2017-08-28 12:27:45 -04:00
/ * *
* @ description Certificate generator
* @ author Joko Sastriawan / Ylian Saint - Hilaire
* @ version v0 . 0.1
* /
module . exports . CertificateOperations = function ( ) {
var obj = { } ;
obj . fs = require ( 'fs' ) ;
obj . forge = require ( 'node-forge' ) ;
obj . pki = obj . forge . pki ;
obj . dirExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isDirectory ( ) ; } catch ( err ) { return false ; } }
obj . getFilesizeInBytes = function ( filename ) { try { return obj . fs . statSync ( filename ) [ "size" ] ; } catch ( err ) { return - 1 ; } }
obj . fileExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isFile ( ) ; } catch ( err ) { return false ; } }
2017-10-15 02:22:19 -04:00
// Return the SHA386 hash of the certificate public key
obj . getPublicKeyHash = function ( cert ) {
var publickey = obj . pki . certificateFromPem ( cert ) . publicKey ;
return obj . pki . getPublicKeyFingerprint ( publickey , { encoding : 'hex' , md : obj . forge . md . sha384 . create ( ) } ) ;
2017-09-29 17:26:51 -04:00
}
2017-08-28 12:27:45 -04:00
// Create a self-signed certificate
2017-10-18 19:28:05 -04:00
obj . GenerateRootCertificate = function ( addThumbPrintToName , commonName , country , organization , strong ) {
var keys = obj . pki . rsa . generateKeyPair ( ( strong == true ) ? 3072 : 2048 ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
cert . serialNumber = '' + Math . floor ( ( Math . random ( ) * 100000 ) + 1 ) ; ;
cert . validity . notBefore = new Date ( ) ;
cert . validity . notBefore . setFullYear ( cert . validity . notBefore . getFullYear ( ) - 1 ) ; // Create a certificate that is valid one year before, to make sure out-of-sync clocks don't reject this cert.
cert . validity . notAfter = new Date ( ) ;
cert . validity . notAfter . setFullYear ( cert . validity . notAfter . getFullYear ( ) + 30 ) ;
if ( addThumbPrintToName == true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
2017-10-02 17:12:29 -04:00
if ( country == undefined ) { country = 'unknown' ; }
if ( organization == undefined ) { organization = 'unknown' ; }
var attrs = [ { name : 'commonName' , value : commonName } , { name : 'organizationName' , value : organization } , { name : 'countryName' , value : country } ] ;
2017-08-28 12:27:45 -04:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( attrs ) ;
2017-10-02 17:12:29 -04:00
// Create a root certificate
cert . setExtensions ( [ {
name : 'basicConstraints' ,
cA : true
} , {
2017-08-28 12:27:45 -04:00
name : 'nsCertType' ,
sslCA : true ,
2017-10-02 17:12:29 -04:00
emailCA : true ,
2017-08-28 12:27:45 -04:00
objCA : true
2017-10-02 17:12:29 -04:00
} , {
name : 'subjectKeyIdentifier'
} ] ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( keys . privateKey , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
}
// Issue a certificate from a root
2017-10-15 02:22:19 -04:00
obj . IssueWebServerCertificate = function ( rootcert , addThumbPrintToName , commonName , country , organization , extKeyUsage , strong ) {
var keys = obj . pki . rsa . generateKeyPair ( ( strong == true ) ? 3072 : 2048 ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
cert . serialNumber = '' + Math . floor ( ( Math . random ( ) * 100000 ) + 1 ) ; ;
cert . validity . notBefore = new Date ( ) ;
cert . validity . notBefore . setFullYear ( cert . validity . notAfter . getFullYear ( ) - 1 ) ; // Create a certificate that is valid one year before, to make sure out-of-sync clocks don't reject this cert.
cert . validity . notAfter = new Date ( ) ;
cert . validity . notAfter . setFullYear ( cert . validity . notAfter . getFullYear ( ) + 30 ) ;
if ( addThumbPrintToName == true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
var attrs = [ { name : 'commonName' , value : commonName } ] ;
if ( country != undefined ) attrs . push ( { name : 'countryName' , value : country } ) ;
if ( organization != undefined ) attrs . push ( { name : 'organizationName' , value : organization } ) ;
cert . setSubject ( attrs ) ;
cert . setIssuer ( rootcert . cert . subject . attributes ) ;
2017-09-29 17:26:51 -04:00
if ( extKeyUsage == null ) { extKeyUsage = { name : 'extKeyUsage' , serverAuth : true , } } else { extKeyUsage . name = 'extKeyUsage' ; }
var subjectAltName = null ;
if ( extKeyUsage . serverAuth == true ) {
subjectAltName = {
name : 'subjectAltName' ,
altNames : [ {
type : 6 , // URI
value : 'http://' + commonName + '/'
} , {
type : 6 , // URL
value : 'http://localhost/'
} ]
}
}
/ *
{
name : 'extKeyUsage' ,
serverAuth : true ,
clientAuth : true ,
codeSigning : true ,
emailProtection : true ,
timeStamping : true ,
'2.16.840.1.113741.1.2.1' : true
}
* /
var extensions = [ {
name : 'basicConstraints' ,
cA : false
} , {
2017-08-28 12:27:45 -04:00
name : 'keyUsage' ,
keyCertSign : true ,
digitalSignature : true ,
nonRepudiation : true ,
keyEncipherment : true ,
dataEncipherment : true
2017-09-29 17:26:51 -04:00
} , extKeyUsage , {
2017-08-28 12:27:45 -04:00
name : 'nsCertType' ,
client : false ,
server : true ,
email : false ,
objsign : false ,
sslCA : false ,
emailCA : false ,
objCA : false
} , {
name : 'subjectKeyIdentifier'
2017-09-29 17:26:51 -04:00
} ]
if ( subjectAltName != null ) extensions . push ( subjectAltName ) ;
cert . setExtensions ( extensions ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( rootcert . key , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
}
// Returns the web server TLS certificate and private key, if not present, create demonstration ones.
2017-10-02 17:12:29 -04:00
obj . GetMeshServerCertificate = function ( directory , args , func ) {
var certargs = args . cert ;
2017-10-18 19:28:05 -04:00
var strongCertificate = ( args . fastcert ? false : true ) ;
2017-08-28 12:27:45 -04:00
// commonName, country, organization
// If the certificates directory does not exist, create it.
if ( ! obj . dirExists ( directory ) ) { obj . fs . mkdirSync ( directory ) ; }
var r = { } , rcount = 0 ;
// If the root certificate already exist, load it
if ( obj . fileExists ( directory + '/root-cert-public.crt' ) && obj . fileExists ( directory + '/root-cert-private.key' ) ) {
var rootCertificate = obj . fs . readFileSync ( directory + '/root-cert-public.crt' , 'utf8' ) ;
var rootPrivateKey = obj . fs . readFileSync ( directory + '/root-cert-private.key' , 'utf8' ) ;
r . root = { cert : rootCertificate , key : rootPrivateKey } ;
rcount ++ ;
}
2017-10-02 17:12:29 -04:00
if ( args . tlsoffload == true ) {
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
if ( obj . fileExists ( directory + '/webserver-cert-public.crt' ) ) {
var webCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-public.crt' , 'utf8' ) ;
r . web = { cert : webCertificate } ;
rcount ++ ;
}
} else {
// If the web certificate already exist, load it. Load both certificate and private key
if ( obj . fileExists ( directory + '/webserver-cert-public.crt' ) && obj . fileExists ( directory + '/webserver-cert-private.key' ) ) {
var webCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-public.crt' , 'utf8' ) ;
var webPrivateKey = obj . fs . readFileSync ( directory + '/webserver-cert-private.key' , 'utf8' ) ;
r . web = { cert : webCertificate , key : webPrivateKey } ;
rcount ++ ;
}
2017-08-28 12:27:45 -04:00
}
2017-10-02 17:12:29 -04:00
// If the mps certificate already exist, load it
2017-08-28 12:27:45 -04:00
if ( obj . fileExists ( directory + '/mpsserver-cert-public.crt' ) && obj . fileExists ( directory + '/mpsserver-cert-private.key' ) ) {
var mpsCertificate = obj . fs . readFileSync ( directory + '/mpsserver-cert-public.crt' , 'utf8' ) ;
var mpsPrivateKey = obj . fs . readFileSync ( directory + '/mpsserver-cert-private.key' , 'utf8' ) ;
r . mps = { cert : mpsCertificate , key : mpsPrivateKey } ;
rcount ++ ;
}
2017-10-02 17:12:29 -04:00
// If the agent certificate already exist, load it
2017-08-28 12:27:45 -04:00
if ( obj . fileExists ( directory + '/agentserver-cert-public.crt' ) && obj . fileExists ( directory + '/agentserver-cert-private.key' ) ) {
var agentCertificate = obj . fs . readFileSync ( directory + '/agentserver-cert-public.crt' , 'utf8' ) ;
var agentPrivateKey = obj . fs . readFileSync ( directory + '/agentserver-cert-private.key' , 'utf8' ) ;
r . agent = { cert : agentCertificate , key : agentPrivateKey } ;
rcount ++ ;
}
2017-09-07 19:01:44 -04:00
2017-10-02 17:12:29 -04:00
// If the console certificate already exist, load it
2017-09-29 17:26:51 -04:00
if ( obj . fileExists ( directory + '/amtconsole-cert-public.crt' ) && obj . fileExists ( directory + '/agentserver-cert-private.key' ) ) {
var amtConsoleCertificate = obj . fs . readFileSync ( directory + '/amtconsole-cert-public.crt' , 'utf8' ) ;
var amtConsolePrivateKey = obj . fs . readFileSync ( directory + '/amtconsole-cert-private.key' , 'utf8' ) ;
r . console = { cert : amtConsoleCertificate , key : amtConsolePrivateKey } ;
rcount ++ ;
}
2017-09-07 19:01:44 -04:00
// If CA certificates are present, load them
var caok , caindex = 1 , calist = [ ] ;
do {
caok = false ;
if ( obj . fileExists ( directory + '/webserver-cert-chain' + caindex + '.crt' ) ) {
var caCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-chain' + caindex + '.crt' , 'utf8' ) ;
calist . push ( caCertificate ) ;
caok = true ;
}
caindex ++ ;
} while ( caok == true ) ;
r . calist = calist ;
2017-08-28 12:27:45 -04:00
// Decode certificate arguments
2017-10-02 17:12:29 -04:00
var commonName = 'un-configured' , country , organization , forceWebCertGen = 0 ;
2017-08-28 12:27:45 -04:00
if ( certargs != undefined ) {
var args = certargs . split ( ',' ) ;
if ( args . length > 0 ) commonName = args [ 0 ] ;
if ( args . length > 1 ) country = args [ 1 ] ;
if ( args . length > 2 ) organization = args [ 2 ] ;
}
2017-10-02 17:12:29 -04:00
2017-09-29 17:26:51 -04:00
if ( rcount == 5 ) {
// Fetch the Intel AMT console name
var consoleCertificate = obj . pki . certificateFromPem ( r . console . cert ) ;
r . AmtConsoleName = consoleCertificate . subject . getField ( 'CN' ) . value ;
2017-10-11 15:20:59 -04:00
// Fetch the Intel AMT MPS common name
var mpsCertificate = obj . pki . certificateFromPem ( r . mps . cert ) ;
r . AmtMpsName = mpsCertificate . subject . getField ( 'CN' ) . value ;
2017-08-28 12:27:45 -04:00
// Fetch the name of the server
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
r . CommonName = webCertificate . subject . getField ( 'CN' ) . value ;
var rootCertificate = obj . pki . certificateFromPem ( r . root . cert ) ;
r . RootName = rootCertificate . subject . getField ( 'CN' ) . value ;
if ( certargs == undefined ) { if ( func != undefined ) { func ( r ) ; } return r } ; // If no certificate arguments are given, keep the certificate
var xcountry , xcountryField = webCertificate . subject . getField ( 'C' ) ;
if ( xcountryField != null ) { xcountry = xcountryField . value ; }
var xorganization , xorganizationField = webCertificate . subject . getField ( 'O' ) ;
if ( xorganizationField != null ) { xorganization = xorganizationField . value ; }
2017-10-11 15:20:59 -04:00
if ( ( r . CommonName == commonName ) && ( xcountry == country ) && ( xorganization == organization ) && ( r . AmtMpsName == commonName ) ) { if ( func != undefined ) { func ( r ) ; } return r ; } else { forceWebCertGen = 1 ; } // If the certificate matches what we want, keep it.
2017-08-28 12:27:45 -04:00
}
2017-10-18 19:28:05 -04:00
//console.log('Generating certificates, may take a few minutes...');
// If a certificate is missing, but web certificate is present and --cert is not used, set the names to be the same as the web certificate
if ( ( certargs == null ) && ( r . web != null ) ) {
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
commonName = webCertificate . subject . getField ( 'CN' ) . value ;
var xcountryField = webCertificate . subject . getField ( 'C' ) ;
if ( xcountryField != null ) { country = xcountryField . value ; }
var xorganizationField = webCertificate . subject . getField ( 'O' ) ;
if ( xorganizationField != null ) { organization = xorganizationField . value ; }
}
2017-08-28 12:27:45 -04:00
var rootCertAndKey , rootCertificate , rootPrivateKey , rootName ;
if ( r . root == undefined ) {
// If the root certificate does not exist, create one
2017-10-18 19:28:05 -04:00
console . log ( 'Generating root certificate...' ) ;
rootCertAndKey = obj . GenerateRootCertificate ( true , 'MeshCentralRoot' , null , null , strongCertificate ) ;
2017-08-28 12:27:45 -04:00
rootCertificate = obj . pki . certificateToPem ( rootCertAndKey . cert ) ;
rootPrivateKey = obj . pki . privateKeyToPem ( rootCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/root-cert-public.crt' , rootCertificate ) ;
obj . fs . writeFileSync ( directory + '/root-cert-private.key' , rootPrivateKey ) ;
} else {
// Keep the root certificate we have
rootCertAndKey = { cert : obj . pki . certificateFromPem ( r . root . cert ) , key : obj . pki . privateKeyFromPem ( r . root . key ) } ;
rootCertificate = r . root . cert
rootPrivateKey = r . root . key
}
var rootName = rootCertAndKey . cert . subject . getField ( 'CN' ) . value ;
// If the web certificate does not exist, create one
var webCertAndKey , webCertificate , webPrivateKey ;
2017-10-11 15:20:59 -04:00
if ( ( r . web == null ) || ( forceWebCertGen == 1 ) ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating HTTPS certificate...' ) ;
webCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , strongCertificate ) ;
2017-09-29 17:26:51 -04:00
webCertificate = obj . pki . certificateToPem ( webCertAndKey . cert ) ;
webPrivateKey = obj . pki . privateKeyToPem ( webCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/webserver-cert-public.crt' , webCertificate ) ;
obj . fs . writeFileSync ( directory + '/webserver-cert-private.key' , webPrivateKey ) ;
} else {
// Keep the console certificate we have
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) , key : obj . pki . privateKeyFromPem ( r . web . key ) } ;
webCertificate = r . web . cert
webPrivateKey = r . web . key
}
2017-10-18 19:28:05 -04:00
// If the mesh agent server certificate does not exist, create one
var agentCertAndKey , agentCertificate , agentPrivateKey ;
if ( r . agent == null ) {
console . log ( 'Generating MeshAgent certificate...' ) ;
agentCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , true , 'MeshCentralAgentServer' , null , strongCertificate ) ;
agentCertificate = obj . pki . certificateToPem ( agentCertAndKey . cert ) ;
agentPrivateKey = obj . pki . privateKeyToPem ( agentCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/agentserver-cert-public.crt' , agentCertificate ) ;
obj . fs . writeFileSync ( directory + '/agentserver-cert-private.key' , agentPrivateKey ) ;
} else {
// Keep the mesh agent server certificate we have
agentCertAndKey = { cert : obj . pki . certificateFromPem ( r . agent . cert ) , key : obj . pki . privateKeyFromPem ( r . agent . key ) } ;
agentCertificate = r . agent . cert
agentPrivateKey = r . agent . key
}
2017-08-28 12:27:45 -04:00
// If the Intel AMT MPS certificate does not exist, create one
var mpsCertAndKey , mpsCertificate , mpsPrivateKey ;
2017-10-11 15:20:59 -04:00
if ( ( r . mps == null ) || ( forceWebCertGen == 1 ) ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating Intel AMT MPS certificate...' ) ;
2017-10-15 02:22:19 -04:00
mpsCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , false ) ;
2017-09-29 17:26:51 -04:00
mpsCertificate = obj . pki . certificateToPem ( mpsCertAndKey . cert ) ;
mpsPrivateKey = obj . pki . privateKeyToPem ( mpsCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/mpsserver-cert-public.crt' , mpsCertificate ) ;
obj . fs . writeFileSync ( directory + '/mpsserver-cert-private.key' , mpsPrivateKey ) ;
} else {
// Keep the console certificate we have
mpsCertAndKey = { cert : obj . pki . certificateFromPem ( r . mps . cert ) , key : obj . pki . privateKeyFromPem ( r . mps . key ) } ;
mpsCertificate = r . mps . cert
mpsPrivateKey = r . mps . key
}
// If the Intel AMT console certificate does not exist, create one
2017-10-03 21:31:20 -04:00
var consoleCertAndKey , consoleCertificate , consolePrivateKey , amtConsoleName = 'MeshCentral' ;
2017-10-11 15:20:59 -04:00
if ( r . console == null ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating Intel AMT console certificate...' ) ;
2017-10-15 02:22:19 -04:00
consoleCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , amtConsoleName , country , organization , { name : 'extKeyUsage' , clientAuth : true , '2.16.840.1.113741.1.2.1' : true , '2.16.840.1.113741.1.2.2' : true , '2.16.840.1.113741.1.2.3' : true } , false ) ; // Intel AMT Remote, Agent and Activation usages
2017-09-29 17:26:51 -04:00
consoleCertificate = obj . pki . certificateToPem ( consoleCertAndKey . cert ) ;
consolePrivateKey = obj . pki . privateKeyToPem ( consoleCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/amtconsole-cert-public.crt' , consoleCertificate ) ;
obj . fs . writeFileSync ( directory + '/amtconsole-cert-private.key' , consolePrivateKey ) ;
} else {
// Keep the console certificate we have
consoleCertAndKey = { cert : obj . pki . certificateFromPem ( r . console . cert ) , key : obj . pki . privateKeyFromPem ( r . console . key ) } ;
consoleCertificate = r . console . cert
consolePrivateKey = r . console . key
2017-10-03 21:31:20 -04:00
amtConsoleName = consoleCertAndKey . cert . subject . getField ( 'CN' ) . value ;
2017-09-29 17:26:51 -04:00
}
var r = { root : { cert : rootCertificate , key : rootPrivateKey } , web : { cert : webCertificate , key : webPrivateKey } , mps : { cert : mpsCertificate , key : mpsPrivateKey } , agent : { cert : agentCertificate , key : agentPrivateKey } , console : { cert : consoleCertificate , key : consolePrivateKey } , calist : calist , CommonName : commonName , RootName : rootName , AmtConsoleName : amtConsoleName } ;
2017-08-28 12:27:45 -04:00
if ( func != undefined ) { func ( r ) ; }
return r ;
}
return obj ;
} ;