2022-05-11 17:04:54 +00:00
|
|
|
package pki
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/ed25519"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/sha256"
|
|
|
|
"crypto/sha512"
|
|
|
|
"crypto/x509"
|
|
|
|
"crypto/x509/pkix"
|
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
|
|
|
"hash"
|
2022-08-31 20:25:14 +00:00
|
|
|
"io"
|
2022-05-11 17:04:54 +00:00
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/api"
|
|
|
|
"github.com/hashicorp/vault/sdk/helper/certutil"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Setup helpers
|
2022-05-11 17:29:57 +00:00
|
|
|
func createBackendWithStorage(t testing.TB) (*backend, logical.Storage) {
|
2022-05-11 17:04:54 +00:00
|
|
|
config := logical.TestBackendConfig()
|
|
|
|
config.StorageView = &logical.InmemStorage{}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
b := Backend(config)
|
|
|
|
err = b.Setup(context.Background(), config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Assume for our tests we have performed the migration already.
|
|
|
|
b.pkiStorageVersion.Store(1)
|
|
|
|
return b, config.StorageView
|
|
|
|
}
|
|
|
|
|
2022-05-11 17:29:57 +00:00
|
|
|
func mountPKIEndpoint(t testing.TB, client *api.Client, path string) {
|
2022-08-31 20:25:14 +00:00
|
|
|
err := client.Sys().Mount(path, &api.MountInput{
|
2022-05-11 17:04:54 +00:00
|
|
|
Type: "pki",
|
|
|
|
Config: api.MountConfigInput{
|
|
|
|
DefaultLeaseTTL: "16h",
|
|
|
|
MaxLeaseTTL: "32h",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err, "failed mounting pki endpoint")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Signing helpers
|
|
|
|
func requireSignedBy(t *testing.T, cert *x509.Certificate, key crypto.PublicKey) {
|
2022-08-31 20:25:14 +00:00
|
|
|
switch typedKey := key.(type) {
|
2022-05-11 17:04:54 +00:00
|
|
|
case *rsa.PublicKey:
|
2022-08-31 20:25:14 +00:00
|
|
|
requireRSASignedBy(t, cert, typedKey)
|
2022-05-11 17:04:54 +00:00
|
|
|
case *ecdsa.PublicKey:
|
2022-08-31 20:25:14 +00:00
|
|
|
requireECDSASignedBy(t, cert, typedKey)
|
2022-05-11 17:04:54 +00:00
|
|
|
case ed25519.PublicKey:
|
2022-08-31 20:25:14 +00:00
|
|
|
requireED25519SignedBy(t, cert, typedKey)
|
2022-05-11 17:04:54 +00:00
|
|
|
default:
|
|
|
|
require.Fail(t, "unknown public key type %#v", key)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireRSASignedBy(t *testing.T, cert *x509.Certificate, key *rsa.PublicKey) {
|
|
|
|
require.Contains(t, []x509.SignatureAlgorithm{x509.SHA256WithRSA, x509.SHA512WithRSA},
|
|
|
|
cert.SignatureAlgorithm, "only sha256 signatures supported")
|
|
|
|
|
|
|
|
var hasher hash.Hash
|
|
|
|
var hashAlgo crypto.Hash
|
|
|
|
|
|
|
|
switch cert.SignatureAlgorithm {
|
|
|
|
case x509.SHA256WithRSA:
|
|
|
|
hasher = sha256.New()
|
|
|
|
hashAlgo = crypto.SHA256
|
|
|
|
case x509.SHA512WithRSA:
|
|
|
|
hasher = sha512.New()
|
|
|
|
hashAlgo = crypto.SHA512
|
|
|
|
}
|
|
|
|
|
|
|
|
hasher.Write(cert.RawTBSCertificate)
|
|
|
|
hashData := hasher.Sum(nil)
|
|
|
|
|
|
|
|
err := rsa.VerifyPKCS1v15(key, hashAlgo, hashData, cert.Signature)
|
|
|
|
require.NoError(t, err, "the certificate was not signed by the expected public rsa key.")
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireECDSASignedBy(t *testing.T, cert *x509.Certificate, key *ecdsa.PublicKey) {
|
|
|
|
require.Contains(t, []x509.SignatureAlgorithm{x509.ECDSAWithSHA256, x509.ECDSAWithSHA512},
|
|
|
|
cert.SignatureAlgorithm, "only ecdsa signatures supported")
|
|
|
|
|
|
|
|
var hasher hash.Hash
|
|
|
|
switch cert.SignatureAlgorithm {
|
|
|
|
case x509.ECDSAWithSHA256:
|
|
|
|
hasher = sha256.New()
|
|
|
|
case x509.ECDSAWithSHA512:
|
|
|
|
hasher = sha512.New()
|
|
|
|
}
|
|
|
|
|
|
|
|
hasher.Write(cert.RawTBSCertificate)
|
|
|
|
hashData := hasher.Sum(nil)
|
|
|
|
|
|
|
|
verify := ecdsa.VerifyASN1(key, hashData, cert.Signature)
|
|
|
|
require.True(t, verify, "the certificate was not signed by the expected public ecdsa key.")
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireED25519SignedBy(t *testing.T, cert *x509.Certificate, key ed25519.PublicKey) {
|
|
|
|
require.Equal(t, x509.PureEd25519, cert.SignatureAlgorithm)
|
|
|
|
ed25519.Verify(key, cert.RawTBSCertificate, cert.Signature)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Certificate helper
|
|
|
|
func parseCert(t *testing.T, pemCert string) *x509.Certificate {
|
|
|
|
block, _ := pem.Decode([]byte(pemCert))
|
|
|
|
require.NotNil(t, block, "failed to decode PEM block")
|
|
|
|
|
|
|
|
cert, err := x509.ParseCertificate(block.Bytes)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return cert
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireMatchingPublicKeys(t *testing.T, cert *x509.Certificate, key crypto.PublicKey) {
|
|
|
|
certPubKey := cert.PublicKey
|
|
|
|
areEqual, err := certutil.ComparePublicKeysAndType(certPubKey, key)
|
|
|
|
require.NoError(t, err, "failed comparing public keys: %#v", err)
|
|
|
|
require.True(t, areEqual, "public keys mismatched: got: %v, expected: %v", certPubKey, key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSelfSigned(t *testing.T, subject, issuer *x509.Certificate, key *rsa.PrivateKey) (string, *x509.Certificate) {
|
|
|
|
t.Helper()
|
|
|
|
selfSigned, err := x509.CreateCertificate(rand.Reader, subject, issuer, key.Public(), key)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
cert, err := x509.ParseCertificate(selfSigned)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
pemSS := strings.TrimSpace(string(pem.EncodeToMemory(&pem.Block{
|
|
|
|
Type: "CERTIFICATE",
|
|
|
|
Bytes: selfSigned,
|
|
|
|
})))
|
|
|
|
return pemSS, cert
|
|
|
|
}
|
|
|
|
|
|
|
|
// CRL related helpers
|
|
|
|
func getCrlCertificateList(t *testing.T, client *api.Client, mountPoint string) pkix.TBSCertificateList {
|
|
|
|
path := fmt.Sprintf("/v1/%s/crl", mountPoint)
|
|
|
|
return getParsedCrlAtPath(t, client, path).TBSCertList
|
|
|
|
}
|
|
|
|
|
|
|
|
func parseCrlPemBytes(t *testing.T, crlPem []byte) pkix.TBSCertificateList {
|
|
|
|
certList, err := x509.ParseCRL(crlPem)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return certList.TBSCertList
|
|
|
|
}
|
|
|
|
|
2022-05-13 13:57:58 +00:00
|
|
|
func requireSerialNumberInCRL(t *testing.T, revokeList pkix.TBSCertificateList, serialNum string) bool {
|
2022-05-11 17:04:54 +00:00
|
|
|
serialsInList := make([]string, 0, len(revokeList.RevokedCertificates))
|
|
|
|
for _, revokeEntry := range revokeList.RevokedCertificates {
|
|
|
|
formattedSerial := certutil.GetHexFormatted(revokeEntry.SerialNumber.Bytes(), ":")
|
|
|
|
serialsInList = append(serialsInList, formattedSerial)
|
|
|
|
if formattedSerial == serialNum {
|
2022-05-13 13:57:58 +00:00
|
|
|
return true
|
2022-05-11 17:04:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-13 13:57:58 +00:00
|
|
|
if t != nil {
|
|
|
|
t.Fatalf("the serial number %s, was not found in the CRL list containing: %v", serialNum, serialsInList)
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
2022-05-11 17:04:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func getParsedCrl(t *testing.T, client *api.Client, mountPoint string) *pkix.CertificateList {
|
|
|
|
path := fmt.Sprintf("/v1/%s/crl", mountPoint)
|
|
|
|
return getParsedCrlAtPath(t, client, path)
|
|
|
|
}
|
|
|
|
|
|
|
|
func getParsedCrlAtPath(t *testing.T, client *api.Client, path string) *pkix.CertificateList {
|
|
|
|
req := client.NewRequest("GET", path)
|
|
|
|
resp, err := client.RawRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
|
2022-08-31 20:25:14 +00:00
|
|
|
crlBytes, err := io.ReadAll(resp.Body)
|
2022-05-11 17:04:54 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
if len(crlBytes) == 0 {
|
|
|
|
t.Fatalf("expected CRL in response body")
|
|
|
|
}
|
|
|
|
|
|
|
|
crl, err := x509.ParseDERCRL(crlBytes)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
return crl
|
|
|
|
}
|
2022-06-16 13:11:22 +00:00
|
|
|
|
|
|
|
func getParsedCrlFromBackend(t *testing.T, b *backend, s logical.Storage, path string) *pkix.CertificateList {
|
|
|
|
resp, err := CBRead(b, s, path)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
crl, err := x509.ParseDERCRL(resp.Data[logical.HTTPRawBody].([]byte))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
return crl
|
|
|
|
}
|
|
|
|
|
|
|
|
// Direct storage backend helpers (b, s := createBackendWithStorage(t)) which
|
|
|
|
// are mostly compatible with client.Logical() operations. The main difference
|
|
|
|
// is that the JSON round-tripping hasn't occurred, so values are as the
|
|
|
|
// backend returns them (e.g., []string instead of []interface{}).
|
|
|
|
func CBReq(b *backend, s logical.Storage, operation logical.Operation, path string, data map[string]interface{}) (*logical.Response, error) {
|
|
|
|
resp, err := b.HandleRequest(context.Background(), &logical.Request{
|
|
|
|
Operation: operation,
|
|
|
|
Path: path,
|
|
|
|
Data: data,
|
|
|
|
Storage: s,
|
|
|
|
MountPoint: "pki/",
|
|
|
|
})
|
|
|
|
if err != nil || resp == nil {
|
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if msg, ok := resp.Data["error"]; ok && msg != nil && len(msg.(string)) > 0 {
|
|
|
|
return resp, fmt.Errorf("%s", msg)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func CBRead(b *backend, s logical.Storage, path string) (*logical.Response, error) {
|
|
|
|
return CBReq(b, s, logical.ReadOperation, path, make(map[string]interface{}))
|
|
|
|
}
|
|
|
|
|
|
|
|
func CBWrite(b *backend, s logical.Storage, path string, data map[string]interface{}) (*logical.Response, error) {
|
|
|
|
return CBReq(b, s, logical.UpdateOperation, path, data)
|
|
|
|
}
|
|
|
|
|
Add PSS support to PKI Secrets Engine (#16519)
* Add PSS signature support to Vault PKI engine
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Use issuer's RevocationSigAlg for CRL signing
We introduce a new parameter on issuers, revocation_signature_algorithm
to control the signature algorithm used during CRL signing. This is
because the SignatureAlgorithm value from the certificate itself is
incorrect for this purpose: a RSA root could sign an ECDSA intermediate
with say, SHA256WithRSA, but when the intermediate goes to sign a CRL,
it must use ECDSAWithSHA256 or equivalent instead of SHA256WithRSA. When
coupled with support for PSS-only keys, allowing the user to set the
signature algorithm value as desired seems like the best approach.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add use_pss, revocation_signature_algorithm docs
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add PSS to signature role issuance test matrix
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add changelog
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Allow roots to self-identify revocation alg
When using PSS support with a managed key, sometimes the underlying
device will not support PKCS#1v1.5 signatures. This results in CRL
building failing, unless we update the entry's signature algorithm
prior to building the CRL for the new root.
With a RSA-type key and use_pss=true, we use the signature bits value to
decide which hash function to use for PSS support.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add clearer error message on failed import
When CRL building fails during cert/key import, due to PSS failures,
give a better indication to the user that import succeeded its just CRL
building that failed. This tells them the parameter to adjust on the
issuer and warns that CRL building will fail until this is fixed.
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Add case insensitive SigAlgo matching
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Convert UsePSS back to regular bool
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Refactor PSS->certTemplate into helper function
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Proper string output on rev_sig_alg display
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
* Copy root's SignatureAlgorithm for CRL building
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-03 16:42:24 +00:00
|
|
|
func CBPatch(b *backend, s logical.Storage, path string, data map[string]interface{}) (*logical.Response, error) {
|
|
|
|
return CBReq(b, s, logical.PatchOperation, path, data)
|
|
|
|
}
|
|
|
|
|
2022-06-16 13:11:22 +00:00
|
|
|
func CBList(b *backend, s logical.Storage, path string) (*logical.Response, error) {
|
|
|
|
return CBReq(b, s, logical.ListOperation, path, make(map[string]interface{}))
|
|
|
|
}
|
|
|
|
|
|
|
|
func CBDelete(b *backend, s logical.Storage, path string) (*logical.Response, error) {
|
|
|
|
return CBReq(b, s, logical.DeleteOperation, path, make(map[string]interface{}))
|
|
|
|
}
|
2022-08-22 18:06:15 +00:00
|
|
|
|
|
|
|
func requireFieldsSetInResp(t *testing.T, resp *logical.Response, fields ...string) {
|
|
|
|
var missingFields []string
|
|
|
|
for _, field := range fields {
|
|
|
|
value, ok := resp.Data[field]
|
|
|
|
if !ok || value == nil {
|
|
|
|
missingFields = append(missingFields, field)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
require.Empty(t, missingFields, "The following fields were required but missing from response:\n%v", resp.Data)
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireSuccessNonNilResponse(t *testing.T, resp *logical.Response, err error, msgAndArgs ...interface{}) {
|
|
|
|
require.NoError(t, err, msgAndArgs...)
|
|
|
|
require.False(t, resp.IsError(), msgAndArgs...)
|
|
|
|
require.NotNil(t, resp, msgAndArgs...)
|
|
|
|
}
|
|
|
|
|
|
|
|
func requireSuccessNilResponse(t *testing.T, resp *logical.Response, err error, msgAndArgs ...interface{}) {
|
|
|
|
require.NoError(t, err, msgAndArgs...)
|
|
|
|
require.False(t, resp.IsError(), msgAndArgs...)
|
|
|
|
require.Nil(t, resp, msgAndArgs...)
|
|
|
|
}
|