1 package org.cacert.gigi.util;
3 import java.io.ByteArrayInputStream;
5 import java.io.FileInputStream;
6 import java.io.FileNotFoundException;
7 import java.io.FileOutputStream;
8 import java.io.IOException;
9 import java.io.InputStream;
10 import java.io.InputStreamReader;
11 import java.io.PrintWriter;
12 import java.io.Reader;
13 import java.math.BigInteger;
14 import java.nio.file.Paths;
15 import java.security.GeneralSecurityException;
16 import java.security.KeyFactory;
17 import java.security.KeyPair;
18 import java.security.KeyPairGenerator;
19 import java.security.NoSuchAlgorithmException;
20 import java.security.PrivateKey;
21 import java.security.PublicKey;
22 import java.security.Signature;
23 import java.security.cert.CertificateFactory;
24 import java.security.cert.X509Certificate;
25 import java.security.spec.InvalidKeySpecException;
26 import java.security.spec.PKCS8EncodedKeySpec;
27 import java.sql.SQLException;
28 import java.sql.Timestamp;
29 import java.text.ParseException;
30 import java.text.SimpleDateFormat;
31 import java.util.Arrays;
32 import java.util.Base64;
33 import java.util.Calendar;
34 import java.util.Date;
35 import java.util.HashMap;
36 import java.util.LinkedList;
37 import java.util.List;
39 import java.util.Map.Entry;
40 import java.util.Properties;
41 import java.util.TimeZone;
43 import javax.security.auth.x500.X500Principal;
45 import org.cacert.gigi.crypto.SPKAC;
46 import org.cacert.gigi.database.DatabaseConnection;
47 import org.cacert.gigi.database.GigiPreparedStatement;
48 import org.cacert.gigi.database.GigiResultSet;
49 import org.cacert.gigi.dbObjects.Certificate;
50 import org.cacert.gigi.dbObjects.Certificate.CSRType;
51 import org.cacert.gigi.dbObjects.Certificate.SANType;
52 import org.cacert.gigi.dbObjects.Certificate.SubjectAlternateName;
53 import org.cacert.gigi.dbObjects.CertificateProfile;
54 import org.cacert.gigi.dbObjects.Digest;
55 import org.cacert.gigi.output.DateSelector;
57 import sun.security.pkcs10.PKCS10;
58 import sun.security.util.DerOutputStream;
59 import sun.security.util.DerValue;
60 import sun.security.util.ObjectIdentifier;
61 import sun.security.x509.AVA;
62 import sun.security.x509.AlgorithmId;
63 import sun.security.x509.GeneralNameInterface;
64 import sun.security.x509.RDN;
65 import sun.security.x509.X500Name;
67 public class SimpleSigner {
69 private static GigiPreparedStatement warnMail;
71 private static GigiPreparedStatement updateMail;
73 private static GigiPreparedStatement readyCerts;
75 private static GigiPreparedStatement getSANSs;
77 private static GigiPreparedStatement revoke;
79 private static GigiPreparedStatement revokeCompleted;
81 private static GigiPreparedStatement finishJob;
83 private static GigiPreparedStatement locateCA;
85 private static volatile boolean running = true;
87 private static Thread runner;
89 private static SimpleDateFormat sdf = new SimpleDateFormat("yyMMddHHmmss'Z'");
92 TimeZone.setDefault(TimeZone.getTimeZone("UTC"));
93 sdf.setTimeZone(TimeZone.getTimeZone("UTC"));
96 public static void main(String[] args) throws IOException, SQLException, InterruptedException {
99 KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
100 kpg.initialize(2048);
101 KeyPair kp = kpg.generateKeyPair();
102 X500Principal xp = new X500Principal(genX500Name(Certificate.buildDN("CN", "uiae")).getEncoded());
103 byte[] i = generateCert(kp.getPublic(), kp.getPrivate(), Certificate.buildDN("CN", "uiae"), xp, Arrays.<SubjectAlternateName>asList(), new Date(), new Date(System.currentTimeMillis() + 1000 * 60 * 60), Digest.SHA512, "clientAuth");
104 System.out.println(Base64.getMimeEncoder().encodeToString(i));
105 } catch (GeneralSecurityException e) {
110 Properties p = new Properties();
111 try (Reader reader = new InputStreamReader(new FileInputStream("config/gigi.properties"), "UTF-8")) {
114 DatabaseConnection.init(p);
119 public static void stopSigner() throws InterruptedException {
120 Thread capturedRunner;
121 synchronized (SimpleSigner.class) {
122 if (runner == null) {
123 throw new IllegalStateException("already stopped");
125 capturedRunner = runner;
127 SimpleSigner.class.notifyAll();
129 capturedRunner.join();
132 public synchronized static void runSigner() throws SQLException, IOException, InterruptedException {
133 if (runner != null) {
134 throw new IllegalStateException("already running");
137 readyCerts = DatabaseConnection.getInstance().prepare("SELECT certs.id AS id, certs.csr_name, jobs.id AS jobid, csr_type, md, `executeFrom`, `executeTo`, profile FROM jobs " + //
138 "INNER JOIN certs ON certs.id=jobs.`targetId` " + //
139 "INNER JOIN profiles ON profiles.id=certs.profile " + //
140 "WHERE jobs.state='open' "//
141 + "AND task='sign'");
143 getSANSs = DatabaseConnection.getInstance().prepare("SELECT contents, type FROM `subjectAlternativeNames` " + //
146 updateMail = DatabaseConnection.getInstance().prepare("UPDATE certs SET crt_name=?," + " created=NOW(), serial=?, caid=? WHERE id=?");
147 warnMail = DatabaseConnection.getInstance().prepare("UPDATE jobs SET warning=warning+1, state=IF(warning<3, 'open','error') WHERE id=?");
149 revoke = DatabaseConnection.getInstance().prepare("SELECT certs.id, certs.csr_name,jobs.id FROM jobs INNER JOIN certs ON jobs.`targetId`=certs.id" + " WHERE jobs.state='open' AND task='revoke'");
150 revokeCompleted = DatabaseConnection.getInstance().prepare("UPDATE certs SET revoked=NOW() WHERE id=?");
152 finishJob = DatabaseConnection.getInstance().prepare("UPDATE jobs SET state='done' WHERE id=?");
154 locateCA = DatabaseConnection.getInstance().prepare("SELECT id FROM cacerts WHERE keyname=?");
156 runner = new Thread() {
167 private synchronized static void work() {
170 } catch (IOException e2) {
171 e2.printStackTrace();
172 } catch (InterruptedException e2) {
173 e2.printStackTrace();
179 revokeCertificates();
181 SimpleSigner.class.wait(5000);
182 } catch (IOException e) {
184 } catch (SQLException e) {
186 } catch (InterruptedException e1) {
192 private static void revokeCertificates() throws SQLException, IOException, InterruptedException {
193 GigiResultSet rs = revoke.executeQuery();
194 boolean worked = false;
196 int id = rs.getInt(1);
197 File crt = KeyStorage.locateCrt(id);
199 revokeCompleted.setInt(1, id);
200 revokeCompleted.execute();
201 finishJob.setInt(1, rs.getInt(3));
209 private static void gencrl() throws IOException, InterruptedException {
213 String[] call = new String[] {
216 "../unassured.crt",//
218 "../unassured.key",//
223 "../unassured.crl",//
228 Process p1 = Runtime.getRuntime().exec(call, null, new File("keys/unassured.ca"));
229 if (p1.waitFor() != 0) {
230 System.out.println("Error while generating crl.");
234 private static int counter = 0;
236 private static void signCertificates() throws SQLException {
237 GigiResultSet rs = readyCerts.executeQuery();
239 Calendar c = Calendar.getInstance();
240 c.setTimeZone(TimeZone.getTimeZone("UTC"));
242 String csrname = rs.getString("csr_name");
243 int id = rs.getInt("id");
244 System.out.println("sign: " + csrname);
246 String csrType = rs.getString("csr_type");
247 CSRType ct = CSRType.valueOf(csrType);
248 File crt = KeyStorage.locateCrt(id);
250 Timestamp from = rs.getTimestamp("executeFrom");
251 String length = rs.getString("executeTo");
255 fromDate = new Date(System.currentTimeMillis());
257 fromDate = new Date(from.getTime());
259 if (length.endsWith("m") || length.endsWith("y")) {
260 String num = length.substring(0, length.length() - 1);
261 int inter = Integer.parseInt(num);
263 if (length.endsWith("m")) {
264 c.add(Calendar.MONTH, inter);
266 c.add(Calendar.YEAR, inter);
268 toDate = c.getTime();
270 toDate = DateSelector.getDateFormat().parse(length);
273 getSANSs.setInt(1, id);
274 GigiResultSet san = getSANSs.executeQuery();
276 boolean first = true;
277 LinkedList<SubjectAlternateName> altnames = new LinkedList<>();
280 altnames.add(new SubjectAlternateName(SANType.valueOf(san.getString("type").toUpperCase()), san.getString("contents")));
282 // TODO look them up!
283 // cfg.println("keyUsage=critical," +
284 // "digitalSignature, keyEncipherment, keyAgreement");
285 // cfg.println("extendedKeyUsage=critical," + "clientAuth");
288 int profile = rs.getInt("profile");
289 CertificateProfile cp = CertificateProfile.getById(profile);
290 String s = cp.getId() + "";
291 while (s.length() < 4) {
294 s += "-" + cp.getKeyName() + ".cfg";
295 Properties caP = new Properties();
296 caP.load(new FileInputStream("signer/profiles/" + s));
297 String ca = caP.getProperty("ca") + "_2015_1";
299 HashMap<String, String> subj = new HashMap<>();
300 GigiPreparedStatement ps = DatabaseConnection.getInstance().prepare("SELECT name, value FROM `certAvas` WHERE `certId`=?");
301 ps.setInt(1, rs.getInt("id"));
302 GigiResultSet rs2 = ps.executeQuery();
304 String name = rs2.getString("name");
305 if (name.equals("EMAIL")) {
306 name = "emailAddress";
308 subj.put(name, rs2.getString("value"));
310 if (subj.size() == 0) {
311 subj.put("CN", "<empty>");
312 System.out.println("WARNING: DN was empty");
314 System.out.println(subj);
317 byte[] data = IOUtils.readURL(new FileInputStream(csrname));
318 if (ct == CSRType.SPKAC) {
319 String dt = new String(data);
320 if (dt.startsWith("SPKAC=")) {
321 dt = dt.substring(6);
322 data = dt.getBytes();
323 System.out.println(dt);
325 SPKAC sp = new SPKAC(Base64.getDecoder().decode(data));
328 PKCS10 p10 = new PKCS10(PEM.decode("(NEW )?CERTIFICATE REQUEST", new String(data)));
329 pk = p10.getSubjectPublicKeyInfo();
331 PrivateKey i = loadOpensslKey(new File("signer/ca/" + ca + "/ca.key"));
334 X509Certificate root = (X509Certificate) CertificateFactory.getInstance("X509").generateCertificate(new FileInputStream("signer/ca/" + ca + "/ca.crt"));
335 byte[] cert = generateCert(pk, i, subj, root.getSubjectX500Principal(), altnames, fromDate, toDate, Digest.valueOf(rs.getString("md").toUpperCase()), caP.getProperty("eku"));
336 PrintWriter out = new PrintWriter(crt);
337 out.println("-----BEGIN CERTIFICATE-----");
338 out.println(Base64.getMimeEncoder().encodeToString(cert));
339 out.println("-----END CERTIFICATE-----");
343 * call = new String[] { "openssl", "ca",// "-in", "../../"
344 * + csrname,// "-cert", "../" + ca + ".crt",// "-keyfile",
345 * "../" + ca + ".key",// "-out", "../../" +
346 * crt.getPath(),// "-utf8", "-startdate",
347 * sdf.format(fromDate),// "-enddate", sdf.format(toDate),//
348 * "-batch",// "-md", rs.getString("md"),// "-extfile",
349 * "../" + f.getName(),// "-subj",
350 * Certificate.stringifyDN(subj),// "-config",
351 * "../selfsign.config"// };
355 try (InputStream is = new FileInputStream(crt)) {
356 locateCA.setString(1, ca);
357 GigiResultSet caRs = locateCA.executeQuery();
359 throw new Error("ca " + ca + " was not found");
362 CertificateFactory cf = CertificateFactory.getInstance("X.509");
363 X509Certificate crtp = (X509Certificate) cf.generateCertificate(is);
364 BigInteger serial = crtp.getSerialNumber();
365 updateMail.setString(1, crt.getPath());
366 updateMail.setString(2, serial.toString(16));
367 updateMail.setInt(3, caRs.getInt("id"));
368 updateMail.setInt(4, id);
369 updateMail.execute();
371 finishJob.setInt(1, rs.getInt("jobid"));
373 System.out.println("signed: " + id);
377 } catch (GeneralSecurityException e) {
379 } catch (IOException e) {
381 } catch (ParseException e) {
384 System.out.println("Error with: " + id);
385 warnMail.setInt(1, rs.getInt("jobid"));
392 private static PrivateKey loadOpensslKey(File f) throws FileNotFoundException, IOException, InvalidKeySpecException, NoSuchAlgorithmException {
393 byte[] p8b = PEM.decode("RSA PRIVATE KEY", new String(IOUtils.readURL(new FileInputStream(f))));
394 DerOutputStream dos = new DerOutputStream();
396 new AlgorithmId(new ObjectIdentifier(new int[] {
397 1, 2, 840, 113549, 1, 1, 1
399 dos.putOctetString(p8b);
400 byte[] ctx = dos.toByteArray();
402 dos.write(DerValue.tag_Sequence, ctx);
403 PKCS8EncodedKeySpec p8 = new PKCS8EncodedKeySpec(dos.toByteArray());
404 PrivateKey i = KeyFactory.getInstance("RSA").generatePrivate(p8);
408 private static synchronized byte[] generateCert(PublicKey pk, PrivateKey prk, Map<String, String> subj, X500Principal issuer, List<SubjectAlternateName> altnames, Date fromDate, Date toDate, Digest digest, String eku) throws IOException, GeneralSecurityException {
409 File f = Paths.get("signer", "serial").toFile();
411 FileOutputStream fos = new FileOutputStream(f);
412 fos.write("1".getBytes());
415 try (FileInputStream fr = new FileInputStream(f)) {
416 byte[] serial = IOUtils.readURL(fr);
417 BigInteger ser = new BigInteger(new String(serial).trim());
418 ser = ser.add(BigInteger.ONE);
420 PrintWriter pw = new PrintWriter(f);
423 if (digest != Digest.SHA256 && digest != Digest.SHA512) {
424 System.err.println("assuming sha256 either way ;-): " + digest);
425 digest = Digest.SHA256;
427 ObjectIdentifier sha512withrsa = new ObjectIdentifier(new int[] {
428 1, 2, 840, 113549, 1, 1, digest == Digest.SHA256 ? 11 : 13
430 AlgorithmId aid = new AlgorithmId(sha512withrsa);
431 Signature s = Signature.getInstance(digest == Digest.SHA256 ? "SHA256withRSA" : "SHA512withRSA");
433 DerOutputStream cert = new DerOutputStream();
434 DerOutputStream content = new DerOutputStream();
436 DerOutputStream version = new DerOutputStream();
437 version.putInteger(2); // v3
438 content.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte) 0), version);
440 content.putInteger(ser); // Serial
444 content.write(issuer.getEncoded());
447 DerOutputStream notAround = new DerOutputStream();
448 notAround.putUTCTime(fromDate);
449 notAround.putUTCTime(toDate);
450 content.write(DerValue.tag_Sequence, notAround);
454 X500Name xn = genX500Name(subj);
455 content.write(xn.getEncoded());
458 content.write(pk.getEncoded());
461 DerOutputStream extensions = new DerOutputStream();
463 addExtension(extensions, new ObjectIdentifier(new int[] {
465 }), generateSAN(altnames));
466 addExtension(extensions, new ObjectIdentifier(new int[] {
469 addExtension(extensions, new ObjectIdentifier(new int[] {
471 }), generateEKU(eku));
473 DerOutputStream extensionsSeq = new DerOutputStream();
474 extensionsSeq.write(DerValue.tag_Sequence, extensions);
475 content.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte) 3), extensionsSeq);
478 DerOutputStream contentSeq = new DerOutputStream();
480 contentSeq.write(DerValue.tag_Sequence, content.toByteArray());
483 s.update(contentSeq.toByteArray());
485 aid.encode(contentSeq);
486 contentSeq.putBitString(s.sign());
487 cert.write(DerValue.tag_Sequence, contentSeq);
489 X509Certificate c = (X509Certificate) CertificateFactory.getInstance("X509").generateCertificate(new ByteArrayInputStream(cert.toByteArray()));
490 // c.verify(pk); only for self-signeds
492 return cert.toByteArray();
497 private static byte[] generateKU() throws IOException {
498 DerOutputStream dos = new DerOutputStream();
499 dos.putBitString(new byte[] {
502 return dos.toByteArray();
505 private static byte[] generateEKU(String eku) throws IOException {
507 DerOutputStream dos = new DerOutputStream();
508 for (String name : eku.split(",")) {
509 ObjectIdentifier oid;
512 oid = new ObjectIdentifier("1.3.6.1.5.5.7.3.1");
515 oid = new ObjectIdentifier("1.3.6.1.5.5.7.3.2");
518 oid = new ObjectIdentifier("1.3.6.1.5.5.7.3.3");
520 case "emailProtection":
521 oid = new ObjectIdentifier("1.3.6.1.5.5.7.3.4");
525 throw new Error(name);
529 byte[] data = dos.toByteArray();
531 dos.write(DerValue.tag_Sequence, data);
532 return dos.toByteArray();
535 private static X500Name genX500Name(Map<String, String> subj) throws IOException {
536 LinkedList<RDN> rdns = new LinkedList<>();
537 for (Entry<String, String> i : subj.entrySet()) {
541 return new X500Name(rdns.toArray(new RDN[rdns.size()]));
544 private static RDN genRDN(Entry<String, String> i) throws IOException {
545 DerOutputStream dos = new DerOutputStream();
546 dos.putUTF8String(i.getValue());
548 String key = i.getKey();
558 1, 2, 840, 113549, 1, 9, 1
572 throw new Error("unknown RDN-type: " + key);
574 RDN rdn = new RDN(new AVA(new ObjectIdentifier(oid), new DerValue(dos.toByteArray())));
578 private static void addExtension(DerOutputStream extensions, ObjectIdentifier oid, byte[] extContent) throws IOException {
579 DerOutputStream SANs = new DerOutputStream();
581 SANs.putOctetString(extContent);
583 extensions.write(DerValue.tag_Sequence, SANs);
586 private static byte[] generateSAN(List<SubjectAlternateName> altnames) throws IOException {
587 DerOutputStream SANContent = new DerOutputStream();
588 for (SubjectAlternateName san : altnames) {
590 if (san.getType() == SANType.DNS) {
591 type = (byte) GeneralNameInterface.NAME_DNS;
592 } else if (san.getType() == SANType.EMAIL) {
593 type = (byte) GeneralNameInterface.NAME_RFC822;
595 throw new Error("" + san.getType());
597 SANContent.write(DerValue.createTag(DerValue.TAG_CONTEXT, false, type), san.getName().getBytes());
599 DerOutputStream SANSeqContent = new DerOutputStream();
600 SANSeqContent.write(DerValue.tag_Sequence, SANContent);
601 byte[] byteArray = SANSeqContent.toByteArray();