2017-08-28 19:27:45 +03:00
/ * *
* @ description Certificate generator
* @ author Joko Sastriawan / Ylian Saint - Hilaire
2021-01-10 01:31:09 +03:00
* @ copyright Intel Corporation 2018 - 2021
2018-01-04 23:15:21 +03:00
* @ license Apache - 2.0
2017-08-28 19:27:45 +03:00
* @ version v0 . 0.1
* /
2018-01-04 23:15:21 +03:00
2018-08-30 03:40:30 +03:00
/*xjslint node: true */
/*xjslint plusplus: true */
/*xjslint maxlen: 256 */
/*jshint node: true */
/*jshint strict: false */
/*jshint esversion: 6 */
"use strict" ;
2018-08-27 22:24:15 +03:00
2019-02-03 01:54:36 +03:00
module . exports . CertificateOperations = function ( parent ) {
2017-08-28 19:27:45 +03:00
var obj = { } ;
2019-02-03 01:54:36 +03:00
obj . parent = parent ;
2019-12-01 23:52:32 +03:00
obj . fs = require ( 'fs' ) ;
obj . forge = require ( 'node-forge' ) ;
obj . crypto = require ( 'crypto' ) ;
2018-11-01 02:03:09 +03:00
obj . tls = require ( 'tls' ) ;
2017-08-28 19:27:45 +03:00
obj . pki = obj . forge . pki ;
2018-08-30 03:40:30 +03:00
obj . dirExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isDirectory ( ) ; } catch ( err ) { return false ; } } ;
obj . getFilesizeInBytes = function ( filename ) { try { return obj . fs . statSync ( filename ) . size ; } catch ( err ) { return - 1 ; } } ;
2017-08-28 19:27:45 +03:00
2019-06-20 03:16:50 +03:00
const TopLevelDomainExtendedSupport = { 'net' : 2 , 'com' : 2 , 'arpa' : 3 , 'org' : 2 , 'gov' : 2 , 'edu' : 2 , 'de' : 2 , 'fr' : 3 , 'cn' : 3 , 'nl' : 3 , 'br' : 3 , 'mx' : 3 , 'uk' : 3 , 'pl' : 3 , 'tw' : 3 , 'ca' : 3 , 'fi' : 3 , 'be' : 3 , 'ru' : 3 , 'se' : 3 , 'ch' : 2 , 'dk' : 2 , 'ar' : 3 , 'es' : 3 , 'no' : 3 , 'at' : 3 , 'in' : 3 , 'tr' : 3 , 'cz' : 2 , 'ro' : 3 , 'hu' : 3 , 'nz' : 3 , 'pt' : 3 , 'il' : 3 , 'gr' : 3 , 'co' : 3 , 'ie' : 3 , 'za' : 3 , 'th' : 3 , 'sg' : 3 , 'hk' : 3 , 'cl' : 2 , 'lt' : 3 , 'id' : 3 , 'hr' : 3 , 'ee' : 3 , 'bg' : 3 , 'ua' : 2 } ;
2021-03-04 10:49:53 +03:00
// Sign a Intel AMT TLS ACM activation request
obj . getAcmCertChain = function ( domain , fqdn , hash ) {
if ( ( domain == null ) || ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . certs == null ) || ( fqdn == null ) || ( hash == null ) ) return { action : 'acmactivate' , error : 1 , errorText : 'Invalid arguments' } ;
if ( parent . common . validateString ( fqdn , 4 , 256 ) == false ) return { action : 'acmactivate' , error : 1 , errorText : "Invalid FQDN argument." } ;
if ( parent . common . validateString ( hash , 16 , 256 ) == false ) return { action : 'acmactivate' , error : 1 , errorText : "Invalid hash argument." } ;
// Look for the signing certificate
var signkey = null , certChain = null , hashAlgo = null , certIndex = null ;
for ( var i in domain . amtacmactivation . certs ) {
const certEntry = domain . amtacmactivation . certs [ i ] ;
if ( ( certEntry . sha256 == hash ) && ( ( certEntry . cn == '*' ) || ( certEntry . cn == fqdn ) ) ) { hashAlgo = 'sha256' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
if ( ( certEntry . sha1 == hash ) && ( ( certEntry . cn == '*' ) || ( certEntry . cn == fqdn ) ) ) { hashAlgo = 'sha1' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
}
if ( signkey == null ) return { action : 'acmactivate' , error : 2 , errorText : "No signing certificate found." } ; // Did not find a match.
// If the matching certificate our wildcard root cert, we can use the root to match any FQDN
if ( domain . amtacmactivation . certs [ certIndex ] . cn == '*' ) {
// Create a leaf certificate that matches the FQDN we want
// TODO: This is an expensive operation, work on ways to pre-generate or cache this leaf certificate.
var rootcert = { cert : domain . amtacmactivation . certs [ certIndex ] . rootcert , key : obj . pki . privateKeyFromPem ( domain . amtacmactivation . certs [ certIndex ] . key ) } ;
var leafcert = obj . IssueWebServerCertificate ( rootcert , false , fqdn , 'mc' , 'Intel(R) Client Setup Certificate' , { serverAuth : true , '2.16.840.1.113741.1.2.3' : true } , false ) ;
// Setup the certificate chain and key
2021-03-04 12:54:04 +03:00
//certChain = [ obj.pki.certificateToPem(leafcert.cert), obj.pki.certificateToPem(domain.amtacmactivation.certs[certIndex].rootcert) ];
certChain = [ obj . pki . certificateToPem ( domain . amtacmactivation . certs [ certIndex ] . rootcert ) , obj . pki . certificateToPem ( leafcert . cert ) ] ;
2021-03-04 10:49:53 +03:00
signkey = obj . pki . privateKeyToPem ( leafcert . key ) ;
} else {
// Make sure the cert chain is in PEM format
var certChain2 = [ ] ;
for ( var i in certChain ) { certChain2 . push ( "-----BEGIN CERTIFICATE-----\r\n" + certChain [ i ] + "\r\n-----END CERTIFICATE-----\r\n" ) ; }
certChain = certChain2 ;
}
// Hash the leaf certificate and return the certificate chain and signing key
2021-03-04 12:54:04 +03:00
return { action : 'acmactivate' , certs : certChain , signkey : signkey , hash : obj . getCertHash ( certChain [ certChain . length - 1 ] ) } ;
2021-03-04 10:49:53 +03:00
}
2019-06-20 03:16:50 +03:00
// Sign a Intel AMT ACM activation request
2019-06-21 00:27:57 +03:00
obj . signAcmRequest = function ( domain , request , user , pass , ipport , nodeid , meshid , computerName , agentId ) {
2019-06-22 03:18:48 +03:00
if ( ( domain == null ) || ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . certs == null ) || ( request == null ) || ( request . nonce == null ) || ( request . realm == null ) || ( request . fqdn == null ) || ( request . hash == null ) ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : 'Invalid arguments' } ;
2020-10-23 00:35:12 +03:00
if ( parent . common . validateString ( request . nonce , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid nonce argument." } ;
if ( parent . common . validateString ( request . realm , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid realm argument." } ;
if ( parent . common . validateString ( request . fqdn , 4 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid FQDN argument." } ;
if ( parent . common . validateString ( request . hash , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid hash argument." } ;
if ( parent . common . validateString ( request . uuid , 36 , 36 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid UUID argument." } ;
2019-06-20 03:16:50 +03:00
// Look for the signing certificate
2019-06-20 03:59:03 +03:00
var signkey = null , certChain = null , hashAlgo = null , certIndex = null ;
2019-06-20 03:16:50 +03:00
for ( var i in domain . amtacmactivation . certs ) {
const certEntry = domain . amtacmactivation . certs [ i ] ;
2019-06-20 03:59:03 +03:00
if ( ( certEntry . sha256 == request . hash ) && ( ( certEntry . cn == '*' ) || ( certEntry . cn == request . fqdn ) ) ) { hashAlgo = 'sha256' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
if ( ( certEntry . sha1 == request . hash ) && ( ( certEntry . cn == '*' ) || ( certEntry . cn == request . fqdn ) ) ) { hashAlgo = 'sha1' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
2019-06-20 03:16:50 +03:00
}
2020-10-23 00:35:12 +03:00
if ( signkey == null ) return { 'action' : 'acmactivate' , 'error' : 2 , 'errorText' : "No signing certificate found." } ; // Did not find a match.
2019-06-20 03:16:50 +03:00
2020-10-27 08:52:52 +03:00
// If the matching certificate our wildcard root cert, we can use the root to match any FQDN
if ( domain . amtacmactivation . certs [ certIndex ] . cn == '*' ) {
// Create a leaf certificate that matches the FQDN we want
// TODO: This is an expensive operation, work on ways to pre-generate or cache this leaf certificate.
var rootcert = { cert : domain . amtacmactivation . certs [ certIndex ] . rootcert , key : obj . pki . privateKeyFromPem ( domain . amtacmactivation . certs [ certIndex ] . key ) } ;
var leafcert = obj . IssueWebServerCertificate ( rootcert , false , request . fqdn , 'mc' , 'Intel(R) Client Setup Certificate' , { serverAuth : true , '2.16.840.1.113741.1.2.3' : true } , false ) ;
// Setup the certificate chain and key
certChain = [ pemToBase64 ( obj . pki . certificateToPem ( leafcert . cert ) ) , pemToBase64 ( obj . pki . certificateToPem ( domain . amtacmactivation . certs [ certIndex ] . rootcert ) ) ] ;
signkey = obj . pki . privateKeyToPem ( leafcert . key ) ;
}
2019-06-20 03:59:03 +03:00
// Setup both nonces, ready to be signed
2019-06-20 04:11:00 +03:00
const mcNonce = Buffer . from ( obj . crypto . randomBytes ( 20 ) , 'binary' ) ;
2019-06-20 03:59:03 +03:00
const fwNonce = Buffer . from ( request . nonce , 'base64' ) ;
2019-06-20 03:16:50 +03:00
// Sign the request
var signature = null ;
try {
var signer = obj . crypto . createSign ( hashAlgo ) ;
2019-06-20 03:59:03 +03:00
signer . update ( Buffer . concat ( [ fwNonce , mcNonce ] ) ) ;
2019-06-20 03:16:50 +03:00
signature = signer . sign ( signkey , 'base64' ) ;
2020-10-27 08:52:52 +03:00
} catch ( ex ) {
return { 'action' : 'acmactivate' , 'error' : 4 , 'errorText' : "Unable to perform signature." } ;
}
2019-06-20 03:16:50 +03:00
2019-06-21 00:27:57 +03:00
// Log the activation request, logging is a required step for activation.
2020-10-23 00:35:12 +03:00
if ( obj . logAmtActivation ( domain , { time : new Date ( ) , action : 'acmactivate' , domain : domain . id , amtUuid : request . uuid , certHash : request . hash , hashType : hashAlgo , amtRealm : request . realm , amtFqdn : request . fqdn , user : user , password : pass , ipport : ipport , nodeid : nodeid , meshid : meshid , computerName : computerName , agentId : agentId , tag : request . tag , name : request . name } ) == false ) return { 'action' : 'acmactivate' , 'error' : 5 , 'errorText' : "Unable to log operation." } ;
2019-06-21 00:27:57 +03:00
2019-06-20 03:16:50 +03:00
// Return the signature with the computed account password hash
2019-06-20 03:59:03 +03:00
return { 'action' : 'acmactivate' , 'signature' : signature , 'password' : obj . crypto . createHash ( 'md5' ) . update ( user + ':' + request . realm + ':' + pass ) . digest ( 'hex' ) , 'nonce' : mcNonce . toString ( 'base64' ) , 'certs' : certChain } ;
2019-06-20 03:16:50 +03:00
}
2020-10-27 08:52:52 +03:00
// Remove the PEM header, footer and carriage returns so we only have the Base64 DER.
function pemToBase64 ( pem ) { return pem . split ( '-----BEGIN CERTIFICATE-----' ) . join ( '' ) . split ( '-----END CERTIFICATE-----' ) . join ( '' ) . split ( '\r\n' ) . join ( '' ) ; }
2021-01-06 14:06:42 +03:00
// Return true if both arrays match
function compareArrays ( a1 , a2 ) {
if ( Array . isArray ( a1 ) == false ) return false ;
if ( Array . isArray ( a2 ) == false ) return false ;
if ( a1 . length !== a2 . length ) return false ;
for ( var i = 0 ; i < a1 . length ; i ++ ) { if ( a1 [ i ] !== a2 [ i ] ) return false ; }
return true ;
}
2020-10-26 22:46:30 +03:00
// Log the Intel AMT activation operation in the domain log
2019-06-21 00:27:57 +03:00
obj . logAmtActivation = function ( domain , x ) {
2020-10-26 22:46:30 +03:00
if ( x == null ) return true ;
2019-06-21 00:27:57 +03:00
var logpath = null ;
2020-10-26 22:46:30 +03:00
if ( ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . log == null ) || ( typeof domain . amtacmactivation . log != 'string' ) ) {
if ( domain . id == '' ) { logpath = parent . path . join ( obj . parent . datapath , 'amtactivation.log' ) ; } else { logpath = parent . path . join ( obj . parent . datapath , 'amtactivation-' + domain . id + '.log' ) ; }
} else {
if ( ( domain . amtacmactivation . log . length >= 2 ) && ( ( domain . amtacmactivation . log [ 0 ] == '/' ) || ( domain . amtacmactivation . log [ 1 ] == ':' ) ) ) { logpath = domain . amtacmactivation . log ; } else { logpath = parent . path . join ( obj . parent . datapath , domain . amtacmactivation . log ) ; }
}
2019-06-21 00:27:57 +03:00
try { obj . fs . appendFileSync ( logpath , JSON . stringify ( x ) + '\r\n' ) ; } catch ( ex ) { console . log ( ex ) ; return false ; }
return true ;
}
2019-06-20 03:16:50 +03:00
// Load Intel AMT ACM activation certificates
obj . loadIntelAmtAcmCerts = function ( amtacmactivation ) {
if ( amtacmactivation == null ) return ;
var acmCerts = [ ] , acmmatch = [ ] ;
if ( amtacmactivation . certs != null ) {
for ( var j in amtacmactivation . certs ) {
2021-01-07 01:23:07 +03:00
if ( j . startsWith ( '_' ) ) continue ; // Skip any certificates that start with underscore as the name.
2019-06-21 04:23:52 +03:00
var acmconfig = amtacmactivation . certs [ j ] , r = null ;
if ( ( typeof acmconfig . certpfx == 'string' ) && ( typeof acmconfig . certpfxpass == 'string' ) ) {
// P12 format, certpfx and certpfxpass
try { r = obj . loadPfxCertificate ( obj . parent . path . join ( obj . parent . datapath , acmconfig . certpfx ) , acmconfig . certpfxpass ) ; } catch ( ex ) { console . log ( ex ) ; }
if ( ( r == null ) || ( r . certs == null ) || ( r . keys == null ) || ( r . certs . length < 2 ) || ( r . keys . length != 1 ) ) continue ;
} else if ( ( typeof acmconfig . certfiles == 'object' ) && ( typeof acmconfig . keyfile == 'string' ) ) {
// PEM format, certfiles and keyfile
r = { certs : [ ] , keys : [ ] } ;
for ( var k in acmconfig . certfiles ) { r . certs . push ( obj . pki . certificateFromPem ( obj . fs . readFileSync ( obj . parent . path . join ( obj . parent . datapath , acmconfig . certfiles [ k ] ) ) ) ) ; }
r . keys . push ( obj . pki . privateKeyFromPem ( obj . fs . readFileSync ( obj . parent . path . join ( obj . parent . datapath , acmconfig . keyfile ) ) ) ) ;
if ( ( r . certs . length < 2 ) || ( r . keys . length != 1 ) ) continue ;
}
2020-08-19 21:22:19 +03:00
// Reorder the certificates from leaf to root.
var orderedCerts = [ ] , or = [ ] , currenthash = null , orderingError = false ; ;
while ( ( orderingError == false ) && ( orderedCerts . length < r . certs . length ) ) {
orderingError = true ;
for ( var k in r . certs ) {
if ( ( ( currenthash == null ) && ( r . certs [ k ] . subject . hash == r . certs [ k ] . issuer . hash ) ) || ( ( r . certs [ k ] . issuer . hash == currenthash ) && ( r . certs [ k ] . subject . hash != r . certs [ k ] . issuer . hash ) ) ) {
currenthash = r . certs [ k ] . subject . hash ;
orderedCerts . unshift ( Buffer . from ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( r . certs [ k ] ) ) . data , 'binary' ) . toString ( 'base64' ) ) ;
or . unshift ( r . certs [ k ] ) ;
orderingError = false ;
}
}
}
if ( orderingError == true ) continue ;
r . certs = or ;
2021-01-06 14:06:42 +03:00
// Check that the certificate and private key match
if ( ( compareArrays ( r . certs [ 0 ] . publicKey . n . data , r . keys [ 0 ] . n . data ) == false ) || ( compareArrays ( r . certs [ 0 ] . publicKey . e . data , r . keys [ 0 ] . e . data ) == false ) ) {
parent . addServerWarning ( 'Intel AMT activation certificate provided with a mismatching private key.' ) ;
continue ;
}
2019-06-21 04:23:52 +03:00
/ *
// Debug: Display all certs & key as PEM
for ( var k in r . certs ) {
var cn = r . certs [ k ] . subject . getField ( 'CN' ) ;
if ( cn != null ) { console . log ( cn . value + '\r\n' + obj . pki . certificateToPem ( r . certs [ k ] ) ) ; } else { console . log ( obj . pki . certificateToPem ( r . certs [ k ] ) ) ; }
}
console . log ( obj . pki . privateKeyToPem ( r . keys [ 0 ] ) ) ;
* /
2019-06-20 03:16:50 +03:00
// Check if the right OU or OID is present for Intel AMT activation
var validActivationCert = false ;
for ( var k in r . certs [ 0 ] . extensions ) { if ( r . certs [ 0 ] . extensions [ k ] [ '2.16.840.1.113741.1.2.3' ] == true ) { validActivationCert = true ; } }
var orgName = r . certs [ 0 ] . subject . getField ( 'OU' ) ;
if ( ( orgName != null ) && ( orgName . value == 'Intel(R) Client Setup Certificate' ) ) { validActivationCert = true ; }
if ( validActivationCert == false ) continue ;
// Compute the SHA256 and SHA1 hashes of the root certificate
for ( var k in r . certs ) {
if ( r . certs [ k ] . subject . hash != r . certs [ k ] . issuer . hash ) continue ;
const certdata = obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( r . certs [ k ] ) ) . data ;
var md = obj . forge . md . sha256 . create ( ) ;
md . update ( certdata ) ;
acmconfig . sha256 = Buffer . from ( md . digest ( ) . getBytes ( ) , 'binary' ) . toString ( 'hex' ) ;
md = obj . forge . md . sha1 . create ( ) ;
md . update ( certdata ) ;
acmconfig . sha1 = Buffer . from ( md . digest ( ) . getBytes ( ) , 'binary' ) . toString ( 'hex' ) ;
}
if ( ( acmconfig . sha1 == null ) || ( acmconfig . sha256 == null ) ) continue ;
// Get the certificate common name
var certCommonName = r . certs [ 0 ] . subject . getField ( 'CN' ) ;
if ( certCommonName == null ) continue ;
var certCommonNameSplit = certCommonName . value . split ( '.' ) ;
var topLevel = certCommonNameSplit [ certCommonNameSplit . length - 1 ] . toLowerCase ( ) ;
var topLevelNum = TopLevelDomainExtendedSupport [ topLevel ] ;
if ( topLevelNum != null ) {
while ( certCommonNameSplit . length > topLevelNum ) { certCommonNameSplit . shift ( ) ; }
acmconfig . cn = certCommonNameSplit . join ( '.' ) ;
} else {
acmconfig . cn = certCommonName . value ;
}
delete acmconfig . cert ;
delete acmconfig . certpass ;
acmconfig . certs = orderedCerts ;
acmconfig . key = obj . pki . privateKeyToPem ( r . keys [ 0 ] ) ;
acmCerts . push ( acmconfig ) ;
2020-10-27 06:39:04 +03:00
acmmatch . push ( { sha256 : acmconfig . sha256 , sha1 : acmconfig . sha1 , cn : acmconfig . cn } ) ;
2019-06-20 03:16:50 +03:00
}
}
amtacmactivation . acmmatch = acmmatch ;
amtacmactivation . certs = acmCerts ;
// Add the MeshCentral root cert as a possible activation cert
if ( obj . parent . certificates . root ) {
var x1 = obj . parent . certificates . root . cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = obj . parent . certificates . root . cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
var sha256 = obj . crypto . createHash ( 'sha256' ) . update ( Buffer . from ( obj . parent . certificates . root . cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
var sha1 = obj . crypto . createHash ( 'sha1' ) . update ( Buffer . from ( obj . parent . certificates . root . cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2020-10-27 08:52:52 +03:00
amtacmactivation . certs . push ( { 'sha256' : sha256 , 'sha1' : sha1 , 'cn' : '*' , rootcert : obj . pki . certificateFromPem ( obj . parent . certificates . root . cert ) , key : obj . parent . certificates . root . key } ) ;
2019-06-20 03:16:50 +03:00
amtacmactivation . acmmatch . push ( { 'sha256' : sha256 , 'sha1' : sha1 , 'cn' : '*' } ) ;
}
}
2020-10-27 06:39:04 +03:00
}
2021-01-20 20:54:51 +03:00
// Load a generic certificate and key from PFX/P12 or PEM format. Load both keys and attributes.
obj . loadGenericCertAndKey = function ( config ) {
if ( ( typeof config . certpfx == 'string' ) || ( typeof config . certpfxpass == 'string' ) ) {
// Load a PFX certificate
var r = null ;
try { r = obj . loadPfxCertificate ( parent . getConfigFilePath ( config . certpfx ) , config . certpfxpass ) ; } catch ( ex ) { console . log ( ex ) ; }
if ( ( r != null ) && ( r . keys . length > 0 ) && ( r . certs . length > 0 ) ) {
var attributes = { } ;
for ( var j in r . certs [ 0 ] . subject . attributes ) { attributes [ r . certs [ 0 ] . subject . attributes [ j ] . shortName ] = r . certs [ 0 ] . subject . attributes [ j ] . value ; }
return { cert : obj . pki . certificateToPem ( r . certs [ 0 ] ) , key : obj . pki . privateKeyToPem ( r . keys [ 0 ] ) , attributes : attributes } ;
}
}
if ( ( typeof config . certfile == 'string' ) || ( typeof config . keyfile == 'string' ) ) {
// Load a PEM certificate
var r = { }
r . cert = obj . fs . readFileSync ( parent . getConfigFilePath ( config . certfile ) , 'utf8' ) ;
r . key = obj . fs . readFileSync ( parent . getConfigFilePath ( config . keyfile ) , 'utf8' ) ;
var cert = obj . pki . certificateFromPem ( r . cert ) ;
r . attributes = { } ;
for ( var j in cert . subject . attributes ) { r . attributes [ cert . subject . attributes [ j ] . shortName ] = cert . subject . attributes [ j ] . value ; }
return r ;
}
return null ;
}
2020-10-27 06:39:04 +03:00
// Get the setup.bin file
2020-10-27 12:15:52 +03:00
obj . GetSetupBinFile = function ( amtacmactivation , oldmebxpass , newmebxpass , domain , user ) {
2020-10-27 06:39:04 +03:00
// Create a setup.bin file for our own root cert
// Get the wiadcard certificate hash
var wildcardCertSha256 = null ;
for ( var i = 0 ; i < amtacmactivation . acmmatch . length ; i ++ ) { if ( amtacmactivation . acmmatch [ i ] . cn == '*' ) { wildcardCertSha256 = amtacmactivation . acmmatch [ i ] . sha256 ; } }
// Create the Setup.bin stack
const AmtSetupBinStack = require ( './amt/amt-setupbin' ) ( ) ;
var setupbin = AmtSetupBinStack . AmtSetupBinCreate ( 3 , 1 ) ; // Version 3, 1 = Records will not be consumed.
var certRootName = 'MeshCentral' ;
2021-03-08 10:31:19 +03:00
// Figure out what trusted FQDN to use.
var trustedFQDN = 'rootcert.meshcentral.com' ; // Default DNS name. Any DNS name will do, we this is the fallback.
if ( typeof domain . dns == 'string' ) {
// Use domain DNS name
trustedFQDN = domain . dns ;
} else if ( typeof parent . config . settings . cert == 'string' ) {
// Use main DNS name
trustedFQDN = parent . config . settings . cert ;
}
2020-10-27 06:39:04 +03:00
// Create a new record
var r = { } ;
r . typeIdentifier = 1 ;
r . flags = 1 ; // Valid, unscrambled record.
r . chunkCount = 0 ;
r . headerByteCount = 0 ;
r . number = 0 ;
r . variables = [ ] ;
setupbin . records . push ( r ) ;
// Create "Current MEBx Password" variable
var v = { } ;
v . moduleid = 1 ;
v . varid = 1 ;
v . length = - 1 ;
v . value = oldmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "New MEBx Password" variable
v = { } ;
v . moduleid = 1 ;
v . varid = 2 ;
v . length = - 1 ;
v . value = newmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "User Defined Certificate Addition" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 8 ;
v . length = - 1 ;
v . value = String . fromCharCode ( 2 ) + Buffer . from ( wildcardCertSha256 , 'hex' ) . toString ( 'binary' ) + String . fromCharCode ( certRootName . length ) + certRootName ; // 2 = SHA256 hash type
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "PKI DNS Suffix" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 3 ;
v . length = - 1 ;
2021-03-08 10:31:19 +03:00
v . value = trustedFQDN ;
2020-10-27 06:39:04 +03:00
setupbin . records [ 0 ] . variables . push ( v ) ;
2020-11-25 06:56:59 +03:00
/ *
// Create "ME Provision Halt Active" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 28 ;
v . length = - 1 ;
v . value = 1 ;
setupbin . records [ 0 ] . variables . push ( v ) ;
* /
2020-10-27 12:15:52 +03:00
// Write to log file
obj . logAmtActivation ( domain , { time : new Date ( ) , action : 'setupbin' , domain : domain . id , userid : user . _id , oldmebx : oldmebxpass , newmebx : newmebxpass , rootname : certRootName , hash : wildcardCertSha256 , dns : 'rootcert.meshcentral.com' } ) ;
2019-06-20 03:16:50 +03:00
2020-10-27 12:15:52 +03:00
// Encode the setup.bin file
return AmtSetupBinStack . AmtSetupBinEncode ( setupbin ) ;
2019-06-20 03:16:50 +03:00
}
2019-06-13 05:40:27 +03:00
// Return the certificate of the remote HTTPS server
obj . loadPfxCertificate = function ( filename , password ) {
var r = { certs : [ ] , keys : [ ] } ;
2019-06-21 04:23:52 +03:00
var pfxb64 = Buffer . from ( obj . fs . readFileSync ( filename ) ) . toString ( 'base64' ) ;
var pfx = obj . forge . pkcs12 . pkcs12FromAsn1 ( obj . forge . asn1 . fromDer ( obj . forge . util . decode64 ( pfxb64 ) ) , true , password ) ;
2019-06-13 05:40:27 +03:00
// Get the certs from certbags
var bags = pfx . getBags ( { bagType : obj . forge . pki . oids . certBag } ) ;
for ( var i = 0 ; i < bags [ obj . forge . pki . oids . certBag ] . length ; i ++ ) { r . certs . push ( bags [ obj . forge . pki . oids . certBag ] [ i ] . cert ) ; }
2019-06-21 04:23:52 +03:00
2019-06-13 05:40:27 +03:00
// Get shrouded key from key bags
bags = pfx . getBags ( { bagType : obj . forge . pki . oids . pkcs8ShroudedKeyBag } ) ;
for ( var i = 0 ; i < bags [ obj . forge . pki . oids . pkcs8ShroudedKeyBag ] . length ; i ++ ) { r . keys . push ( bags [ obj . forge . pki . oids . pkcs8ShroudedKeyBag ] [ i ] . key ) ; }
return r ;
}
2020-12-11 00:56:15 +03:00
// Return a text file from a remote HTTPS server
obj . loadTextFile = function ( url , tag , func ) {
const u = require ( 'url' ) . parse ( url ) ;
if ( u . protocol == 'https:' ) {
// Read from HTTPS
const https = require ( 'https' ) ;
https . get ( url , function ( resp ) {
var data = '' ;
resp . on ( 'data' , function ( chunk ) { data += chunk ; } ) ;
resp . on ( 'end' , function ( ) { func ( url , data , tag ) ; } ) ;
resp . on ( 'error' , function ( chunk ) { func ( url , null , tag ) ; } ) ;
} ) . on ( 'error' , function ( err ) { func ( url , null , tag ) ; } ) ;
} else if ( u . protocol == 'file:' ) {
// Read a file
obj . fs . readFile ( url . substring ( 7 ) , 'utf8' , function ( err , data ) {
func ( url , err ? null : data , tag ) ;
} ) ;
} else { func ( url , null , tag ) ; }
} ;
2018-11-01 02:03:09 +03:00
// Return the certificate of the remote HTTPS server
2019-10-29 21:10:57 +03:00
obj . loadCertificate = function ( url , hostname , tag , func ) {
2018-12-01 03:42:58 +03:00
const u = require ( 'url' ) . parse ( url ) ;
2018-11-01 02:03:09 +03:00
if ( u . protocol == 'https:' ) {
2018-12-01 03:42:58 +03:00
// Read the certificate from HTTPS
2019-10-29 21:10:57 +03:00
if ( hostname == null ) { hostname = u . hostname ; }
2020-03-19 23:42:37 +03:00
parent . debug ( 'cert' , "loadCertificate() - Loading certificate from " + u . hostname + ":" + ( u . port ? u . port : 443 ) + ", Hostname: " + hostname + "..." ) ;
const tlssocket = obj . tls . connect ( ( u . port ? u . port : 443 ) , u . hostname , { servername : hostname , rejectUnauthorized : false } , function ( ) {
this . xxcert = this . getPeerCertificate ( ) ;
parent . debug ( 'cert' , "loadCertificate() - TLS connected, " + ( ( this . xxcert != null ) ? "got certificate." : "no certificate." ) ) ;
try { this . destroy ( ) ; } catch ( ex ) { }
this . xxfunc ( this . xxurl , ( this . xxcert == null ) ? null : ( this . xxcert . raw . toString ( 'binary' ) ) , hostname , this . xxtag ) ;
} ) ;
2018-11-01 02:03:09 +03:00
tlssocket . xxurl = url ;
tlssocket . xxfunc = func ;
tlssocket . xxtag = tag ;
2020-03-19 23:42:37 +03:00
tlssocket . on ( 'error' , function ( error ) { try { this . destroy ( ) ; } catch ( ex ) { } parent . debug ( 'cert' , "loadCertificate() - TLS error: " + error ) ; this . xxfunc ( this . xxurl , null , hostname , this . xxtag ) ; } ) ;
2018-12-01 03:42:58 +03:00
} else if ( u . protocol == 'file:' ) {
// Read the certificate from a file
obj . fs . readFile ( url . substring ( 7 ) , 'utf8' , function ( err , data ) {
2020-12-11 00:56:15 +03:00
if ( err ) { func ( url , null , hostname , tag ) ; return ; }
2018-12-01 03:42:58 +03:00
var x1 = data . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = data . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-10-29 21:10:57 +03:00
func ( url , Buffer . from ( data . substring ( x1 + 27 , x2 ) , 'base64' ) . toString ( 'binary' ) , hostname , tag ) ;
2018-12-01 03:42:58 +03:00
} else {
2019-10-29 21:10:57 +03:00
func ( url , data , hostname , tag ) ;
2018-12-01 03:42:58 +03:00
}
} ) ;
2019-10-30 02:17:29 +03:00
} else { func ( url , null , hostname , tag ) ; }
2018-11-01 02:03:09 +03:00
} ;
2019-02-03 01:54:36 +03:00
// Check if a configuration file exists
obj . fileExists = function ( filename ) {
if ( ( parent . configurationFiles != null ) && ( parent . configurationFiles [ filename ] != null ) ) { return true ; }
var filePath = parent . getConfigFilePath ( filename ) ;
try { return obj . fs . statSync ( filePath ) . isFile ( ) ; } catch ( err ) { return false ; }
} ;
// Load a configuration file
obj . fileLoad = function ( filename , encoding ) {
if ( ( parent . configurationFiles != null ) && ( parent . configurationFiles [ filename ] != null ) ) {
2019-10-14 23:35:27 +03:00
if ( typeof parent . configurationFiles [ filename ] == 'string' ) { return fixEndOfLines ( parent . configurationFiles [ filename ] ) ; }
2019-02-03 01:54:36 +03:00
return fixEndOfLines ( parent . configurationFiles [ filename ] . toString ( ) ) ;
} else {
return fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( filename ) , encoding ) ) ;
}
}
2018-11-02 01:01:21 +03:00
// Return the SHA384 hash of the certificate public key
2017-10-15 09:22:19 +03:00
obj . getPublicKeyHash = function ( cert ) {
var publickey = obj . pki . certificateFromPem ( cert ) . publicKey ;
2019-12-01 23:52:32 +03:00
return obj . pki . getPublicKeyFingerprint ( publickey , { encoding : 'hex' , md : obj . forge . md . sha384 . create ( ) } ) ;
2018-08-30 03:40:30 +03:00
} ;
2017-09-30 00:26:51 +03:00
2019-10-06 00:24:40 +03:00
// Return the SHA384 hash of the certificate, return hex
obj . getCertHashSha1 = function ( cert ) {
try {
var md = obj . forge . md . sha1 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . toHex ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
return obj . crypto . createHash ( 'sha1' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2019-12-01 23:52:32 +03:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2019-10-06 00:24:40 +03:00
}
} ;
2018-12-01 03:42:58 +03:00
// Return the SHA384 hash of the certificate, return hex
obj . getCertHash = function ( cert ) {
try {
var md = obj . forge . md . sha384 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . toHex ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-01-03 05:03:34 +03:00
return obj . crypto . createHash ( 'sha384' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2019-12-01 23:52:32 +03:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2018-12-01 03:42:58 +03:00
}
} ;
// Return the SHA384 hash of the certificate public key
obj . getPublicKeyHashBinary = function ( cert ) {
var publickey = obj . pki . certificateFromPem ( cert ) . publicKey ;
2019-12-01 23:52:32 +03:00
return obj . pki . getPublicKeyFingerprint ( publickey , { encoding : 'binary' , md : obj . forge . md . sha384 . create ( ) } ) ;
2018-12-01 03:42:58 +03:00
} ;
// Return the SHA384 hash of the certificate, return binary
obj . getCertHashBinary = function ( cert ) {
try {
// If this is a RSA certificate, we can use Forge to hash the ASN1
var md = obj . forge . md . sha384 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . getBytes ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-01-03 05:03:34 +03:00
return obj . crypto . createHash ( 'sha384' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'binary' ) ;
2019-12-01 23:52:32 +03:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2018-12-01 03:42:58 +03:00
}
} ;
2017-08-28 19:27:45 +03:00
// Create a self-signed certificate
2017-10-19 02:28:05 +03:00
obj . GenerateRootCertificate = function ( addThumbPrintToName , commonName , country , organization , strong ) {
2019-02-12 01:41:15 +03:00
var keys = obj . pki . rsa . generateKeyPair ( { bits : ( strong == true ) ? 3072 : 2048 , e : 0x10001 } ) ;
2017-08-28 19:27:45 +03:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
2020-09-23 19:29:19 +03:00
cert . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
2020-02-10 23:22:01 +03:00
cert . validity . notBefore = new Date ( 2018 , 0 , 1 ) ;
cert . validity . notAfter = new Date ( 2049 , 11 , 31 ) ;
2019-12-01 23:52:32 +03:00
if ( addThumbPrintToName === true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
2018-09-01 23:00:53 +03:00
if ( country == null ) { country = "unknown" ; }
if ( organization == null ) { organization = "unknown" ; }
2019-12-01 23:52:32 +03:00
var attrs = [ { name : 'commonName' , value : commonName } , { name : 'organizationName' , value : organization } , { name : 'countryName' , value : country } ] ;
2017-08-28 19:27:45 +03:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( attrs ) ;
2017-10-03 00:12:29 +03:00
// Create a root certificate
2019-12-01 23:52:32 +03:00
//cert.setExtensions([{ name: 'basicConstraints', cA: true }, { name: 'nsCertType', sslCA: true, emailCA: true, objCA: true }, { name: 'subjectKeyIdentifier' }]);
cert . setExtensions ( [ { name : 'basicConstraints' , cA : true } , { name : 'subjectKeyIdentifier' } , { name : 'keyUsage' , keyCertSign : true } ] ) ;
2017-10-15 09:22:19 +03:00
cert . sign ( keys . privateKey , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 19:27:45 +03:00
return { cert : cert , key : keys . privateKey } ;
2018-08-30 03:40:30 +03:00
} ;
2017-08-28 19:27:45 +03:00
// Issue a certificate from a root
2017-10-15 09:22:19 +03:00
obj . IssueWebServerCertificate = function ( rootcert , addThumbPrintToName , commonName , country , organization , extKeyUsage , strong ) {
2019-02-12 01:41:15 +03:00
var keys = obj . pki . rsa . generateKeyPair ( { bits : ( strong == true ) ? 3072 : 2048 , e : 0x10001 } ) ;
2017-08-28 19:27:45 +03:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
2020-09-23 19:29:19 +03:00
cert . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
2020-02-10 23:22:01 +03:00
cert . validity . notBefore = new Date ( 2018 , 0 , 1 ) ;
cert . validity . notAfter = new Date ( 2049 , 11 , 31 ) ;
2019-12-01 23:52:32 +03:00
if ( addThumbPrintToName === true ) { commonName += "-" + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
var attrs = [ { name : 'commonName' , value : commonName } ] ;
if ( country != null ) { attrs . push ( { name : 'countryName' , value : country } ) ; }
if ( organization != null ) { attrs . push ( { name : 'organizationName' , value : organization } ) ; }
2017-08-28 19:27:45 +03:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( rootcert . cert . subject . attributes ) ;
2017-09-30 00:26:51 +03:00
2019-12-01 23:52:32 +03:00
if ( extKeyUsage == null ) { extKeyUsage = { name : 'extKeyUsage' , serverAuth : true } ; } else { extKeyUsage . name = 'extKeyUsage' ; }
//var extensions = [{ name: 'basicConstraints', cA: false }, { name: 'keyUsage', keyCertSign: true, digitalSignature: true, nonRepudiation: true, keyEncipherment: true, dataEncipherment: true }, extKeyUsage, { name: "nsCertType", client: false, server: true, email: false, objsign: false, sslCA: false, emailCA: false, objCA: false }, { name: "subjectKeyIdentifier" }];
var extensions = [ { name : 'basicConstraints' , cA : false } , { name : 'keyUsage' , keyCertSign : false , digitalSignature : true , nonRepudiation : false , keyEncipherment : true , dataEncipherment : ( extKeyUsage . serverAuth !== true ) } , extKeyUsage , { name : "subjectKeyIdentifier" } ] ;
2019-03-17 00:49:48 +03:00
if ( extKeyUsage . serverAuth === true ) {
2019-03-19 19:54:52 +03:00
// Set subjectAltName according to commonName parsing.
2019-03-17 00:49:48 +03:00
// Ideally, we should let opportunity in given interface to set any type of altNames according to node_forge library
2019-03-19 19:54:52 +03:00
// such as type 2, 6 and 7. (2 -> DNS, 6 -> URI, 7 -> IP)
2019-03-17 00:49:48 +03:00
var altNames = [ ] ;
// According to commonName parsing (IP or DNS), add URI and DNS and/or IP altNames
if ( require ( 'net' ) . isIP ( commonName ) ) {
// set both IP and DNS when commonName is an IP@
altNames . push ( { type : 7 , ip : commonName } ) ;
altNames . push ( { type : 2 , value : commonName } ) ;
} else {
// set only DNS when commonName is a FQDN
altNames . push ( { type : 2 , value : commonName } ) ;
}
2019-12-01 23:52:32 +03:00
altNames . push ( { type : 6 , value : 'http://' + commonName + '/' } )
2019-03-17 00:49:48 +03:00
2019-03-19 19:54:52 +03:00
// Add localhost stuff for easy testing on localhost ;)
2019-12-01 23:52:32 +03:00
altNames . push ( { type : 2 , value : 'localhost' } ) ;
altNames . push ( { type : 6 , value : 'http://localhost/' } ) ;
altNames . push ( { type : 7 , ip : '127.0.0.1' } ) ;
2019-03-17 00:49:48 +03:00
2019-12-01 23:52:32 +03:00
extensions . push ( { name : 'subjectAltName' , altNames : altNames } ) ;
2019-03-17 00:49:48 +03:00
}
2018-12-22 01:39:26 +03:00
2017-09-30 00:26:51 +03:00
cert . setExtensions ( extensions ) ;
2017-10-15 09:22:19 +03:00
cert . sign ( rootcert . key , obj . forge . md . sha384 . create ( ) ) ;
2018-08-30 03:40:30 +03:00
2017-08-28 19:27:45 +03:00
return { cert : cert , key : keys . privateKey } ;
2018-08-30 03:40:30 +03:00
} ;
2017-08-28 19:27:45 +03:00
2019-01-12 01:01:36 +03:00
// Make sure a string with Mac style CR endo of line is changed to Linux LF style.
function fixEndOfLines ( str ) {
2019-01-15 20:20:21 +03:00
if ( typeof ( str ) != 'string' ) return str ; // If this is not a string, do nothing.
var i = str . indexOf ( '-----' ) ; // Remove everything before "-----".
if ( i > 0 ) { str = str . substring ( i ) ; } // this solves problems with editors that save text file type indicators ahead of the text.
2019-01-12 01:01:36 +03:00
if ( ( typeof ( str ) != 'string' ) || ( str . indexOf ( '\n' ) > 0 ) ) return str ; // If there is a \n in the file, keep the file as-is.
return str . split ( '\r' ) . join ( '\n' ) ; // If there is no \n, replace all \r with \n.
}
2019-03-10 01:28:08 +03:00
// Return true if the name is found in the certificates names, we support wildcard certificates
2019-06-08 01:55:24 +03:00
obj . compareCertificateNames = function ( certNames , name ) {
2019-03-10 01:28:08 +03:00
if ( certNames == null ) return false ;
if ( certNames . indexOf ( name . toLowerCase ( ) ) >= 0 ) return true ;
for ( var i in certNames ) {
if ( ( certNames [ i ] . startsWith ( '*.' ) == true ) && ( name . endsWith ( certNames [ i ] . substring ( 1 ) ) == true ) ) { return true ; }
if ( certNames [ i ] . startsWith ( 'http://*.' ) == true ) {
if ( name . endsWith ( certNames [ i ] . substring ( 8 ) ) == true ) { return true ; }
if ( ( certNames [ i ] . endsWith ( '/' ) == true ) && ( name . endsWith ( certNames [ i ] . substring ( 8 , certNames [ i ] . length - 1 ) ) == true ) ) { return true ; }
}
}
return false ;
}
2020-09-23 20:13:15 +03:00
// Return true if the certificate is valid
obj . checkCertificate = function ( pem , key ) {
var cert = null ;
try { cert = obj . pki . certificateFromPem ( pem ) ; } catch ( ex ) { return false ; } // Unable to decode certificate
if ( cert . serialNumber == '' ) return false ; // Empty serial number is not allowed.
return true ;
}
2017-08-28 19:27:45 +03:00
// Returns the web server TLS certificate and private key, if not present, create demonstration ones.
2019-02-03 01:54:36 +03:00
obj . GetMeshServerCertificate = function ( args , config , func ) {
2018-08-30 03:40:30 +03:00
var i = 0 ;
2017-10-03 00:12:29 +03:00
var certargs = args . cert ;
2018-03-07 04:50:44 +03:00
var mpscertargs = args . mpscert ;
2017-10-19 02:28:05 +03:00
var strongCertificate = ( args . fastcert ? false : true ) ;
2018-12-20 23:12:24 +03:00
var rcountmax = 4 ;
2018-08-30 03:40:30 +03:00
var caindex = 1 ;
var caok = false ;
var calist = [ ] ;
var dnsname = null ;
2017-08-28 19:27:45 +03:00
// commonName, country, organization
2018-08-30 03:40:30 +03:00
2017-08-28 19:27:45 +03:00
// If the certificates directory does not exist, create it.
2018-07-14 05:18:43 +03:00
if ( ! obj . dirExists ( parent . datapath ) ) { obj . fs . mkdirSync ( parent . datapath ) ; }
2018-08-30 03:40:30 +03:00
var r = { } ;
var rcount = 0 ;
2017-08-28 19:27:45 +03:00
// If the root certificate already exist, load it
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'root-cert-public.crt' ) && obj . fileExists ( 'root-cert-private.key' ) ) {
var rootCertificate = obj . fileLoad ( 'root-cert-public.crt' , 'utf8' ) ;
var rootPrivateKey = obj . fileLoad ( 'root-cert-private.key' , 'utf8' ) ;
2017-08-28 19:27:45 +03:00
r . root = { cert : rootCertificate , key : rootPrivateKey } ;
rcount ++ ;
2019-11-15 03:10:16 +03:00
// Check if the root certificate has the "Certificate Signing (04)" Key usage.
// This option is required for newer versions of Intel AMT for CIRA/WS-EVENTS.
var xroot = obj . pki . certificateFromPem ( rootCertificate ) ;
2019-12-01 23:52:32 +03:00
var xext = xroot . getExtension ( 'keyUsage' ) ;
2020-09-23 20:13:15 +03:00
if ( ( xext == null ) || ( xext . keyCertSign !== true ) || ( xroot . serialNumber == '' ) ) {
2019-11-15 03:10:16 +03:00
// We need to fix this certificate
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public-backup.crt' ) , rootCertificate ) ;
2020-09-23 20:13:15 +03:00
if ( xroot . serialNumber == '' ) { console . log ( "Fixing root certificate to add serial number..." ) ; xroot . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ; }
if ( ( xext == null ) || ( xext . keyCertSign !== true ) ) { console . log ( "Fixing root certificate to add signing key usage..." ) ; xroot . setExtensions ( [ { name : 'basicConstraints' , cA : true } , { name : 'subjectKeyIdentifier' } , { name : 'keyUsage' , keyCertSign : true } ] ) ; }
2019-11-15 03:10:16 +03:00
var xrootPrivateKey = obj . pki . privateKeyFromPem ( rootPrivateKey ) ;
xroot . sign ( xrootPrivateKey , obj . forge . md . sha384 . create ( ) ) ;
r . root . cert = obj . pki . certificateToPem ( xroot ) ;
2019-12-01 23:52:32 +03:00
try { obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public.crt' ) , r . root . cert ) ; } catch ( ex ) { }
2019-11-15 03:10:16 +03:00
}
2017-08-28 19:27:45 +03:00
}
2017-10-03 00:12:29 +03:00
2020-05-22 22:54:22 +03:00
// If web certificate exist, load it as default. This is useful for agent-only port. Load both certificate and private key
if ( obj . fileExists ( 'webserver-cert-public.crt' ) && obj . fileExists ( 'webserver-cert-private.key' ) ) {
r . webdefault = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . webdefault . cert , r . webdefault . key ) == false ) { delete r . webdefault ; }
2020-05-22 22:54:22 +03:00
}
2018-11-02 01:01:21 +03:00
if ( args . tlsoffload ) {
2017-10-03 00:12:29 +03:00
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-cert-public.crt' ) ) {
r . web = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . web . cert , null ) == false ) { delete r . web ; } else { rcount ++ ; }
2017-10-03 00:12:29 +03:00
}
} else {
// If the web certificate already exist, load it. Load both certificate and private key
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-cert-public.crt' ) && obj . fileExists ( 'webserver-cert-private.key' ) ) {
r . web = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . web . cert , r . web . key ) == false ) { delete r . web ; } else { rcount ++ ; }
2017-10-03 00:12:29 +03:00
}
2017-08-28 19:27:45 +03:00
}
2018-08-30 03:40:30 +03:00
2017-10-03 00:12:29 +03:00
// If the mps certificate already exist, load it
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'mpsserver-cert-public.crt' ) && obj . fileExists ( 'mpsserver-cert-private.key' ) ) {
r . mps = { cert : obj . fileLoad ( 'mpsserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'mpsserver-cert-private.key' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . mps . cert , r . mps . key ) == false ) { delete r . mps ; } else { rcount ++ ; }
2017-08-28 19:27:45 +03:00
}
2018-08-30 03:40:30 +03:00
2017-10-03 00:12:29 +03:00
// If the agent certificate already exist, load it
2019-02-03 01:54:36 +03:00
if ( obj . fileExists ( "agentserver-cert-public.crt" ) && obj . fileExists ( "agentserver-cert-private.key" ) ) {
2019-12-01 23:52:32 +03:00
r . agent = { cert : obj . fileLoad ( "agentserver-cert-public.crt" , 'utf8' ) , key : obj . fileLoad ( "agentserver-cert-private.key" , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . agent . cert , r . agent . key ) == false ) { delete r . agent ; } else { rcount ++ ; }
2017-08-28 19:27:45 +03:00
}
2017-09-08 02:01:44 +03:00
2017-11-04 03:01:30 +03:00
// If the swarm server certificate exist, load it (This is an optional certificate)
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'swarmserver-cert-public.crt' ) && obj . fileExists ( 'swarmserver-cert-private.key' ) ) {
r . swarmserver = { cert : obj . fileLoad ( 'swarmserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'swarmserver-cert-private.key' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . swarmserver . cert , r . swarmserver . key ) == false ) { delete r . swarmserver ; }
2017-11-04 03:01:30 +03:00
}
// If the swarm server root certificate exist, load it (This is an optional certificate)
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'swarmserverroot-cert-public.crt' ) ) {
r . swarmserverroot = { cert : obj . fileLoad ( 'swarmserverroot-cert-public.crt' , 'utf8' ) } ;
2020-09-23 20:13:15 +03:00
if ( obj . checkCertificate ( r . swarmserverroot . cert , null ) == false ) { delete r . swarmserverroot ; }
2017-11-04 03:01:30 +03:00
}
2017-09-08 02:01:44 +03:00
// If CA certificates are present, load them
2018-08-30 03:40:30 +03:00
do {
caok = false ;
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-cert-chain' + caindex + '.crt' ) ) {
calist . push ( obj . fileLoad ( 'webserver-cert-chain' + caindex + '.crt' , 'utf8' ) ) ;
2018-08-30 03:40:30 +03:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
if ( r . web != null ) { r . web . ca = calist ; }
2018-01-03 03:52:49 +03:00
2017-08-28 19:27:45 +03:00
// Decode certificate arguments
2019-12-01 23:52:32 +03:00
var commonName = 'un-configured' ;
2018-08-30 03:40:30 +03:00
var country = null ;
var organization = null ;
var forceWebCertGen = 0 ;
var forceMpsCertGen = 0 ;
2017-08-28 19:27:45 +03:00
if ( certargs != undefined ) {
2019-12-01 23:52:32 +03:00
var xargs = certargs . split ( ',' ) ;
2018-08-30 03:40:30 +03:00
if ( xargs . length > 0 ) { commonName = xargs [ 0 ] ; }
if ( xargs . length > 1 ) { country = xargs [ 1 ] ; }
if ( xargs . length > 2 ) { organization = xargs [ 2 ] ; }
2017-08-28 19:27:45 +03:00
}
2017-10-03 00:12:29 +03:00
2018-03-07 04:50:44 +03:00
// Decode MPS certificate arguments, this is for the Intel AMT CIRA server
2019-12-01 23:52:32 +03:00
var mpsCommonName = ( ( config . settings != null ) && ( typeof config . settings . mpsaliashost == 'string' ) ) ? config . settings . mpsaliashost : commonName ;
2018-08-30 03:40:30 +03:00
var mpsCountry = country ;
var mpsOrganization = organization ;
if ( mpscertargs !== undefined ) {
2019-12-01 23:52:32 +03:00
var xxargs = mpscertargs . split ( ',' ) ;
2018-08-30 03:40:30 +03:00
if ( xxargs . length > 0 ) { mpsCommonName = xxargs [ 0 ] ; }
if ( xxargs . length > 1 ) { mpsCountry = xxargs [ 1 ] ; }
if ( xxargs . length > 2 ) { mpsOrganization = xxargs [ 2 ] ; }
2018-03-07 04:50:44 +03:00
}
2019-03-10 01:28:08 +03:00
if ( rcount === rcountmax ) {
// Fetch the certificates names for the main certificate
2019-12-01 23:52:32 +03:00
r . AmtMpsName = obj . pki . certificateFromPem ( r . mps . cert ) . subject . getField ( 'CN' ) . value ;
2019-03-10 01:28:08 +03:00
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
2019-12-01 23:52:32 +03:00
r . WebIssuer = webCertificate . issuer . getField ( 'CN' ) . value ;
if ( commonName == 'un-configured' ) { // If the "cert" name is not set, try to use the certificate CN instead (ok if the certificate is not wildcard).
commonName = webCertificate . subject . getField ( 'CN' ) . value ;
2019-10-30 00:05:58 +03:00
if ( commonName . startsWith ( '*.' ) ) { console . log ( "ERROR: Must specify a server full domain name in Config.json->Settings->Cert when using a wildcard certificate." ) ; process . exit ( 0 ) ; return ; }
2019-03-10 01:28:08 +03:00
}
2019-10-30 00:05:58 +03:00
r . CommonName = commonName ;
r . CommonNames = [ commonName . toLowerCase ( ) ] ;
2019-12-01 23:52:32 +03:00
var altNames = webCertificate . getExtension ( 'subjectAltName' ) ;
2019-06-08 01:55:24 +03:00
if ( altNames ) {
for ( i = 0 ; i < altNames . altNames . length ; i ++ ) {
var acn = altNames . altNames [ i ] . value . toLowerCase ( ) ;
if ( r . CommonNames . indexOf ( acn ) == - 1 ) { r . CommonNames . push ( acn ) ; }
}
}
2019-03-10 01:28:08 +03:00
var rootCertificate = obj . pki . certificateFromPem ( r . root . cert ) ;
2019-12-01 23:52:32 +03:00
r . RootName = rootCertificate . subject . getField ( 'CN' ) . value ;
2019-03-10 01:28:08 +03:00
}
2018-01-03 03:52:49 +03:00
// Look for domains that have DNS names and load their certificates
r . dns = { } ;
2018-09-01 02:43:09 +03:00
for ( i in config . domains ) {
2018-08-30 03:40:30 +03:00
if ( ( i != "" ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
dnsname = config . domains [ i ] . dns ;
2019-03-10 01:28:08 +03:00
// Check if this domain matches a parent wildcard cert, if so, use the parent cert.
2019-06-08 01:55:24 +03:00
if ( obj . compareCertificateNames ( r . CommonNames , dnsname ) == true ) {
2019-12-01 23:52:32 +03:00
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) } ;
2018-01-03 03:52:49 +03:00
} else {
2019-03-10 01:28:08 +03:00
if ( args . tlsoffload ) {
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) ) {
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-' + i + '-cert-public.crt' , 'utf8' ) } ;
2019-03-10 01:28:08 +03:00
config . domains [ i ] . certs = r . dns [ i ] ;
} else {
console . log ( "WARNING: File \"webserver-" + i + "-cert-public.crt\" missing, domain \"" + i + "\" will not work correctly." ) ;
}
2018-01-03 03:52:49 +03:00
} else {
2019-03-10 01:28:08 +03:00
// If the web certificate already exist, load it. Load both certificate and private key
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) && obj . fileExists ( 'webserver-' + i + '-cert-private.key' ) ) {
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-' + i + '-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'webserver-' + i + '-cert-private.key' , 'utf8' ) } ;
2019-03-10 01:28:08 +03:00
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
caindex = 1 ;
r . dns [ i ] . ca = [ ] ;
do {
caok = false ;
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
r . dns [ i ] . ca . push ( obj . fileLoad ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' , 'utf8' ) ) ;
2019-03-10 01:28:08 +03:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
} else {
rcountmax ++ ; // This certificate must be generated
}
2018-01-03 03:52:49 +03:00
}
}
}
}
2018-08-30 03:40:30 +03:00
if ( rcount === rcountmax ) {
if ( ( certargs == null ) && ( mpscertargs == null ) ) { if ( func != undefined ) { func ( r ) ; } return r ; } // If no certificate arguments are given, keep the certificate
2019-12-01 23:52:32 +03:00
var xcountry , xcountryField = webCertificate . subject . getField ( 'C' ) ;
2017-08-28 19:27:45 +03:00
if ( xcountryField != null ) { xcountry = xcountryField . value ; }
2019-12-01 23:52:32 +03:00
var xorganization , xorganizationField = webCertificate . subject . getField ( 'O' ) ;
2017-08-28 19:27:45 +03:00
if ( xorganizationField != null ) { xorganization = xorganizationField . value ; }
2018-03-07 04:50:44 +03:00
if ( certargs == null ) { commonName = r . CommonName ; country = xcountry ; organization = xorganization ; }
// Check if we have correct certificates
2019-06-08 01:55:24 +03:00
if ( obj . compareCertificateNames ( r . CommonNames , commonName ) == false ) { forceWebCertGen = 1 ; }
2019-03-10 01:28:08 +03:00
if ( r . AmtMpsName != mpsCommonName ) { forceMpsCertGen = 1 ; }
// If the certificates matches what we want, use them.
if ( ( forceWebCertGen == 0 ) && ( forceMpsCertGen == 0 ) ) {
2018-08-30 03:40:30 +03:00
if ( func !== undefined ) { func ( r ) ; }
return r ;
2018-07-24 03:34:24 +03:00
}
2017-08-28 19:27:45 +03:00
}
2019-10-14 23:35:27 +03:00
if ( parent . configurationFiles != null ) { console . log ( "Error: Vault/Database missing some certificates." ) ; process . exit ( 0 ) ; return null ; }
2019-02-03 01:54:36 +03:00
2018-08-30 03:40:30 +03:00
console . log ( "Generating certificates, may take a few minutes..." ) ;
2019-12-01 23:52:32 +03:00
parent . updateServerState ( 'state' , 'generatingcertificates' ) ;
2017-10-19 02:28:05 +03:00
// If a certificate is missing, but web certificate is present and --cert is not used, set the names to be the same as the web certificate
if ( ( certargs == null ) && ( r . web != null ) ) {
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
2019-12-01 23:52:32 +03:00
commonName = webCertificate . subject . getField ( 'CN' ) . value ;
var xcountryField = webCertificate . subject . getField ( 'C' ) ;
2017-10-19 02:28:05 +03:00
if ( xcountryField != null ) { country = xcountryField . value ; }
2019-12-01 23:52:32 +03:00
var xorganizationField = webCertificate . subject . getField ( 'O' ) ;
2017-10-19 02:28:05 +03:00
if ( xorganizationField != null ) { organization = xorganizationField . value ; }
}
2017-08-28 19:27:45 +03:00
var rootCertAndKey , rootCertificate , rootPrivateKey , rootName ;
2018-09-01 23:00:53 +03:00
if ( r . root == null ) {
2017-08-28 19:27:45 +03:00
// If the root certificate does not exist, create one
2018-08-30 03:40:30 +03:00
console . log ( "Generating root certificate..." ) ;
2019-12-01 23:52:32 +03:00
rootCertAndKey = obj . GenerateRootCertificate ( true , 'MeshCentralRoot' , null , null , strongCertificate ) ;
2017-08-28 19:27:45 +03:00
rootCertificate = obj . pki . certificateToPem ( rootCertAndKey . cert ) ;
rootPrivateKey = obj . pki . privateKeyToPem ( rootCertAndKey . key ) ;
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public.crt' ) , rootCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-private.key' ) , rootPrivateKey ) ;
2017-08-28 19:27:45 +03:00
} else {
// Keep the root certificate we have
rootCertAndKey = { cert : obj . pki . certificateFromPem ( r . root . cert ) , key : obj . pki . privateKeyFromPem ( r . root . key ) } ;
2018-08-30 03:40:30 +03:00
rootCertificate = r . root . cert ;
rootPrivateKey = r . root . key ;
2017-08-28 19:27:45 +03:00
}
2019-12-01 23:52:32 +03:00
var rootName = rootCertAndKey . cert . subject . getField ( 'CN' ) . value ;
2017-08-28 19:27:45 +03:00
// If the web certificate does not exist, create one
var webCertAndKey , webCertificate , webPrivateKey ;
2017-10-11 22:20:59 +03:00
if ( ( r . web == null ) || ( forceWebCertGen == 1 ) ) {
2018-08-30 03:40:30 +03:00
console . log ( "Generating HTTPS certificate..." ) ;
2017-10-19 02:28:05 +03:00
webCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , strongCertificate ) ;
2017-09-30 00:26:51 +03:00
webCertificate = obj . pki . certificateToPem ( webCertAndKey . cert ) ;
webPrivateKey = obj . pki . privateKeyToPem ( webCertAndKey . key ) ;
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-cert-public.crt' ) , webCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-cert-private.key' ) , webPrivateKey ) ;
2017-09-30 00:26:51 +03:00
} else {
// Keep the console certificate we have
2019-06-08 01:55:24 +03:00
if ( args . tlsoffload ) {
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) } ;
webCertificate = r . web . cert ;
} else {
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) , key : obj . pki . privateKeyFromPem ( r . web . key ) } ;
webCertificate = r . web . cert ;
webPrivateKey = r . web . key ;
}
2017-09-30 00:26:51 +03:00
}
2019-12-01 23:52:32 +03:00
var webIssuer = webCertAndKey . cert . issuer . getField ( 'CN' ) . value ;
2017-09-30 00:26:51 +03:00
2017-10-19 02:28:05 +03:00
// If the mesh agent server certificate does not exist, create one
var agentCertAndKey , agentCertificate , agentPrivateKey ;
if ( r . agent == null ) {
2018-08-30 03:40:30 +03:00
console . log ( "Generating MeshAgent certificate..." ) ;
2019-12-01 23:52:32 +03:00
agentCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , true , 'MeshCentralAgentServer' , country , organization , { } , strongCertificate ) ;
2017-10-19 02:28:05 +03:00
agentCertificate = obj . pki . certificateToPem ( agentCertAndKey . cert ) ;
agentPrivateKey = obj . pki . privateKeyToPem ( agentCertAndKey . key ) ;
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'agentserver-cert-public.crt' ) , agentCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'agentserver-cert-private.key' ) , agentPrivateKey ) ;
2017-10-19 02:28:05 +03:00
} else {
// Keep the mesh agent server certificate we have
agentCertAndKey = { cert : obj . pki . certificateFromPem ( r . agent . cert ) , key : obj . pki . privateKeyFromPem ( r . agent . key ) } ;
2018-08-30 03:40:30 +03:00
agentCertificate = r . agent . cert ;
agentPrivateKey = r . agent . key ;
2017-10-19 02:28:05 +03:00
}
2017-08-28 19:27:45 +03:00
// If the Intel AMT MPS certificate does not exist, create one
var mpsCertAndKey , mpsCertificate , mpsPrivateKey ;
2018-03-07 04:50:44 +03:00
if ( ( r . mps == null ) || ( forceMpsCertGen == 1 ) ) {
2018-08-30 03:40:30 +03:00
console . log ( "Generating Intel AMT MPS certificate..." ) ;
2018-03-07 04:50:44 +03:00
mpsCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , mpsCommonName , mpsCountry , mpsOrganization , null , false ) ;
2017-09-30 00:26:51 +03:00
mpsCertificate = obj . pki . certificateToPem ( mpsCertAndKey . cert ) ;
mpsPrivateKey = obj . pki . privateKeyToPem ( mpsCertAndKey . key ) ;
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'mpsserver-cert-public.crt' ) , mpsCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'mpsserver-cert-private.key' ) , mpsPrivateKey ) ;
2017-09-30 00:26:51 +03:00
} else {
// Keep the console certificate we have
mpsCertAndKey = { cert : obj . pki . certificateFromPem ( r . mps . cert ) , key : obj . pki . privateKeyFromPem ( r . mps . key ) } ;
2018-08-30 03:40:30 +03:00
mpsCertificate = r . mps . cert ;
mpsPrivateKey = r . mps . key ;
2017-09-30 00:26:51 +03:00
}
2020-05-22 22:54:22 +03:00
r = { root : { cert : rootCertificate , key : rootPrivateKey } , web : { cert : webCertificate , key : webPrivateKey , ca : [ ] } , webdefault : { cert : webCertificate , key : webPrivateKey , ca : [ ] } , mps : { cert : mpsCertificate , key : mpsPrivateKey } , agent : { cert : agentCertificate , key : agentPrivateKey } , ca : calist , CommonName : commonName , RootName : rootName , AmtMpsName : mpsCommonName , dns : { } , WebIssuer : webIssuer } ;
2018-01-03 03:52:49 +03:00
2019-03-10 01:28:08 +03:00
// Fetch the certificates names for the main certificate
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
2019-12-01 23:52:32 +03:00
r . WebIssuer = webCertificate . issuer . getField ( 'CN' ) . value ;
r . CommonName = webCertificate . subject . getField ( 'CN' ) . value ;
2019-03-10 01:28:08 +03:00
if ( r . CommonName . startsWith ( '*.' ) ) {
if ( commonName . indexOf ( '.' ) == - 1 ) { console . log ( "ERROR: Must specify a server full domain name in Config.json->Settings->Cert when using a wildcard certificate." ) ; process . exit ( 0 ) ; return ; }
if ( commonName . startsWith ( '*.' ) ) { console . log ( "ERROR: Server can't use a wildcard name: " + commonName ) ; process . exit ( 0 ) ; return ; }
r . CommonName = commonName ;
}
r . CommonNames = [ r . CommonName . toLowerCase ( ) ] ;
2019-12-01 23:52:32 +03:00
var altNames = webCertificate . getExtension ( 'subjectAltName' ) ;
2019-03-10 01:28:08 +03:00
if ( altNames ) { for ( i = 0 ; i < altNames . altNames . length ; i ++ ) { r . CommonNames . push ( altNames . altNames [ i ] . value . toLowerCase ( ) ) ; } }
var rootCertificate = obj . pki . certificateFromPem ( r . root . cert ) ;
2019-12-01 23:52:32 +03:00
r . RootName = rootCertificate . subject . getField ( 'CN' ) . value ;
2019-03-10 01:28:08 +03:00
2018-01-03 03:52:49 +03:00
// Look for domains with DNS names that have no certificates and generated them.
2018-09-01 02:43:09 +03:00
for ( i in config . domains ) {
2018-08-30 03:40:30 +03:00
if ( ( i != "" ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
dnsname = config . domains [ i ] . dns ;
2019-03-10 01:28:08 +03:00
// Check if this domain matches a parent wildcard cert, if so, use the parent cert.
2019-06-08 01:55:24 +03:00
if ( obj . compareCertificateNames ( r . CommonNames , dnsname ) == true ) {
2019-12-01 23:52:32 +03:00
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) } ;
2019-03-10 01:28:08 +03:00
} else {
if ( ! args . tlsoffload ) {
// If the web certificate does not exist, create it
2019-12-01 23:52:32 +03:00
if ( ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) === false ) || ( obj . fileExists ( 'webserver-' + i + '-cert-private.key' ) === false ) ) {
console . log ( 'Generating HTTPS certificate for ' + i + '...' ) ;
2019-03-10 01:28:08 +03:00
var xwebCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , dnsname , country , organization , null , strongCertificate ) ;
var xwebCertificate = obj . pki . certificateToPem ( xwebCertAndKey . cert ) ;
var xwebPrivateKey = obj . pki . privateKeyToPem ( xwebCertAndKey . key ) ;
2019-12-01 23:52:32 +03:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-public.crt' ) , xwebCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-private.key' ) , xwebPrivateKey ) ;
2019-03-10 01:28:08 +03:00
r . dns [ i ] = { cert : xwebCertificate , key : xwebPrivateKey } ;
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
caindex = 1 ;
r . dns [ i ] . ca = [ ] ;
do {
caok = false ;
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
r . dns [ i ] . ca . push ( fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) , 'utf8' ) ) ) ;
2019-03-10 01:28:08 +03:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
}
2018-01-03 03:52:49 +03:00
}
}
}
}
2018-03-07 04:50:44 +03:00
// If the swarm server certificate exist, load it (This is an optional certificate)
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'swarmserver-cert-public.crt' ) && obj . fileExists ( 'swarmserver-cert-private.key' ) ) {
r . swarmserver = { cert : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'swarmserver-cert-public.crt' ) , 'utf8' ) ) , key : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( "swarmserver-cert-private.key" ) , 'utf8' ) ) } ;
2018-03-07 04:50:44 +03:00
}
// If the swarm server root certificate exist, load it (This is an optional certificate)
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'swarmserverroot-cert-public.crt' ) ) {
r . swarmserverroot = { cert : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'swarmserverroot-cert-public.crt' ) , 'utf8' ) ) } ;
2018-03-07 04:50:44 +03:00
}
// If CA certificates are present, load them
if ( r . web != null ) {
2018-08-30 03:40:30 +03:00
caindex = 1 ;
r . web . ca = [ ] ;
2018-03-07 04:50:44 +03:00
do {
caok = false ;
2019-12-01 23:52:32 +03:00
if ( obj . fileExists ( 'webserver-cert-chain' + caindex + '.crt' ) ) {
r . web . ca . push ( fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'webserver-cert-chain' + caindex + '.crt' ) , 'utf8' ) ) ) ;
2018-03-07 04:50:44 +03:00
caok = true ;
}
caindex ++ ;
2018-08-30 03:40:30 +03:00
} while ( caok === true ) ;
2018-03-07 04:50:44 +03:00
}
2017-08-28 19:27:45 +03:00
if ( func != undefined ) { func ( r ) ; }
return r ;
2018-08-30 03:40:30 +03:00
} ;
2017-08-28 19:27:45 +03:00
2018-01-12 22:41:26 +03:00
// Accelerators, used to dispatch work to other processes
2019-12-01 23:52:32 +03:00
const fork = require ( 'child_process' ) . fork ;
const program = require ( 'path' ) . join ( _ _dirname , 'meshaccelerator.js' ) ;
const acceleratorTotalCount = require ( 'os' ) . cpus ( ) . length ; // TODO: Check if this accelerator can scale.
2018-01-12 22:41:26 +03:00
var acceleratorCreateCount = acceleratorTotalCount ;
2018-01-10 07:13:41 +03:00
var freeAccelerators = [ ] ;
2018-01-12 22:41:26 +03:00
var pendingAccelerator = [ ] ;
obj . acceleratorCertStore = null ;
2018-01-10 07:13:41 +03:00
2019-05-02 01:02:03 +03:00
// Accelerator Stats
var getAcceleratorFuncCalls = 0 ;
var acceleratorStartFuncCall = 0 ;
var acceleratorPerformSignatureFuncCall = 0 ;
var acceleratorPerformSignaturePushFuncCall = 0 ;
var acceleratorPerformSignatureRunFuncCall = 0 ;
var acceleratorMessage = 0 ;
var acceleratorMessageException = 0 ;
var acceleratorMessageLastException = null ;
var acceleratorException = 0 ;
var acceleratorLastException = null ;
// Get stats about the accelerators
obj . getAcceleratorStats = function ( ) {
return {
acceleratorTotalCount : acceleratorTotalCount ,
acceleratorCreateCount : acceleratorCreateCount ,
freeAccelerators : freeAccelerators . length ,
pendingAccelerator : pendingAccelerator . length ,
getAcceleratorFuncCalls : getAcceleratorFuncCalls ,
startFuncCall : acceleratorStartFuncCall ,
performSignatureFuncCall : acceleratorPerformSignatureFuncCall ,
performSignaturePushFuncCall : acceleratorPerformSignaturePushFuncCall ,
performSignatureRunFuncCall : acceleratorPerformSignatureRunFuncCall ,
message : acceleratorMessage ,
messageException : acceleratorMessageException ,
messageLastException : acceleratorMessageLastException ,
exception : acceleratorException ,
lastException : acceleratorLastException
} ;
}
2018-01-10 07:13:41 +03:00
// Create a new accelerator module
2018-01-12 22:41:26 +03:00
obj . getAccelerator = function ( ) {
2019-05-02 01:02:03 +03:00
getAcceleratorFuncCalls ++ ;
2018-01-12 22:41:26 +03:00
if ( obj . acceleratorCertStore == null ) { return null ; }
2018-01-10 07:13:41 +03:00
if ( freeAccelerators . length > 0 ) { return freeAccelerators . pop ( ) ; }
if ( acceleratorCreateCount > 0 ) {
2018-01-12 22:41:26 +03:00
acceleratorCreateCount -- ;
2019-12-01 23:52:32 +03:00
var accelerator = fork ( program , [ ] , { stdio : [ 'pipe' , 'pipe' , 'pipe' , 'ipc' ] } ) ;
2018-08-21 21:02:35 +03:00
accelerator . accid = acceleratorCreateCount ;
2019-12-01 23:52:32 +03:00
accelerator . on ( 'message' , function ( message ) {
2019-05-02 01:02:03 +03:00
acceleratorMessage ++ ;
2020-02-14 22:20:06 +03:00
if ( this . x . func ) { this . x . func ( this . x . tag , message ) ; }
2019-05-03 19:59:09 +03:00
delete this . x ;
if ( pendingAccelerator . length > 0 ) { this . send ( this . x = pendingAccelerator . shift ( ) ) ; } else { freeAccelerators . push ( this ) ; }
2018-08-21 21:02:35 +03:00
} ) ;
2019-12-01 23:52:32 +03:00
accelerator . on ( 'exit' , function ( code ) {
2019-05-03 19:59:09 +03:00
if ( this . x ) { pendingAccelerator . push ( this . x ) ; delete this . x ; }
acceleratorCreateCount ++ ;
if ( pendingAccelerator . length > 0 ) { var acc = obj . getAccelerator ( ) ; acc . send ( acc . x = pendingAccelerator . shift ( ) ) ; }
} ) ;
2019-12-01 23:52:32 +03:00
accelerator . on ( 'error' , function ( code ) { } ) ; // Not sure if somethign should be done here to help kill the process.
accelerator . send ( { action : 'setState' , certs : obj . acceleratorCertStore } ) ;
2018-01-10 07:13:41 +03:00
return accelerator ;
}
return null ;
2018-08-30 03:40:30 +03:00
} ;
2018-01-10 07:13:41 +03:00
2018-08-30 03:40:30 +03:00
// Set the state of the accelerators. This way, we don"t have to send certificate & keys to them each time.
2018-01-12 22:41:26 +03:00
obj . acceleratorStart = function ( certificates ) {
2019-05-02 01:02:03 +03:00
acceleratorStartFuncCall ++ ;
2018-08-30 03:40:30 +03:00
if ( obj . acceleratorCertStore != null ) { console . error ( "ERROR: Accelerators can only be started once." ) ; return ; }
2018-01-10 07:13:41 +03:00
obj . acceleratorCertStore = [ { cert : certificates . agent . cert , key : certificates . agent . key } ] ;
if ( certificates . swarmserver != null ) { obj . acceleratorCertStore . push ( { cert : certificates . swarmserver . cert , key : certificates . swarmserver . key } ) ; }
2018-08-30 03:40:30 +03:00
} ;
2018-01-10 07:13:41 +03:00
// Perform any RSA signature, just pass in the private key and data.
2018-08-21 21:02:35 +03:00
obj . acceleratorPerformSignature = function ( privatekey , data , tag , func ) {
2019-05-02 01:02:03 +03:00
acceleratorPerformSignatureFuncCall ++ ;
2018-01-12 22:41:26 +03:00
if ( acceleratorTotalCount <= 1 ) {
2018-01-10 07:13:41 +03:00
// No accelerators available
2019-12-01 23:52:32 +03:00
if ( typeof privatekey == 'number' ) { privatekey = obj . acceleratorCertStore [ privatekey ] . key ; }
const sign = obj . crypto . createSign ( 'SHA384' ) ;
sign . end ( Buffer . from ( data , 'binary' ) ) ;
try { func ( tag , sign . sign ( privatekey ) . toString ( 'binary' ) ) ; } catch ( ex ) { acceleratorMessageException ++ ; acceleratorMessageLastException = ex ; }
2018-01-10 07:13:41 +03:00
} else {
2018-01-12 22:41:26 +03:00
var acc = obj . getAccelerator ( ) ;
if ( acc == null ) {
// Add to pending accelerator workload
2019-05-02 01:02:03 +03:00
acceleratorPerformSignaturePushFuncCall ++ ;
2019-12-01 23:52:32 +03:00
pendingAccelerator . push ( { action : 'sign' , key : privatekey , data : data , tag : tag , func : func } ) ;
2018-01-12 22:41:26 +03:00
} else {
// Send to accelerator now
2019-05-02 01:02:03 +03:00
acceleratorPerformSignatureRunFuncCall ++ ;
2019-12-01 23:52:32 +03:00
acc . send ( acc . x = { action : 'sign' , key : privatekey , data : data , tag : tag , func : func } ) ;
2018-01-12 22:41:26 +03:00
}
2018-01-10 07:13:41 +03:00
}
2018-08-30 03:40:30 +03:00
} ;
2018-01-10 07:13:41 +03:00
2020-02-14 22:20:06 +03:00
// Perform any general operation
obj . acceleratorPerformOperation = function ( operation , data , tag , func ) {
if ( acceleratorTotalCount <= 1 ) {
// No accelerators available
2020-03-02 23:36:52 +03:00
require ( program ) . processMessage ( { action : operation , data : data , tag : tag , func : func } ) ;
2020-02-14 22:20:06 +03:00
} else {
var acc = obj . getAccelerator ( ) ;
if ( acc == null ) {
// Add to pending accelerator workload
acceleratorPerformSignaturePushFuncCall ++ ;
pendingAccelerator . push ( { action : operation , data : data , tag : tag , func : func } ) ;
} else {
// Send to accelerator now
acceleratorPerformSignatureRunFuncCall ++ ;
acc . send ( acc . x = { action : operation , data : data , tag : tag , func : func } ) ;
}
}
} ;
2017-08-28 19:27:45 +03:00
return obj ;
} ;