i];
171                 if (current == null) {
172                     if (cert.getSubjectX500Principal().equals(cert.getIssuerX500Principal())) {
173                         current = cert;
174                         continue nextCert;
175                     }
176                 } else {
177                     if (cert.getSubjectX500Principal().equals(cert.getIssuerX500Principal())) {
178                         continue;
179                     }
180                     if (current.getSubjectX500Principal().equals(cert.getIssuerX500Principal())) {
181                         Signature s = Signature.getInstance(cert.getSigAlgName());
182                         s.initVerify(current.getPublicKey());
183                         s.update(cert.getTBSCertificate());
184                         assertTrue(s.verify(cert.getSignature()));
185                         current = cert;
186                         continue nextCert;
187                     }
188                 }
189             }
190             assertNotNull(current);
191             return current.getEncoded();
192         }
193     }
194
195     @Test
196     public void testValidityPeriodCalendar() throws IOException, GeneralSecurityException {
197         testCertificateValidityRelative(Calendar.YEAR, 2, "2y", true);
198         testCertificateValidityRelative(Calendar.YEAR, 1, "1y", true);
199         testCertificateValidityRelative(Calendar.MONTH, 3, "3m", true);
200         testCertificateValidityRelative(Calendar.MONTH, 7, "7m", true);
201         testCertificateValidityRelative(Calendar.MONTH, 13, "13m", true);
202
203         testCertificateValidityRelative(Calendar.MONTH, 13, "-1m", false);
204     }
205
206     @Test
207     public void testValidityPeriodWhishStart() throws IOException, GeneralSecurityException {
208         long now = System.currentTimeMillis();
209         final long MS_PER_DAY = 24 * 60 * 60 * 1000;
210         now -= now % MS_PER_DAY;
211         now += MS_PER_DAY;
212         SimpleDateFormat sdf = new SimpleDateFormat("yyyy-MM-dd");
213         sdf.setTimeZone(TimeZone.getTimeZone("UTC"));
214
215         Date start = new Date(now);
216         Date end = new Date(now + MS_PER_DAY * 10);
217         String validity = "&validFrom=" + sdf.format(start) + "&validity=" + sdf.format(end);
218         X509Certificate res = createCertWithValidity(validity);
219         assertNotNull(validity, res);
220         assertEquals(start, res.getNotBefore());
221         assertEquals(end, res.getNotAfter());
222     }
223
224     private void testCertificateValidityRelative(int field, int amount, String length, boolean shouldsucceed) throws IOException, GeneralSecurityException, UnsupportedEncodingException, MalformedURLException, CertificateException {
225         X509Certificate parsed = createCertWithValidity("&validFrom=now&validity=" + length);
226         if (parsed == null) {
227             assertTrue( !shouldsucceed);
228             return;
229         } else {
230             assertTrue(shouldsucceed);
231         }
232
233         long now = System.currentTimeMillis();
234         Date start = parsed.getNotBefore();
235         Date end = parsed.getNotAfter();
236         Calendar c = Calendar.getInstance();
237         c.setTimeZone(TimeZone.getTimeZone("UTC"));
238         c.setTime(start);
239         c.add(field, amount);
240         assertTrue(Math.abs(start.getTime() - now) < 10000);
241         assertEquals(c.getTime(), end);
242     }
243
244     private X509Certificate createCertWithValidity(String validity) throws IOException, GeneralSecurityException, UnsupportedEncodingException, MalformedURLException, CertificateException {
245         PKCS10Attributes atts = buildAtts(new ObjectIdentifier[] {
246             CertificateRequest.OID_KEY_USAGE_SSL_CLIENT
247         }, new RFC822Name(email));
248
249         String pem = generatePEMCSR(kp, "CN=a b", atts, "SHA512WithRSA");
250         fillOutForm("CSR=" + URLEncoder.encode(pem, "UTF-8"));
251
252         HttpURLConnection huc = (HttpURLConnection) ncert.openConnection();
253         huc.setRequestProperty("Cookie", cookie);
254         huc.setDoOutput(true);
255         OutputStream out = huc.getOutputStream();
256         out.write(("csrf=" + URLEncoder.encode(csrf, "UTF-8")).getBytes("UTF-8"));
257         out.write(("&profile=client&CN=" + CertificateRequest.DEFAULT_CN + "&SANs=" + URLEncoder.encode("email:" + email + "\n", "UTF-8")).getBytes("UTF-8"));
258         out.write(("&hash_alg=SHA512&tos_agree=y&").getBytes("UTF-8"));
259         out.write(validity.getBytes("UTF-8"));
260
261         String certurl = huc.getHeaderField("Location");
262         if (certurl == null) {
263             return null;
264         }
265         URLConnection uc = authenticate(new URL(certurl + ".crt"));
266         String crt = IOUtils.readURL(new InputStreamReader(uc.getInputStream(), "UTF-8"));
267
268         CertificateFactory cf = CertificateFactory.getInstance("X.509");
269         X509Certificate parsed = (X509Certificate) cf.generateCertificate(new ByteArrayInputStream(crt.getBytes("UTF-8")));
270         return parsed;
271     }
272
273     private URLConnection authenticate(URL url) throws IOException {
274         URLConnection uc = url.openConnection();
275         uc.setRequestProperty("Cookie", cookie);
276         return uc;
277     }
278
279     protected String testSPKAC(boolean correctChallange) throws GeneralSecurityException, IOException {
280         HttpURLConnection uc = (HttpURLConnection) ncert.openConnection();
281         uc.setRequestProperty("Cookie", cookie);
282         String s = IOUtils.readURL(uc);
283
284         csrf = extractPattern(s, Pattern.compile("<input [^>]*name='csrf' [^>]*value='([^']*)'>"));
285         String challenge = extractPattern(s, Pattern.compile("<keygen [^>]*name=\"SPKAC\" [^>]*challenge=\"([^\"]*)\"/>"));
286
287         SPKAC spk = new SPKAC((X509Key) kp.getPublic(), challenge + (correctChallange ? "" : "b"));
288         Signature sign = Signature.getInstance("SHA512WithRSA");
289         sign.initSign(kp.getPrivate());
290         try {
291             String[] res = fillOutFormDirect("SPKAC=" + URLEncoder.encode(Base64.getEncoder().encodeToString(spk.getEncoded(sign)), "UTF-8"));
292             if ( !correctChallange) {
293                 fail("Should not succeed with wrong challange.");
294             }
295             assertArrayEquals(new String[] {
296                     "client", CertificateRequest.DEFAULT_CN, "", Digest.SHA512.toString()
297             }, res);
298         } catch (Error e) {
299             assertTrue(e.getMessage().startsWith("<div>Challenge mismatch"));
300         }
301         return csrf;
302     }
303
304     private PKCS10Attributes buildAtts(ObjectIdentifier[] ekuOIDs, GeneralNameInterface... SANs) throws IOException {
305         CertificateExtensions attributeValue = new CertificateExtensions();
306         GeneralNames names = new GeneralNames();
307
308         for (GeneralNameInterface name : SANs) {
309             names.add(new GeneralName(name));
310         }
311         attributeValue.set("SANs", new SubjectAlternativeNameExtension(names));
312         PKCS10Attributes atts = new PKCS10Attributes(new PKCS10Attribute[] {
313             new PKCS10Attribute(PKCS9Attribute.EXTENSION_REQUEST_OID, attributeValue)
314         });
315         ExtendedKeyUsageExtension eku = new ExtendedKeyUsageExtension(//
316                 new Vector<>(Arrays.<ObjectIdentifier>asList(ekuOIDs)));
317         attributeValue.set("eku", eku);
318         return atts;
319     }
320
321     private final URL ncert = new URL("https://" + getServerName() + CertificateAdd.PATH);
322
323     private String[] fillOutForm(String pem) throws IOException {
324         HttpURLConnection uc = (HttpURLConnection) ncert.openConnection();
325         uc.setRequestProperty("Cookie", cookie);
326         csrf = getCSRF(uc);
327         return fillOutFormDirect(pem);
328
329     }
330
331     private String[] fillOutFormDirect(String pem) throws IOException {
332
333         HttpURLConnection uc = (HttpURLConnection) ncert.openConnection();
334         uc.setRequestProperty("Cookie", cookie);
335         uc.setDoOutput(true);
336         uc.getOutputStream().write(("csrf=" + URLEncoder.encode(csrf, "UTF-8") + "&" + pem).getBytes("UTF-8"));
337         uc.getOutputStream().flush();
338
339         return extractFormData(uc);
340     }
341
342     private String[] extractFormData(HttpURLConnection uc) throws IOException, Error {
343         String result = IOUtils.readURL(uc);
344         if (result.contains("<div class='formError'>")) {
345             String s = fetchStartErrorMessage(result);
346             throw new Error(s);
347         }
348
349         String profileKey = extractPattern(result, Pattern.compile("<option value=\"([^\"]*)\" selected>"));
350         String resultingCN = extractPattern(result, Pattern.compile("<input [^>]*name='CN' [^>]*value='([^']*)'/>"));
351         String txt = extractPattern(result, Pattern.compile("<textarea [^>]*name='SANs' [^>]*>([^<]*)</textarea>"));
352         String md = extractPattern(result, Pattern.compile("<input type=\"radio\" [^>]*name=\"hash_alg\" value=\"([^\"]*)\" checked='checked'/>"));
353         return new String[] {
354                 profileKey, resultingCN, txt, md
355         };
356     }
357
358     private String extractPattern(String result, Pattern p) {
359         Matcher m = p.matcher(result);
360         assertTrue(m.find());
361         String resultingCN = m.group(1);
362         return resultingCN;
363     }
364 }