package api import ( "context" "crypto/x509" "encoding/base64" "errors" "fmt" "io" "io/ioutil" "net/http" "net/url" "strings" "github.com/go-chi/chi" "github.com/smallstep/certificates/api" "github.com/smallstep/certificates/authority/provisioner" "github.com/smallstep/certificates/scep" microscep "github.com/micromdm/scep/scep" ) const ( opnGetCACert = "GetCACert" opnGetCACaps = "GetCACaps" opnPKIOperation = "PKIOperation" // TODO: add other (more optional) operations and handling ) const maxPayloadSize = 2 << 20 type nextHTTP = func(http.ResponseWriter, *http.Request) var ( // TODO: check the default capabilities; https://tools.ietf.org/html/rfc8894#section-3.5.2 // TODO: move capabilities to Authority or Provisioner, so that they can be configured? defaultCapabilities = []string{ "Renewal", "SHA-1", "SHA-256", "AES", "DES3", "SCEPStandard", "POSTPKIOperation", } ) const ( certChainHeader = "application/x-x509-ca-ra-cert" leafHeader = "application/x-x509-ca-cert" pkiOpHeader = "application/x-pki-message" ) // SCEPRequest is a SCEP server request. type SCEPRequest struct { Operation string Message []byte } // SCEPResponse is a SCEP server response. type SCEPResponse struct { Operation string CACertNum int Data []byte Certificate *x509.Certificate } // Handler is the SCEP request handler. type Handler struct { Auth scep.Interface } // New returns a new SCEP API router. func New(scepAuth scep.Interface) api.RouterHandler { return &Handler{scepAuth} } // Route traffic and implement the Router interface. func (h *Handler) Route(r api.Router) { getLink := h.Auth.GetLinkExplicit r.MethodFunc(http.MethodGet, getLink("{provisionerID}", false, nil), h.lookupProvisioner(h.Get)) r.MethodFunc(http.MethodPost, getLink("{provisionerID}", false, nil), h.lookupProvisioner(h.Post)) } // Get handles all SCEP GET requests func (h *Handler) Get(w http.ResponseWriter, r *http.Request) { request, err := decodeSCEPRequest(r) if err != nil { writeError(w, fmt.Errorf("not a scep get request: %w", err)) return } ctx := r.Context() var response SCEPResponse switch request.Operation { case opnGetCACert: response, err = h.GetCACert(ctx) case opnGetCACaps: response, err = h.GetCACaps(ctx) case opnPKIOperation: // TODO: implement the GET for PKI operation default: err = fmt.Errorf("unknown operation: %s", request.Operation) } if err != nil { writeError(w, fmt.Errorf("get request failed: %w", err)) return } writeSCEPResponse(w, response) } // Post handles all SCEP POST requests func (h *Handler) Post(w http.ResponseWriter, r *http.Request) { request, err := decodeSCEPRequest(r) if err != nil { writeError(w, fmt.Errorf("not a scep post request: %w", err)) return } ctx := r.Context() var response SCEPResponse switch request.Operation { case opnPKIOperation: response, err = h.PKIOperation(ctx, request) default: err = fmt.Errorf("unknown operation: %s", request.Operation) } if err != nil { writeError(w, fmt.Errorf("post request failed: %w", err)) return } api.LogCertificate(w, response.Certificate) writeSCEPResponse(w, response) } func decodeSCEPRequest(r *http.Request) (SCEPRequest, error) { defer r.Body.Close() method := r.Method query := r.URL.Query() var operation string if _, ok := query["operation"]; ok { operation = query.Get("operation") } switch method { case http.MethodGet: switch operation { case opnGetCACert, opnGetCACaps: return SCEPRequest{ Operation: operation, Message: []byte{}, }, nil case opnPKIOperation: var message string if _, ok := query["message"]; ok { message = query.Get("message") } decodedMessage, err := base64.URLEncoding.DecodeString(message) if err != nil { return SCEPRequest{}, err } return SCEPRequest{ Operation: operation, Message: decodedMessage, }, nil default: return SCEPRequest{}, fmt.Errorf("unsupported operation: %s", operation) } case http.MethodPost: body, err := ioutil.ReadAll(io.LimitReader(r.Body, maxPayloadSize)) if err != nil { return SCEPRequest{}, err } return SCEPRequest{ Operation: operation, Message: body, }, nil default: return SCEPRequest{}, fmt.Errorf("unsupported method: %s", method) } } // lookupProvisioner loads the provisioner associated with the request. // Responds 404 if the provisioner does not exist. func (h *Handler) lookupProvisioner(next nextHTTP) nextHTTP { return func(w http.ResponseWriter, r *http.Request) { name := chi.URLParam(r, "provisionerID") provisionerID, err := url.PathUnescape(name) if err != nil { api.WriteError(w, fmt.Errorf("error url unescaping provisioner id '%s'", name)) return } p, err := h.Auth.LoadProvisionerByID("scep/" + provisionerID) if err != nil { writeError(w, err) return } provisioner, ok := p.(*provisioner.SCEP) if !ok { writeError(w, errors.New("provisioner must be of type SCEP")) return } ctx := r.Context() ctx = context.WithValue(ctx, scep.ProvisionerContextKey, scep.Provisioner(provisioner)) next(w, r.WithContext(ctx)) } } // GetCACert returns the CA certificates in a SCEP response func (h *Handler) GetCACert(ctx context.Context) (SCEPResponse, error) { certs, err := h.Auth.GetCACertificates() if err != nil { return SCEPResponse{}, err } if len(certs) == 0 { return SCEPResponse{}, errors.New("missing CA cert") } response := SCEPResponse{Operation: opnGetCACert} response.CACertNum = len(certs) if len(certs) == 1 { response.Data = certs[0].Raw } else { data, err := microscep.DegenerateCertificates(certs) if err != nil { return SCEPResponse{}, err } response.Data = data } return response, nil } // GetCACaps returns the CA capabilities in a SCEP response func (h *Handler) GetCACaps(ctx context.Context) (SCEPResponse, error) { response := SCEPResponse{Operation: opnGetCACaps} // TODO: get the actual capabilities from provisioner config response.Data = formatCapabilities(defaultCapabilities) return response, nil } // PKIOperation performs PKI operations and returns a SCEP response func (h *Handler) PKIOperation(ctx context.Context, request SCEPRequest) (SCEPResponse, error) { response := SCEPResponse{Operation: opnPKIOperation} fmt.Println("BEFORE PARSING") microMsg, err := microscep.ParsePKIMessage(request.Message) if err != nil { return SCEPResponse{}, err } msg := &scep.PKIMessage{ TransactionID: microMsg.TransactionID, MessageType: microMsg.MessageType, SenderNonce: microMsg.SenderNonce, Raw: microMsg.Raw, } fmt.Println("len raw:", len(microMsg.Raw)) fmt.Println("AFTER PARSING") if err := h.Auth.DecryptPKIEnvelope(ctx, msg); err != nil { fmt.Println("ERROR IN DECRYPTPKIENVELOPE") return SCEPResponse{}, err } if msg.MessageType == microscep.PKCSReq { // TODO: CSR validation, like challenge password } csr := msg.CSRReqMessage.CSR certRep, err := h.Auth.SignCSR(ctx, csr, msg) if err != nil { return SCEPResponse{}, err } // //cert := certRep.CertRepMessage.Certificate // //name := certName(cert) // // TODO: check if CN already exists, if renewal is allowed and if existing should be revoked; fail if not // // TODO: store the new cert for CN locally; should go into the DB response.Data = certRep.Raw response.Certificate = certRep.Certificate fmt.Println("HERE!!!") return response, nil } func certName(cert *x509.Certificate) string { if cert.Subject.CommonName != "" { return cert.Subject.CommonName } return string(cert.Signature) } func formatCapabilities(caps []string) []byte { return []byte(strings.Join(caps, "\r\n")) } // writeSCEPResponse writes a SCEP response back to the SCEP client. func writeSCEPResponse(w http.ResponseWriter, response SCEPResponse) { w.Header().Set("Content-Type", contentHeader(response)) _, err := w.Write(response.Data) if err != nil { writeError(w, fmt.Errorf("error when writing scep response: %w", err)) // This could end up as an error again } } func writeError(w http.ResponseWriter, err error) { scepError := &scep.Error{ Message: err.Error(), Status: http.StatusInternalServerError, // TODO: make this a param? } api.WriteError(w, scepError) } func contentHeader(r SCEPResponse) string { switch r.Operation { case opnGetCACert: if r.CACertNum > 1 { return certChainHeader } return leafHeader case opnPKIOperation: return pkiOpHeader default: return "text/plain" } }