2019-03-25 21:52:12 +00:00
// Copyright (C) 2019 Storj Labs, Inc.
// See LICENSE for copying information.
package extensions
import (
"crypto/x509"
"crypto/x509/pkix"
"encoding/asn1"
"github.com/zeebo/errs"
"storj.io/storj/pkg/peertls"
"storj.io/storj/pkg/pkcrypto"
)
const (
// RevocationBucket is the bolt bucket to store revocation data in
RevocationBucket = "revocations"
)
var (
// AllHandlers holds all registered extension handlers
AllHandlers HandlerFactories
// CAWhitelistSignedLeafHandler verifies that the leaf cert of the remote peer's
// identity was signed by one of the CA certs in the whitelist.
CAWhitelistSignedLeafHandler = NewHandlerFactory (
& SignedCertExtID , caWhitelistSignedLeafHandler ,
)
// NB: 2.999.X is reserved for "example" OIDs
// (see http://oid-info.com/get/2.999)
// 2.999.1.X -- storj general/misc. extensions
2019-04-08 19:15:19 +01:00
// 2.999.2.X -- storj identity extensions
2019-03-25 21:52:12 +00:00
2019-04-08 19:15:19 +01:00
// SignedCertExtID is the asn1 object ID for a pkix extension holding a
2019-03-25 21:52:12 +00:00
// signature of the cert it's extending, signed by some CA (e.g. the root cert chain).
// This extensionHandler allows for an additional signature per certificate.
SignedCertExtID = ExtensionID { 2 , 999 , 1 , 1 }
2019-04-08 19:15:19 +01:00
// RevocationExtID is the asn1 object ID for a pkix extension containing the
2019-03-25 21:52:12 +00:00
// most recent certificate revocation data
// for the current TLS cert chain.
RevocationExtID = ExtensionID { 2 , 999 , 1 , 2 }
2019-04-08 19:15:19 +01:00
// IdentityVersionExtID is the asn1 object ID for a pkix extension that
// specifies the identity version of the certificate chain.
IdentityVersionExtID = ExtensionID { 2 , 999 , 2 , 1 }
// IdentityPOWCounterExtID is the asn1 object ID for a pkix extension that
// specifies how many times to hash the CA public key to calculate the node ID.
IdentityPOWCounterExtID = ExtensionID { 2 , 999 , 2 , 2 }
2019-03-25 21:52:12 +00:00
// Error is used when an error occurs while processing an extension.
Error = errs . Class ( "extension error" )
// ErrVerifyCASignedLeaf is used when a signed leaf extension signature wasn't produced
// by any CA in the whitelist.
ErrVerifyCASignedLeaf = Error . New ( "leaf not signed by any CA in the whitelist" )
// ErrUniqueExtensions is used when multiple extensions have the same Id
ErrUniqueExtensions = Error . New ( "extensions are not unique" )
)
// ExtensionID is an alias to an `asn1.ObjectIdentifier`.
type ExtensionID = asn1 . ObjectIdentifier
// Config is used to bind cli flags for determining which extensions will
// be used by the server
type Config struct {
Revocation bool ` default:"true" help:"if true, client leaves may contain the most recent certificate revocation for the current certificate" `
WhitelistSignedLeaf bool ` default:"false" help:"if true, client leaves must contain a valid \"signed certificate extension\" (NB: verified against certs in the peer ca whitelist; i.e. if true, a whitelist must be provided)" `
}
// Options holds common options for use in handling extensions.
type Options struct {
PeerCAWhitelist [ ] * x509 . Certificate
RevDB RevocationDB
2019-04-08 19:15:19 +01:00
PeerIDVersions string
2019-03-25 21:52:12 +00:00
}
// HandlerFactories is a collection of `HandlerFactory`s for convenience.
// Defines `Register` and `WithOptions` methods.
type HandlerFactories [ ] * HandlerFactory
// HandlerFactory holds a factory for a handler function given the passed `Options`.
// For use in handling extensions with the corresponding ExtensionID.
type HandlerFactory struct {
id * ExtensionID
factory HandlerFactoryFunc
}
// HandlerFactoryFunc is a factory function used to build `HandlerFunc`s given
// the passed options.
type HandlerFactoryFunc func ( options * Options ) HandlerFunc
// HandlerFunc takes an extension and the remote peer's certificate chains for
// use in extension handling.
type HandlerFunc func ( pkix . Extension , [ ] [ ] * x509 . Certificate ) error
// HandlerFuncMap maps an `ExtensionID` pointer to a `HandlerFunc`.
// Because an `ExtensionID` is a pointer , one can use a new pointer to the same
// asn1 object ID constant to store multiple `HandlerFunc`s for the same
// underlying extension id value.
type HandlerFuncMap map [ * ExtensionID ] HandlerFunc
func init ( ) {
// NB: register all handlers defined in this file.
AllHandlers . Register (
CAWhitelistSignedLeafHandler ,
)
}
2019-04-08 19:15:19 +01:00
// NewHandlerFactory builds a `HandlerFactory` pointer from an `ExtensionID` and a `HandlerFactoryFunc`.
2019-03-25 21:52:12 +00:00
func NewHandlerFactory ( id * ExtensionID , handlerFactory HandlerFactoryFunc ) * HandlerFactory {
return & HandlerFactory {
id : id ,
factory : handlerFactory ,
}
}
2019-04-03 16:03:53 +01:00
// AddExtraExtension adds one or more extensions to a certificate for serialization.
// NB: this *does not* serialize or persist the extension into the certificates's
// raw bytes. To add a persistent extension use `FullCertificateAuthority.AddExtension`
// or `ManageableIdentity.AddExtension`.
func AddExtraExtension ( cert * x509 . Certificate , exts ... pkix . Extension ) ( err error ) {
2019-03-25 21:52:12 +00:00
if len ( exts ) == 0 {
return nil
}
if ! uniqueExts ( append ( cert . ExtraExtensions , exts ... ) ) {
return ErrUniqueExtensions
}
for _ , ext := range exts {
e := pkix . Extension { Id : ext . Id , Value : make ( [ ] byte , len ( ext . Value ) ) }
copy ( e . Value , ext . Value )
cert . ExtraExtensions = append ( cert . ExtraExtensions , e )
}
return nil
}
// Register adds an extension handler factory to the list.
func ( factories * HandlerFactories ) Register ( newHandlers ... * HandlerFactory ) {
* factories = append ( * factories , newHandlers ... )
}
// WithOptions builds a `HandlerFuncMap` by calling each `HandlerFactory` with
// the passed `Options` pointer and using the respective `ExtensionID` pointer
// as the key.
func ( factories HandlerFactories ) WithOptions ( opts * Options ) HandlerFuncMap {
handlerFuncMap := make ( HandlerFuncMap )
for _ , factory := range factories {
handlerFuncMap [ factory . ID ( ) ] = factory . NewHandlerFunc ( opts )
}
return handlerFuncMap
}
// ID returns the `ExtensionID` pointer stored with this factory. This factory
// will only handle extensions that have a matching id value.
func ( handlerFactory * HandlerFactory ) ID ( ) * ExtensionID {
return handlerFactory . id
}
// NewHandlerFunc returns a new `HandlerFunc` with the passed `Options`.
func ( handlerFactory * HandlerFactory ) NewHandlerFunc ( opts * Options ) HandlerFunc {
return handlerFactory . factory ( opts )
}
func uniqueExts ( exts [ ] pkix . Extension ) bool {
seen := make ( map [ string ] struct { } , len ( exts ) )
for _ , e := range exts {
s := e . Id . String ( )
if _ , ok := seen [ s ] ; ok {
return false
}
seen [ s ] = struct { } { }
}
return true
}
func caWhitelistSignedLeafHandler ( opts * Options ) HandlerFunc {
return func ( ext pkix . Extension , chains [ ] [ ] * x509 . Certificate ) error {
if opts . PeerCAWhitelist == nil {
return Error . New ( "no whitelist provided" )
}
leaf := chains [ 0 ] [ peertls . LeafIndex ]
for _ , ca := range opts . PeerCAWhitelist {
err := pkcrypto . HashAndVerifySignature ( ca . PublicKey , leaf . RawTBSCertificate , ext . Value )
if err == nil {
return nil
}
}
return ErrVerifyCASignedLeaf
}
}