mirror of
https://github.com/smallstep/certificates.git
synced 2024-10-31 03:20:16 +00:00
a3cda9c3d7
To support SCEP clients that expect a specific path segment in a SCEP URL, a new "customPath" option was added to the SCEP provisioner configuration. The configuration can be used to set a specific path (segment) that the SCEP provisioner will respond to.
400 lines
11 KiB
Go
400 lines
11 KiB
Go
package api
|
|
|
|
import (
|
|
"context"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"strings"
|
|
|
|
"github.com/go-chi/chi"
|
|
"github.com/smallstep/certificates/api"
|
|
"github.com/smallstep/certificates/authority/provisioner"
|
|
"github.com/smallstep/certificates/scep"
|
|
"go.mozilla.org/pkcs7"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
microscep "github.com/micromdm/scep/v2/scep"
|
|
)
|
|
|
|
const (
|
|
opnGetCACert = "GetCACert"
|
|
opnGetCACaps = "GetCACaps"
|
|
opnPKIOperation = "PKIOperation"
|
|
|
|
// TODO: add other (more optional) operations and handling
|
|
)
|
|
|
|
const maxPayloadSize = 2 << 20
|
|
|
|
type nextHTTP = func(http.ResponseWriter, *http.Request)
|
|
|
|
const (
|
|
certChainHeader = "application/x-x509-ca-ra-cert"
|
|
leafHeader = "application/x-x509-ca-cert"
|
|
pkiOperationHeader = "application/x-pki-message"
|
|
)
|
|
|
|
// SCEPRequest is a SCEP server request.
|
|
type SCEPRequest struct {
|
|
Operation string
|
|
Message []byte
|
|
}
|
|
|
|
// SCEPResponse is a SCEP server response.
|
|
type SCEPResponse struct {
|
|
Operation string
|
|
CACertNum int
|
|
Data []byte
|
|
Certificate *x509.Certificate
|
|
Error error
|
|
}
|
|
|
|
// Handler is the SCEP request handler.
|
|
type Handler struct {
|
|
Auth scep.Interface
|
|
}
|
|
|
|
// New returns a new SCEP API router.
|
|
func New(scepAuth scep.Interface) api.RouterHandler {
|
|
return &Handler{scepAuth}
|
|
}
|
|
|
|
// Route traffic and implement the Router interface.
|
|
func (h *Handler) Route(r api.Router) {
|
|
getLink := h.Auth.GetLinkExplicit
|
|
r.MethodFunc(http.MethodGet, getLink("{provisionerName}/{customPath}*", false, nil), h.lookupProvisioner(h.Get))
|
|
r.MethodFunc(http.MethodGet, getLink("{provisionerName}", false, nil), h.lookupProvisioner(h.Get))
|
|
r.MethodFunc(http.MethodPost, getLink("{provisionerName}/{customPath}*", false, nil), h.lookupProvisioner(h.Post))
|
|
r.MethodFunc(http.MethodPost, getLink("{provisionerName}", false, nil), h.lookupProvisioner(h.Post))
|
|
}
|
|
|
|
// Get handles all SCEP GET requests
|
|
func (h *Handler) Get(w http.ResponseWriter, r *http.Request) {
|
|
|
|
request, err := decodeSCEPRequest(r)
|
|
if err != nil {
|
|
writeError(w, errors.Wrap(err, "invalid scep get request"))
|
|
return
|
|
}
|
|
|
|
ctx := r.Context()
|
|
var response SCEPResponse
|
|
|
|
switch request.Operation {
|
|
case opnGetCACert:
|
|
response, err = h.GetCACert(ctx)
|
|
case opnGetCACaps:
|
|
response, err = h.GetCACaps(ctx)
|
|
case opnPKIOperation:
|
|
// TODO: implement the GET for PKI operation? Default CACAPS doesn't specify this is in use, though
|
|
default:
|
|
err = errors.Errorf("unknown operation: %s", request.Operation)
|
|
}
|
|
|
|
if err != nil {
|
|
writeError(w, errors.Wrap(err, "scep get request failed"))
|
|
return
|
|
}
|
|
|
|
writeSCEPResponse(w, response)
|
|
}
|
|
|
|
// Post handles all SCEP POST requests
|
|
func (h *Handler) Post(w http.ResponseWriter, r *http.Request) {
|
|
|
|
request, err := decodeSCEPRequest(r)
|
|
if err != nil {
|
|
writeError(w, errors.Wrap(err, "invalid scep post request"))
|
|
return
|
|
}
|
|
|
|
ctx := r.Context()
|
|
var response SCEPResponse
|
|
|
|
switch request.Operation {
|
|
case opnPKIOperation:
|
|
response, err = h.PKIOperation(ctx, request)
|
|
default:
|
|
err = errors.Errorf("unknown operation: %s", request.Operation)
|
|
}
|
|
|
|
if err != nil {
|
|
writeError(w, errors.Wrap(err, "scep post request failed"))
|
|
return
|
|
}
|
|
|
|
writeSCEPResponse(w, response)
|
|
}
|
|
|
|
func decodeSCEPRequest(r *http.Request) (SCEPRequest, error) {
|
|
|
|
defer r.Body.Close()
|
|
|
|
method := r.Method
|
|
query := r.URL.Query()
|
|
|
|
var operation string
|
|
if _, ok := query["operation"]; ok {
|
|
operation = query.Get("operation")
|
|
}
|
|
|
|
switch method {
|
|
case http.MethodGet:
|
|
switch operation {
|
|
case opnGetCACert, opnGetCACaps:
|
|
return SCEPRequest{
|
|
Operation: operation,
|
|
Message: []byte{},
|
|
}, nil
|
|
case opnPKIOperation:
|
|
var message string
|
|
if _, ok := query["message"]; ok {
|
|
message = query.Get("message")
|
|
}
|
|
// TODO: verify this; it seems like it should be StdEncoding instead of URLEncoding
|
|
decodedMessage, err := base64.URLEncoding.DecodeString(message)
|
|
if err != nil {
|
|
return SCEPRequest{}, err
|
|
}
|
|
return SCEPRequest{
|
|
Operation: operation,
|
|
Message: decodedMessage,
|
|
}, nil
|
|
default:
|
|
return SCEPRequest{}, errors.Errorf("unsupported operation: %s", operation)
|
|
}
|
|
case http.MethodPost:
|
|
body, err := io.ReadAll(io.LimitReader(r.Body, maxPayloadSize))
|
|
if err != nil {
|
|
return SCEPRequest{}, err
|
|
}
|
|
return SCEPRequest{
|
|
Operation: operation,
|
|
Message: body,
|
|
}, nil
|
|
default:
|
|
return SCEPRequest{}, errors.Errorf("unsupported method: %s", method)
|
|
}
|
|
}
|
|
|
|
// lookupProvisioner loads the provisioner associated with the request.
|
|
// Responds 404 if the provisioner does not exist.
|
|
func (h *Handler) lookupProvisioner(next nextHTTP) nextHTTP {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
name := chi.URLParam(r, "provisionerName")
|
|
provisionerName, err := url.PathUnescape(name)
|
|
if err != nil {
|
|
api.WriteError(w, errors.Errorf("error url unescaping provisioner name '%s'", name))
|
|
return
|
|
}
|
|
|
|
customPathParam := chi.URLParam(r, "customPath")
|
|
customPath, err := url.PathUnescape(customPathParam)
|
|
if err != nil {
|
|
api.WriteError(w, err)
|
|
return
|
|
}
|
|
|
|
p, err := h.Auth.LoadProvisionerByName(provisionerName)
|
|
if err != nil {
|
|
api.WriteError(w, err)
|
|
return
|
|
}
|
|
|
|
prov, ok := p.(*provisioner.SCEP)
|
|
if !ok {
|
|
api.WriteError(w, errors.New("provisioner must be of type SCEP"))
|
|
return
|
|
}
|
|
|
|
configuredCustomPath := strings.Trim(prov.CustomPath, "/")
|
|
if customPath != configuredCustomPath {
|
|
api.WriteError(w, errors.Errorf("custom path requested '%s' is not the expected path '%s'", customPath, configuredCustomPath))
|
|
return
|
|
}
|
|
|
|
ctx := r.Context()
|
|
ctx = context.WithValue(ctx, scep.ProvisionerContextKey, scep.Provisioner(prov))
|
|
next(w, r.WithContext(ctx))
|
|
}
|
|
}
|
|
|
|
// GetCACert returns the CA certificates in a SCEP response
|
|
func (h *Handler) GetCACert(ctx context.Context) (SCEPResponse, error) {
|
|
|
|
certs, err := h.Auth.GetCACertificates(ctx)
|
|
if err != nil {
|
|
return SCEPResponse{}, err
|
|
}
|
|
|
|
if len(certs) == 0 {
|
|
return SCEPResponse{}, errors.New("missing CA cert")
|
|
}
|
|
|
|
response := SCEPResponse{
|
|
Operation: opnGetCACert,
|
|
CACertNum: len(certs),
|
|
}
|
|
|
|
if len(certs) == 1 {
|
|
response.Data = certs[0].Raw
|
|
} else {
|
|
// create degenerate pkcs7 certificate structure, according to
|
|
// https://tools.ietf.org/html/rfc8894#section-4.2.1.2, because
|
|
// not signed or encrypted data has to be returned.
|
|
data, err := microscep.DegenerateCertificates(certs)
|
|
if err != nil {
|
|
return SCEPResponse{}, err
|
|
}
|
|
response.Data = data
|
|
}
|
|
|
|
return response, nil
|
|
}
|
|
|
|
// GetCACaps returns the CA capabilities in a SCEP response
|
|
func (h *Handler) GetCACaps(ctx context.Context) (SCEPResponse, error) {
|
|
|
|
caps := h.Auth.GetCACaps(ctx)
|
|
|
|
response := SCEPResponse{
|
|
Operation: opnGetCACaps,
|
|
Data: formatCapabilities(caps),
|
|
}
|
|
|
|
return response, nil
|
|
}
|
|
|
|
// PKIOperation performs PKI operations and returns a SCEP response
|
|
func (h *Handler) PKIOperation(ctx context.Context, request SCEPRequest) (SCEPResponse, error) {
|
|
|
|
// parse the message using microscep implementation
|
|
microMsg, err := microscep.ParsePKIMessage(request.Message)
|
|
if err != nil {
|
|
// return the error, because we can't use the msg for creating a CertRep
|
|
return SCEPResponse{}, err
|
|
}
|
|
|
|
// this is essentially doing the same as microscep.ParsePKIMessage, but
|
|
// gives us access to the p7 itself in scep.PKIMessage. Essentially a small
|
|
// wrapper for the microscep implementation.
|
|
p7, err := pkcs7.Parse(microMsg.Raw)
|
|
if err != nil {
|
|
return SCEPResponse{}, err
|
|
}
|
|
|
|
// copy over properties to our internal PKIMessage
|
|
msg := &scep.PKIMessage{
|
|
TransactionID: microMsg.TransactionID,
|
|
MessageType: microMsg.MessageType,
|
|
SenderNonce: microMsg.SenderNonce,
|
|
Raw: microMsg.Raw,
|
|
P7: p7,
|
|
}
|
|
|
|
if err := h.Auth.DecryptPKIEnvelope(ctx, msg); err != nil {
|
|
return SCEPResponse{}, err
|
|
}
|
|
|
|
// NOTE: at this point we have sufficient information for returning nicely signed CertReps
|
|
csr := msg.CSRReqMessage.CSR
|
|
|
|
// NOTE: we're blocking the RenewalReq if the challenge does not match, because otherwise we don't have any authentication.
|
|
// The macOS SCEP client performs renewals using PKCSreq. The CertNanny SCEP client will use PKCSreq with challenge too, it seems,
|
|
// even if using the renewal flow as described in the README.md. MicroMDM SCEP client also only does PKCSreq by default, unless
|
|
// a certificate exists; then it will use RenewalReq. Adding the challenge check here may be a small breaking change for clients.
|
|
// We'll have to see how it works out.
|
|
if msg.MessageType == microscep.PKCSReq || msg.MessageType == microscep.RenewalReq {
|
|
challengeMatches, err := h.Auth.MatchChallengePassword(ctx, msg.CSRReqMessage.ChallengePassword)
|
|
if err != nil {
|
|
return h.createFailureResponse(ctx, csr, msg, microscep.BadRequest, errors.New("error when checking password"))
|
|
}
|
|
if !challengeMatches {
|
|
// TODO: can this be returned safely to the client? In the end, if the password was correct, that gains a bit of info too.
|
|
return h.createFailureResponse(ctx, csr, msg, microscep.BadRequest, errors.New("wrong password provided"))
|
|
}
|
|
}
|
|
|
|
// TODO: authorize renewal: we can authorize renewals with the challenge password (if reusable secrets are used).
|
|
// Renewals OPTIONALLY include the challenge if the existing cert is used as authentication, but client SHOULD omit the challenge.
|
|
// This means that for renewal requests we should check the certificate provided to be signed before by the CA. We could
|
|
// enforce use of the challenge if we want too. That way we could be more flexible in terms of authentication scheme (i.e. reusing
|
|
// tokens from other provisioners, calling a webhook, storing multiple secrets, allowing them to be multi-use, etc).
|
|
// Authentication by the (self-signed) certificate with an optional challenge is required; supporting renewals incl. verification
|
|
// of the client cert is not.
|
|
|
|
certRep, err := h.Auth.SignCSR(ctx, csr, msg)
|
|
if err != nil {
|
|
return h.createFailureResponse(ctx, csr, msg, microscep.BadRequest, errors.Wrap(err, "error when signing new certificate"))
|
|
}
|
|
|
|
response := SCEPResponse{
|
|
Operation: opnPKIOperation,
|
|
Data: certRep.Raw,
|
|
Certificate: certRep.Certificate,
|
|
}
|
|
|
|
return response, nil
|
|
}
|
|
|
|
func formatCapabilities(caps []string) []byte {
|
|
return []byte(strings.Join(caps, "\r\n"))
|
|
}
|
|
|
|
// writeSCEPResponse writes a SCEP response back to the SCEP client.
|
|
func writeSCEPResponse(w http.ResponseWriter, response SCEPResponse) {
|
|
|
|
if response.Error != nil {
|
|
api.LogError(w, response.Error)
|
|
}
|
|
|
|
if response.Certificate != nil {
|
|
api.LogCertificate(w, response.Certificate)
|
|
}
|
|
|
|
w.Header().Set("Content-Type", contentHeader(response))
|
|
_, err := w.Write(response.Data)
|
|
if err != nil {
|
|
writeError(w, errors.Wrap(err, "error when writing scep response")) // This could end up as an error again
|
|
}
|
|
}
|
|
|
|
func writeError(w http.ResponseWriter, err error) {
|
|
scepError := &scep.Error{
|
|
Message: err.Error(),
|
|
Status: http.StatusInternalServerError, // TODO: make this a param?
|
|
}
|
|
api.WriteError(w, scepError)
|
|
}
|
|
|
|
func (h *Handler) createFailureResponse(ctx context.Context, csr *x509.CertificateRequest, msg *scep.PKIMessage, info microscep.FailInfo, failError error) (SCEPResponse, error) {
|
|
certRepMsg, err := h.Auth.CreateFailureResponse(ctx, csr, msg, scep.FailInfoName(info), failError.Error())
|
|
if err != nil {
|
|
return SCEPResponse{}, err
|
|
}
|
|
return SCEPResponse{
|
|
Operation: opnPKIOperation,
|
|
Data: certRepMsg.Raw,
|
|
Error: failError,
|
|
}, nil
|
|
}
|
|
|
|
func contentHeader(r SCEPResponse) string {
|
|
switch r.Operation {
|
|
case opnGetCACert:
|
|
if r.CACertNum > 1 {
|
|
return certChainHeader
|
|
}
|
|
return leafHeader
|
|
case opnPKIOperation:
|
|
return pkiOperationHeader
|
|
default:
|
|
return "text/plain"
|
|
}
|
|
}
|